Overview
overview
10Static
static
31.exe
windows7-x64
101.exe
windows10-2004-x64
102.exe
windows7-x64
102.exe
windows10-2004-x64
103.exe
windows7-x64
103.exe
windows10-2004-x64
104.exe
windows7-x64
104.exe
windows10-2004-x64
15.exe
windows7-x64
105.exe
windows10-2004-x64
106.exe
windows7-x64
106.exe
windows10-2004-x64
107.exe
windows7-x64
107.exe
windows10-2004-x64
108.exe
windows7-x64
108.exe
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-09-2023 09:11
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral3
Sample
2.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
2.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral5
Sample
3.exe
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
3.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral7
Sample
4.exe
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
4.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral9
Sample
5.exe
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
5.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral11
Sample
6.exe
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
6.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral13
Sample
7.exe
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
7.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral15
Sample
8.exe
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
8.exe
Resource
win10v2004-20230831-en
General
-
Target
5.exe
-
Size
2.6MB
-
MD5
d88af91d7c2e8a188cce2bcb6c20087f
-
SHA1
9eeb0f1e2ca7dca9711246017206b46362eb9c72
-
SHA256
86abc44ffc3132c48b15d65da129da3a946f73e48cb6a569223235e29c221c85
-
SHA512
dac3bd9b8a3adde2b594638172114eb12a10617f4a8de0b872b78e831e59ff08508cc6460c43bb06b7f6046846055891b254a55969a842232e7770e6c5c99671
-
SSDEEP
24576:E0ywQBR7lQYHduAxa59cRKCX8bxCF9n72v68GaexcxnCghaCZVoRNZJL38N/t4Z6:XMR6dEn5ivF8KhaCKnL3zi2IN
Malware Config
Extracted
cobaltstrike
100000000
http://service-bbkjcqhv-1307700818.sh.apigw.tencentcs.com:443/en_US/all.js
-
access_type
512
-
beacon_type
2048
-
host
service-bbkjcqhv-1307700818.sh.apigw.tencentcs.com,/en_US/all.js
-
http_header1
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
-
http_header2
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
-
http_method1
GET
-
http_method2
POST
-
jitter
7680
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCWYBRCUGvl4lXrbWXhkeLf6EP41z+Q+3ga/YbLo8ce43czRLAnA5pTxbMQJn79lCuz1g3OuyOGrukoqj+pxI6gZMNfLlI57ElYVUQQ+KoHuGuzI2rVFUkgpwHtwmQxY3viCi1SDCBe89QfiM2PU8d7aeK1loQCK4krNiaqPCXhGQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
1.481970944e+09
-
unknown2
AAAABAAAAAMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/Login.php
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36
-
watermark
100000000
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2960-0-0x0000000047D80000-0x0000000047DC1000-memory.dmpFilesize
260KB
-
memory/2960-1-0x0000000047E90000-0x0000000047EDF000-memory.dmpFilesize
316KB
-
memory/2960-2-0x0000000047D80000-0x0000000047DC1000-memory.dmpFilesize
260KB
-
memory/2960-3-0x0000000047E90000-0x0000000047EDF000-memory.dmpFilesize
316KB