Analysis

  • max time kernel
    291s
  • max time network
    294s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    13-08-2023 11:58

General

  • Target

    lsass.exe

  • Size

    2.8MB

  • MD5

    a832cc87a6c0c80ee12adddebd1dbf2d

  • SHA1

    51b5f69421c4e5d57602f6b7dbc31ac1fed8010e

  • SHA256

    08652d415a6b8f788a0e4914b3517c81fc49ef1be964548e00b92067fa66b702

  • SHA512

    2e9d96d474eca87e8897ca021c6e6ea0da3ebb66ce9f0cee02c72525a9234546a116ce90cac807b4e5928308e013f92ba5f87e64e2e501d6f393aa8951b80b61

  • SSDEEP

    49152:zYZKdX+/IwlGW3b96tAtUpQw2D11j3gMebfM2+CJhQgrCg07p5vIMa:vAx3bkGqpQnEU3If

Malware Config

Extracted

Family

cobaltstrike

Botnet

0

C2

http://bba.ccb.com.cdn.dnsv1.com.cn:443/static/skin/js/jquery-3.3.1.min.js

Attributes
  • access_type

    512

  • host

    bba.ccb.com.cdn.dnsv1.com.cn,/static/skin/js/jquery-3.3.1.min.js

  • http_header1

    aWR2eVVhTURLdWJXVzRUTDNpUGpCdz09AAAAAAAAAAA=

  • http_method1

    GET

  • http_method2

    POST

  • jitter

    2048

  • port_number

    443

  • sc_process32

    %windir%\syswow64\dllhost.exe

  • sc_process64

    %windir%\sysnative\dllhost.exe

  • unknown1

    4.234810624e+09

  • unknown2

    AAAABAAAAAEAAAXyAAAAAgAAAFQAAAACAAAPWwAAAA0AAAAPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /static/skin/js/jquery-3.3.2.min.js

  • watermark

    0

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Modifies system certificate store 2 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lsass.exe
    "C:\Users\Admin\AppData\Local\Temp\lsass.exe"
    1⤵
    • Modifies system certificate store
    PID:2520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab7F5F.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • memory/2520-54-0x00000000278B0000-0x00000000278F2000-memory.dmp

    Filesize

    264KB

  • memory/2520-56-0x0000000028CB0000-0x0000000029122000-memory.dmp

    Filesize

    4.4MB

  • memory/2520-73-0x000000013FEA0000-0x00000001401D5000-memory.dmp

    Filesize

    3.2MB

  • memory/2520-78-0x000000013FEA0000-0x00000001401D5000-memory.dmp

    Filesize

    3.2MB

  • memory/2520-84-0x000000013FEA0000-0x00000001401D5000-memory.dmp

    Filesize

    3.2MB

  • memory/2520-90-0x000000013FEA0000-0x00000001401D5000-memory.dmp

    Filesize

    3.2MB

  • memory/2520-91-0x000000013FEA0000-0x00000001401D5000-memory.dmp

    Filesize

    3.2MB

  • memory/2520-97-0x000000013FEA0000-0x00000001401D5000-memory.dmp

    Filesize

    3.2MB