Behavioral task
behavioral1
Sample
1d04dc4cba658dfdc936341b3fb5b9e507e7eac4c89fb1b332e0ce6e180b1cc6.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1d04dc4cba658dfdc936341b3fb5b9e507e7eac4c89fb1b332e0ce6e180b1cc6.exe
Resource
win10v2004-20230831-en
General
-
Target
1d04dc4cba658dfdc936341b3fb5b9e507e7eac4c89fb1b332e0ce6e180b1cc6
-
Size
26KB
-
MD5
e3d6aa37803e8221c346f7e994dbc85a
-
SHA1
facac0f3ae8c895210498c753e6d44330173d224
-
SHA256
1d04dc4cba658dfdc936341b3fb5b9e507e7eac4c89fb1b332e0ce6e180b1cc6
-
SHA512
561aa29fd5446405dbf0c7580b79b1de983832abcebf12cea71f099496e3e2f6f21a89063b4c923f7bfee94bb0d4fa4137bed2ca37a06d3b140ed90797a5da39
-
SSDEEP
384:j/w8so8FqgT5RZzza1KAPk3mdHz43PtMss8ss:j48EljXaDPk3mdEak
Malware Config
Extracted
cobaltstrike
http://192.168.18.130:29000/jquery-3.3.2.slim.min.js
-
user_agent
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Referer: http://code.jquery.com/ Accept-Encoding: gzip, deflate User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.34 Safari/537.36 Edg/
Signatures
-
Cobaltstrike family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1d04dc4cba658dfdc936341b3fb5b9e507e7eac4c89fb1b332e0ce6e180b1cc6
Files
-
1d04dc4cba658dfdc936341b3fb5b9e507e7eac4c89fb1b332e0ce6e180b1cc6.exe windows x64
84d1012ac2b385a508d511245069ec24
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
VirtualProtect
VirtualAlloc
OpenProcess
Sleep
CreateThread
GetProcAddress
GetModuleHandleW
CreateProcessA
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCurrentThreadId
GetCurrentProcess
user32
GetDC
vcruntime140
__current_exception
memcpy
__current_exception_context
__C_specific_handler
memset
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-runtime-l1-1-0
_crt_atexit
_register_onexit_function
_exit
exit
_get_initial_narrow_environment
_initialize_narrow_environment
_configure_narrow_argv
_initterm_e
_set_app_type
_seh_filter_exe
_initialize_onexit_table
__p___argc
_initterm
_register_thread_local_exe_atexit_callback
_c_exit
_cexit
terminate
__p___argv
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
_set_new_mode
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 636B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