Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
26-10-2023 13:05
Behavioral task
behavioral1
Sample
a501f0e3846eac845a82efc6b084ee0bc118f385d4a9f89e60b618290cb9f439.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
a501f0e3846eac845a82efc6b084ee0bc118f385d4a9f89e60b618290cb9f439.exe
Resource
win10v2004-20231025-en
General
-
Target
a501f0e3846eac845a82efc6b084ee0bc118f385d4a9f89e60b618290cb9f439.exe
-
Size
931KB
-
MD5
cfc57322bbf583daa8ca4b6394ef3d76
-
SHA1
605fbb32829efb51bafcad74bf0ef4e425003795
-
SHA256
a501f0e3846eac845a82efc6b084ee0bc118f385d4a9f89e60b618290cb9f439
-
SHA512
c4de73f6262824e6c0ad20a277918260696c765c0c23a2305f7e88b58a7d18e02508617615eb19593b98c59d631c969b200de19c55019f6d412f5025eb6e4c81
-
SSDEEP
24576:yyg9aJWprJRqy0wdd6DKRXpka5aPfaM9TN/uYh:yTOUrTqyLdMDgZkaM6M9ZGW
Malware Config
Extracted
cobaltstrike
100000
http://www.cainiao.com:443/mp/getapp/msgext
-
access_type
512
-
beacon_type
2048
-
host
www.cainiao.com,/mp/getapp/msgext
-
http_header1
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
-
http_header2
AAAAEAAAABZIb3N0OiBuZXdhcGkud2VpYm8uY29tAAAACgAAAI9BY2NlcHQ6IHRleHQvaHRtbCxhcHBsaWNhdGlvbi94aHRtbCt4bWwsYXBwbGljYXRpb24veG1sO3E9MC45LGltYWdlL2F2aWYsaW1hZ2Uvd2VicCxpbWFnZS9hcG5nLCovKjtxPTAuOCxhcHBsaWNhdGlvbi9zaWduZWQtZXhjaGFuZ2U7dj1iMztxPTAuOQAAAAoAAAAfQWNjZXB0LUxhbmd1YWdlOiB6aC1DTix6aDtxPTAuOQAAAAoAAAAeQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlAAAACgAAAC9Db250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL3gtd3d3LWZvcm0tdXJsZW5jb2RlZAAAAAoAAAAhUmVmZXJlcjogaHR0cDovL21wLndlaXhpbi5xcS5jb20vAAAABwAAAAAAAAADAAAAAgAAAAVNWU16egAAAAYAAAAMWC1XZWNoYXQtVWluAAAABwAAAAEAAAADAAAAAgAAAAhNTWRhdGE9QQAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
jitter
9472
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCD/d86l8Xj9QqEpe62poRSoK8dNn6QFRLe10WufYGHU07TppYiU2koxHDn0ar2iA3kXdUohoBEX00MfKc0AkAi0q7NX7Zl8/L8iLBRsqVKDgCJAm0OoooZAfiJsgoxSly3jYSJyeTtXzPweo4BsNCXGBZrsuIuHpcVe1v+OAMdzQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
1.532302592e+09
-
unknown2
AAAABAAAAAIAAAADAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/mp/wapcommon/report
-
user_agent
WeChat/8.0.5.32 CFNetwork/1237 Darwin/20.4.0
-
watermark
100000
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Processes:
resource yara_rule behavioral1/memory/2228-0-0x000000013FD60000-0x000000013FF86000-memory.dmp upx behavioral1/memory/2228-4-0x000000013FD60000-0x000000013FF86000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2228-0-0x000000013FD60000-0x000000013FF86000-memory.dmpFilesize
2.1MB
-
memory/2228-1-0x00000000000C0000-0x0000000000101000-memory.dmpFilesize
260KB
-
memory/2228-3-0x0000000000710000-0x0000000000B82000-memory.dmpFilesize
4.4MB
-
memory/2228-4-0x000000013FD60000-0x000000013FF86000-memory.dmpFilesize
2.1MB