Resubmissions

11-08-2023 18:09

230811-wrxmsshg7w 10

10-08-2023 16:39

230810-t6a18sfb25 3

10-08-2023 16:00

230810-tfl1taef87 10

10-08-2023 15:59

230810-te451agd9w 3

10-08-2023 15:56

230810-tdfe9aef62 10

Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-08-2023 16:00

General

  • Target

    2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe

  • Size

    4.5MB

  • MD5

    62f510d6c3ecf3c63f54240379a223d1

  • SHA1

    b3d826c02cb856db7a4edc0599c885f054984973

  • SHA256

    2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a

  • SHA512

    8308c4445631bc305c3f25cb6c33c5f3c5c20d4e7ac55baff5fa0018a396ea5feea3b6adbda7107ea2e848565e73ea7c8d5503ace8a7c4cbaf2e987c90694e0a

  • SSDEEP

    98304:OlHQcO/ki1LShsRT6q+LsnggYpdBs8R8YT6v/TwZVVABrxzB0RWcQ0b:Olwceki1LShOOq+L7gYpx+YnAJxpt0b

Malware Config

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://time.api.chinabm.cn:443/rpc

Extracted

Family

cobaltstrike

Botnet

1359593325

C2

http://time.api.chinabm.cn:443/owa/

Attributes
  • access_type

    512

  • beacon_type

    2048

  • host

    time.api.chinabm.cn,/owa/

  • http_header1

    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

  • http_header2

    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

  • http_method1

    GET

  • http_method2

    GET

  • jitter

    5120

  • polling_time

    5000

  • port_number

    443

  • sc_process32

    %windir%\syswow64\gpupdate.exe

  • sc_process64

    %windir%\sysnative\gpupdate.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCgwZtr5WmRWGqXa6bxdqQDUmj+XU+vA4zK2b7Nfzq4qy143458ufxXidOMjoSLVP3BqyJgWamd0KYY7Yt3bDmFbWashi7f+OYdWpDNixd5AvcGOOzQhShEZ/0Uz8CG/gc99swyssnxs0YBg9Hka4Wh0ufxO89KSApuLegLE5i1/QIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    1.448416512e+09

  • unknown2

    AAAABAAAAA0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown3

    1.610612736e+09

  • uri

    /OWA/

  • user_agent

    Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko)

  • watermark

    1359593325

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Loads dropped DLL 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe
    "C:\Users\Admin\AppData\Local\Temp\2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Users\Admin\AppData\Local\Temp\2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe
      "C:\Users\Admin\AppData\Local\Temp\2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:2576

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI13242\MSVCR100.dll
    Filesize

    755KB

    MD5

    bf38660a9125935658cfa3e53fdc7d65

    SHA1

    0b51fb415ec89848f339f8989d323bea722bfd70

    SHA256

    60c06e0fa4449314da3a0a87c1a9d9577df99226f943637e06f61188e5862efa

    SHA512

    25f521ffe25a950d0f1a4de63b04cb62e2a3b0e72e7405799586913208bf8f8fa52aa34e96a9cc6ee47afcd41870f3aa0cd8289c53461d1b6e792d19b750c9a1

  • C:\Users\Admin\AppData\Local\Temp\_MEI13242\MSVCR100.dll
    Filesize

    755KB

    MD5

    bf38660a9125935658cfa3e53fdc7d65

    SHA1

    0b51fb415ec89848f339f8989d323bea722bfd70

    SHA256

    60c06e0fa4449314da3a0a87c1a9d9577df99226f943637e06f61188e5862efa

    SHA512

    25f521ffe25a950d0f1a4de63b04cb62e2a3b0e72e7405799586913208bf8f8fa52aa34e96a9cc6ee47afcd41870f3aa0cd8289c53461d1b6e792d19b750c9a1

  • C:\Users\Admin\AppData\Local\Temp\_MEI13242\_ctypes.pyd
    Filesize

    83KB

    MD5

    673dc6681afb67384e923dc9bfd2cd90

    SHA1

    445fcab47381908214d0636be9604828f9d33a47

    SHA256

    d551e7fcafab97340e03a41ca2f7d5c2ade7eecf7cdaedf147abad63f09f263c

    SHA512

    801478c83727a59409c19afa9a3edce81c0139f58e3dc81696ffd690e3f1de9c595f100279b18180a9189feaf9fcc40fb74e609f181f2decbea13c6b2a49f6a6

