Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2023 18:20
Behavioral task
behavioral1
Sample
2023-08-23_9865fe282de45bd96d0eff05e080f5c3_cobalt-strike_cobaltstrike_JC.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-23_9865fe282de45bd96d0eff05e080f5c3_cobalt-strike_cobaltstrike_JC.dll
Resource
win10v2004-20230831-en
General
-
Target
2023-08-23_9865fe282de45bd96d0eff05e080f5c3_cobalt-strike_cobaltstrike_JC.dll
-
Size
208KB
-
MD5
9865fe282de45bd96d0eff05e080f5c3
-
SHA1
67a7ef0714611c2c9bdad40eab9bb1c8ff566693
-
SHA256
17ae5a05fd1fe648ddd767e9d03ff5f3e085169c79bca6bec5991746e4734f95
-
SHA512
7cec2553e73a3914886f6ca4fbca0f7fb91598963710000483b6bcac7d1823979b525a85582831587ac28ee887b04573a18a92e690d74e6d6fedb706ce416711
-
SSDEEP
6144:O443XR4S38CWBeBxi66thkbAzLks1YarGR8ej4rC5Jj:2MLMBIz+YLks1YarGR8PWj
Malware Config
Extracted
cobaltstrike
0
-
watermark
0
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3192 wrote to memory of 2440 3192 rundll32.exe rundll32.exe PID 3192 wrote to memory of 2440 3192 rundll32.exe rundll32.exe PID 3192 wrote to memory of 2440 3192 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2023-08-23_9865fe282de45bd96d0eff05e080f5c3_cobalt-strike_cobaltstrike_JC.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2023-08-23_9865fe282de45bd96d0eff05e080f5c3_cobalt-strike_cobaltstrike_JC.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2440-0-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB