Analysis
-
max time kernel
143s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2023 19:44
Behavioral task
behavioral1
Sample
2023-08-23_b98f1c3ea99ae80025bff40ea3e97998_cobalt-strike_cobaltstrike_meterpreter_JC.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-23_b98f1c3ea99ae80025bff40ea3e97998_cobalt-strike_cobaltstrike_meterpreter_JC.dll
Resource
win10v2004-20230831-en
General
-
Target
2023-08-23_b98f1c3ea99ae80025bff40ea3e97998_cobalt-strike_cobaltstrike_meterpreter_JC.dll
-
Size
203KB
-
MD5
b98f1c3ea99ae80025bff40ea3e97998
-
SHA1
7940feaa602f82dde5fe2bbbeccf7bc66c9ef090
-
SHA256
3bee59e5cd394fb76382fa533f51d77fbaf3e2f93f4581466f682b1c047edf9c
-
SHA512
83d035fb2d7444818f22c0a6a79ab9bf2ef63d4d21fe36feebf76c735390b8a12b458db003084d3c7db52480011c10dbfa2965ab7d7cd5847a853b77bff4ab4a
-
SSDEEP
3072:PYaW8qUEflaASmkDs1oo8CUS5D+u73vqQ+z+F62hAxquMfgj5jdUT519:PFHEfoAaDQoo8CUwxTvhU+F66fgVj
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{92175CE9-04AB-4764-9DB1-CDA4418A792E}.catalogItem svchost.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4736 5020 WerFault.exe rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3908 wrote to memory of 5020 3908 rundll32.exe rundll32.exe PID 3908 wrote to memory of 5020 3908 rundll32.exe rundll32.exe PID 3908 wrote to memory of 5020 3908 rundll32.exe rundll32.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2023-08-23_b98f1c3ea99ae80025bff40ea3e97998_cobalt-strike_cobaltstrike_meterpreter_JC.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2023-08-23_b98f1c3ea99ae80025bff40ea3e97998_cobalt-strike_cobaltstrike_meterpreter_JC.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 6403⤵
- Program crash
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 5020 -ip 50201⤵