Overview
overview
10Static
static
31.exe
windows7-x64
101.exe
windows10-2004-x64
102.exe
windows7-x64
102.exe
windows10-2004-x64
103.exe
windows7-x64
103.exe
windows10-2004-x64
104.exe
windows7-x64
104.exe
windows10-2004-x64
15.exe
windows7-x64
105.exe
windows10-2004-x64
106.exe
windows7-x64
106.exe
windows10-2004-x64
107.exe
windows7-x64
107.exe
windows10-2004-x64
108.exe
windows7-x64
108.exe
windows10-2004-x64
10Analysis
-
max time kernel
135s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-09-2023 09:11
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral3
Sample
2.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
2.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral5
Sample
3.exe
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
3.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral7
Sample
4.exe
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
4.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral9
Sample
5.exe
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
5.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral11
Sample
6.exe
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
6.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral13
Sample
7.exe
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
7.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral15
Sample
8.exe
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
8.exe
Resource
win10v2004-20230831-en
General
-
Target
6.exe
-
Size
1.8MB
-
MD5
164d9e2f7c9678befdea0d7691a121c4
-
SHA1
0b26377b3c9f67ca0e4a9ec8126faa24a67616ff
-
SHA256
c8e6e1b5ee8bc766818d179fecf529b179d4bb488bf9cb11fea6c004fc3c2842
-
SHA512
73d21a28d0877bf2d046270e8eb9702f801baa879a30015049be833445d7f961c729e1299fa728e60cbffb0c3d4d7d6d72a81bbc7e31f3de98e99972ba9d9e6b
-
SSDEEP
24576:Q+OrBnEQvhduAxa59cRKCX8bxCF9n72v03mHsX/Ox5fR:crBLvaEn5iv0QfR
Malware Config
Extracted
cobaltstrike
100000000
http://service-bbkjcqhv-1307700818.sh.apigw.tencentcs.com:443/en_US/all.js
-
access_type
512
-
beacon_type
2048
-
host
service-bbkjcqhv-1307700818.sh.apigw.tencentcs.com,/en_US/all.js
-
http_header1
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
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQWNjZXB0LUxhbmd1YWdlOiBlbi11cwAAAAoAAAAbQWNjZXB0LUVuY29kaW5nOiB0ZXh0L3BsYWluAAAACgAAAC9Db250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL3gtd3d3LWZvcm0tdXJsdHJ5dHJ5ZAAAAAcAAAAAAAAAAwAAAAIAAAAjSlNFU1NJT049ZHNmNXNkNGY1ZTQ1ZmU0czY1ZDRmODU2ZTQAAAAGAAAABkNvb2tpZQAAAAcAAAABAAAAAwAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
jitter
7680
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCWYBRCUGvl4lXrbWXhkeLf6EP41z+Q+3ga/YbLo8ce43czRLAnA5pTxbMQJn79lCuz1g3OuyOGrukoqj+pxI6gZMNfLlI57ElYVUQQ+KoHuGuzI2rVFUkgpwHtwmQxY3viCi1SDCBe89QfiM2PU8d7aeK1loQCK4krNiaqPCXhGQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
1.481970944e+09
-
unknown2
AAAABAAAAAMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/Login.php
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36
-
watermark
100000000
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
6.exepid process 2204 6.exe 2204 6.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2204-0-0x0000000000790000-0x00000000007D1000-memory.dmpFilesize
260KB
-
memory/2204-1-0x0000000047E40000-0x0000000047E8F000-memory.dmpFilesize
316KB
-
memory/2204-2-0x0000000000790000-0x00000000007D1000-memory.dmpFilesize
260KB
-
memory/2204-3-0x0000000047E40000-0x0000000047E8F000-memory.dmpFilesize
316KB