Overview
overview
10Static
static
31.exe
windows7-x64
101.exe
windows10-1703-x64
101.exe
windows10-2004-x64
1010.exe
windows7-x64
1010.exe
windows10-1703-x64
1010.exe
windows10-2004-x64
102.exe
windows7-x64
102.exe
windows10-1703-x64
102.exe
windows10-2004-x64
103.exe
windows7-x64
103.exe
windows10-1703-x64
103.exe
windows10-2004-x64
104.exe
windows7-x64
104.exe
windows10-1703-x64
104.exe
windows10-2004-x64
105.exe
windows7-x64
105.exe
windows10-1703-x64
105.exe
windows10-2004-x64
106.exe
windows7-x64
106.exe
windows10-1703-x64
106.exe
windows10-2004-x64
107.exe
windows7-x64
77.exe
windows10-1703-x64
107.exe
windows10-2004-x64
108.exe
windows7-x64
78.exe
windows10-1703-x64
108.exe
windows10-2004-x64
109.exe
windows7-x64
109.exe
windows10-1703-x64
109.exe
windows10-2004-x64
10Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
16-08-2023 06:49
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10-20230703-en
Behavioral task
behavioral3
Sample
1.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral4
Sample
10.exe
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
10.exe
Resource
win10-20230703-en
Behavioral task
behavioral6
Sample
10.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
2.exe
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
2.exe
Resource
win10-20230703-en
Behavioral task
behavioral9
Sample
2.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
3.exe
Resource
win7-20230712-en
Behavioral task
behavioral11
Sample
3.exe
Resource
win10-20230703-en
Behavioral task
behavioral12
Sample
3.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
4.exe
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
4.exe
Resource
win10-20230703-en
Behavioral task
behavioral15
Sample
4.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
5.exe
Resource
win7-20230712-en
Behavioral task
behavioral17
Sample
5.exe
Resource
win10-20230703-en
Behavioral task
behavioral18
Sample
5.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral19
Sample
6.exe
Resource
win7-20230712-en
Behavioral task
behavioral20
Sample
6.exe
Resource
win10-20230703-en
Behavioral task
behavioral21
Sample
6.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral22
Sample
7.exe
Resource
win7-20230712-en
Behavioral task
behavioral23
Sample
7.exe
Resource
win10-20230703-en
Behavioral task
behavioral24
Sample
7.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral25
Sample
8.exe
Resource
win7-20230712-en
Behavioral task
behavioral26
Sample
8.exe
Resource
win10-20230703-en
Behavioral task
behavioral27
Sample
8.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral28
Sample
9.exe
Resource
win7-20230712-en
Behavioral task
behavioral29
Sample
9.exe
Resource
win10-20230703-en
Behavioral task
behavioral30
Sample
9.exe
Resource
win10v2004-20230703-en
General
-
Target
4.exe
-
Size
2.6MB
-
MD5
a14a70c9382dafae8082b96692fb6126
-
SHA1
703b869b3d102c18bc1ea7f8ebe9732049cbd710
-
SHA256
7a54e2ff0dd51979498b05c96e134b5e08bfa3a6c470c31590b6dfb7467e9ea4
-
SHA512
e72a8731ab0a9ea180a8b9c00d3d015a18a28434daec01a365fb47ef906ce3c8f7e03dda133769204f4b387f1eae882d3ff541d6d4566e66e26f3c6dd3b5d532
-
SSDEEP
49152:sylqBU83Orb/TKvO90d7HjmAFd4A64nsfJ2U4OOiTXg4tpqbCAb1qQz7eVJiyvpE:Y3MJQuVJws
Malware Config
Extracted
cobaltstrike
391144938
http://ngcdn010.cnr.cn:443/dist/css/bootstrap.min.css
-
access_type
512
-
beacon_type
2048
-
host
ngcdn010.cnr.cn,/dist/css/bootstrap.min.css
-
http_header1
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
-
http_header2
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
-
http_method1
POST
-
http_method2
POST
-
jitter
9472
-
polling_time
10000
-
port_number
443
-
sc_process32
%windir%\syswow64\svchost.exe -k netsvcs
-
sc_process64
%windir%\sysnative\svchost.exe -k netsvcs
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCKcWx/iIALKK+Wqxrt0P8S4XJtcRnSAf5fAQwMxEIGOYvVt8Tq78HkENt9asoKfJRmt5JW1EB3rAiP1oJ/ZNapQHEP1bgG8lxwp1UPeqqySUJfA03aR4Tx2e/S3fou3yageDPjW3MjI2h0mHAbvYbB2dXXsX10eC8EWXhsAHaqdQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
3.462927616e+09
-
unknown2
AAAABAAAAAEAAAAtAAAAAQAABsMAAAACAAAAFAAAAAIAAAA1AAAAAgAAACwAAAACAAAAJAAAAAIAAABLAAAAAgAAC6IAAAADAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/dist/js/bootstrap.bundle.min.js
-
user_agent
Mozilla/5.0 (X11; U; Linux x86_64; en-us) AppleWebKit/531.2+ (KHTML, like Gecko) Version/5.0 Safari/531.2+
-
watermark
391144938
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
4.exedescription pid process target process PID 1432 wrote to memory of 2596 1432 4.exe explorer.exe PID 1432 wrote to memory of 2596 1432 4.exe explorer.exe PID 1432 wrote to memory of 2596 1432 4.exe explorer.exe PID 1432 wrote to memory of 2596 1432 4.exe explorer.exe