Analysis
-
max time kernel
155s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2023, 05:39
Static task
static1
Behavioral task
behavioral1
Sample
5c2c97648c330cf042d76e67a7cc6410498777f35a6340067f308f02f064a3a0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
5c2c97648c330cf042d76e67a7cc6410498777f35a6340067f308f02f064a3a0.exe
Resource
win10v2004-20231023-en
General
-
Target
5c2c97648c330cf042d76e67a7cc6410498777f35a6340067f308f02f064a3a0.exe
-
Size
327KB
-
MD5
81326cc4a4e14796d22e0072f117726b
-
SHA1
18bd2cbcab0fa332b6097eb16efb4983dd3c4322
-
SHA256
5c2c97648c330cf042d76e67a7cc6410498777f35a6340067f308f02f064a3a0
-
SHA512
57b70e840ec819aa9813db7878d04c36766ad2fbe078ea6d7317d548838c4b8333f9585e04382d3bbe9e2fbd82d158dffd4ce189a26a9f09ace0962d906f1bb7
-
SSDEEP
6144:jiubWrNSOetO6cprlQAOWizGLIoSdQX+tJs0/U:uubsNSOetfARQAPyGU2X+tZ/U
Malware Config
Extracted
cobaltstrike
http://111.229.75.4:80/CcnI
-
user_agent
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ESES)
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Control Panel\International\Geo\Nation 5c2c97648c330cf042d76e67a7cc6410498777f35a6340067f308f02f064a3a0.exe -
Executes dropped EXE 1 IoCs
pid Process 904 artifact.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1464 wrote to memory of 904 1464 5c2c97648c330cf042d76e67a7cc6410498777f35a6340067f308f02f064a3a0.exe 87 PID 1464 wrote to memory of 904 1464 5c2c97648c330cf042d76e67a7cc6410498777f35a6340067f308f02f064a3a0.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c2c97648c330cf042d76e67a7cc6410498777f35a6340067f308f02f064a3a0.exe"C:\Users\Admin\AppData\Local\Temp\5c2c97648c330cf042d76e67a7cc6410498777f35a6340067f308f02f064a3a0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\windows\temp\artifact.exe"C:\windows\temp\artifact.exe"2⤵
- Executes dropped EXE
PID:904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD557e379fd604ab27fc25e0e9bfa8bb99e
SHA12e1842bbca90abafed11e0fd636e8da296d4ac24
SHA2561aeb88ddb721fcd94cab7d713a1029b9c680244f8c05cd3cf7c3833a6f7dd933
SHA512fe84cd223a32817a1a1402af8de210baf82b3966226b9cfe658ec1c709827e1bf87656624b934f3d61055b1dae197025df8e626c759c299197ed31008f0b7dd6
-
Filesize
17KB
MD557e379fd604ab27fc25e0e9bfa8bb99e
SHA12e1842bbca90abafed11e0fd636e8da296d4ac24
SHA2561aeb88ddb721fcd94cab7d713a1029b9c680244f8c05cd3cf7c3833a6f7dd933
SHA512fe84cd223a32817a1a1402af8de210baf82b3966226b9cfe658ec1c709827e1bf87656624b934f3d61055b1dae197025df8e626c759c299197ed31008f0b7dd6
-
Filesize
17KB
MD557e379fd604ab27fc25e0e9bfa8bb99e
SHA12e1842bbca90abafed11e0fd636e8da296d4ac24
SHA2561aeb88ddb721fcd94cab7d713a1029b9c680244f8c05cd3cf7c3833a6f7dd933
SHA512fe84cd223a32817a1a1402af8de210baf82b3966226b9cfe658ec1c709827e1bf87656624b934f3d61055b1dae197025df8e626c759c299197ed31008f0b7dd6