  • C:\Users\Admin\AppData\Local\Temp\_MEI13242\_ctypes.pyd
    Filesize

    83KB

    MD5

    673dc6681afb67384e923dc9bfd2cd90

    SHA1

    445fcab47381908214d0636be9604828f9d33a47

    SHA256

    d551e7fcafab97340e03a41ca2f7d5c2ade7eecf7cdaedf147abad63f09f263c

    SHA512

    801478c83727a59409c19afa9a3edce81c0139f58e3dc81696ffd690e3f1de9c595f100279b18180a9189feaf9fcc40fb74e609f181f2decbea13c6b2a49f6a6

  • C:\Users\Admin\AppData\Local\Temp\_MEI13242\base_library.zip
    Filesize

    708KB

    MD5

    0aecf93f79fccf4cecd0b8c40c1563b3

    SHA1

    36c406740615d9b5f1b89311e65931fe258fc4b1

    SHA256

    f751f64f4bd5018bd38a0cfe7e808856426b4076897d58abede01413c4fde80d

    SHA512

    b1e51e3ec81f659a78a5971cdc2e7d234ec0d87c5c787f64af02f90b32f665dda3b421139f88e36f55cda713e670f739178731ae4fe313d629eecc67c6856d27

  • C:\Users\Admin\AppData\Local\Temp\_MEI13242\python34.dll
    Filesize

    2.6MB

    MD5

    2a78649eb1fe4354060623785f7f98aa

    SHA1

    85dcadf0b43db27f47713c433f8e31a8642cf8d5

    SHA256

    fdb01967868edc948d9e0ee128a26a3c76df2600262ca9d38034d45dbe39017d

    SHA512

    678b122bf318b78a7699f4417d6b74e65f3dc740d287c9a193a59c670d38579fa20180dd363f1e620fbce7e388d993e59321b19127fff3e6d6502a8e24a33d6a

  • C:\Users\Admin\AppData\Local\Temp\_MEI13242\python34.dll
    Filesize

    2.6MB

    MD5

    2a78649eb1fe4354060623785f7f98aa

    SHA1

    85dcadf0b43db27f47713c433f8e31a8642cf8d5

    SHA256

    fdb01967868edc948d9e0ee128a26a3c76df2600262ca9d38034d45dbe39017d

    SHA512

    678b122bf318b78a7699f4417d6b74e65f3dc740d287c9a193a59c670d38579fa20180dd363f1e620fbce7e388d993e59321b19127fff3e6d6502a8e24a33d6a

  • C:\Users\Admin\AppData\Local\Temp\_MEI13242\shellcode_loader_1.exe.manifest
    Filesize

    1KB

    MD5

    737cee84004d9e7c1f1256d922490b40

    SHA1

    f642a0fc241104b7a0aa011e434dfbe3de0b71ce

    SHA256

    db9d564d53e46ee9ebb875443155f733d297d42a91f000153da1e29fede0a199

    SHA512

    d3193eb3c9ab1624e9949af78fed47223e88fceeb97b8a3a80161ac358be1018e5eecfeafa6117b6f5ac2ecbb6a179ce707b16a0ef8ffdcbd2114e46152e130b

  • memory/1324-158-0x0000000000400000-0x0000000000433000-memory.dmp
    Filesize

    204KB

  • memory/2576-157-0x00000000006A0000-0x00000000006A1000-memory.dmp
    Filesize

    4KB

  • memory/2576-159-0x0000000000400000-0x0000000000433000-memory.dmp
    Filesize

    204KB

  • memory/2576-161-0x0000000004280000-0x00000000042BD000-memory.dmp
    Filesize

    244KB

  • memory/2576-162-0x0000000003E80000-0x0000000004280000-memory.dmp
    Filesize

    4.0MB

  • memory/2576-164-0x0000000004280000-0x00000000042BD000-memory.dmp
    Filesize

    244KB

  • memory/2576-166-0x0000000003E80000-0x0000000004280000-memory.dmp
    Filesize

    4.0MB