Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2023 03:05

General

  • Target

    5cd76c82ac8395876e957438f9d8031c108fd4a6dd1cc9bfff3f89fa92458bb7.exe

  • Size

    5.0MB

  • MD5

    172d39771a5de5da2edafdbe606b7f9e

  • SHA1

    05a54c9df8a0c1d37e1fee1dfa622050292c9bd6

  • SHA256

    5cd76c82ac8395876e957438f9d8031c108fd4a6dd1cc9bfff3f89fa92458bb7

  • SHA512

    1d7df275d46b8f474b1b88a7052f2f7191ff918691feaa423395f85050d90f84190656c72751309a4c420808244e2c02a083ffc8b634cbca5b8996aa237749a0

  • SSDEEP

    49152:2ggqdez8gWHucSHANS19Nfmk5fn+gj86EUAyA21iiJNqoSIxHACQpMnsQjME0tnZ:SWOCOTeU9cjjTPQevWs

Malware Config

Extracted

Family

cobaltstrike

Botnet

100000000

C2

http://dash.finashell.top:443/t0ols/jquery-3.3.1.min.js

Attributes
  • access_type

    512

  • beacon_type

    2048

  • host

    dash.finashell.top,/t0ols/jquery-3.3.1.min.js

  • http_header1

    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

  • http_header2

    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

  • http_method1

    GET

  • http_method2

    POST

  • jitter

    9472

  • polling_time

    15000

  • port_number

    443

  • sc_process32

    %windir%\syswow64\dllhost.exe

  • sc_process64

    %windir%\sysnative\dllhost.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCKBd8QRwnQuJ8gqg47TxyaqaneN+t+S/ux13PrJEBY45N/+pp6w1k/+3itTpCOM+ceWswYNyA6pUKwvv9SnmqQv4XOvwjM6zvtBMZQAazwym386rE2SEn9qRtesTf62Vi9wKbENkhPz2Ok8AsGE7Mndwf5vRnE/Nw6ruzSGVyp0wIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4.234810624e+09

  • unknown2

    AAAABAAAAAEAAAXyAAAAAgAAAFQAAAACAAAPWwAAAA0AAAAPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /t0ols/jquery-3.3.2.min.js

  • user_agent

    Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 7.0; InfoPath.3; .NET CLR 3.1.40767; Trident/6.0; en-IN)

  • watermark

    100000000

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Modifies system certificate store 2 TTPs 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5cd76c82ac8395876e957438f9d8031c108fd4a6dd1cc9bfff3f89fa92458bb7.exe
    "C:\Users\Admin\AppData\Local\Temp\5cd76c82ac8395876e957438f9d8031c108fd4a6dd1cc9bfff3f89fa92458bb7.exe"
    1⤵
    • Modifies system certificate store
    PID:1516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    32b4579eebcd1e1609f5e9034b193012

    SHA1

    4a350f2e643c35942f6fa305bc8ebd9bb029d267

    SHA256

    83151d6a6a65bef7e6abe4a681223b1ee273d066c8fb3e5a8da180d7594bc1d1

    SHA512

    f32017f0f56efac2b2c7c83bff1ec7809910f90862c76b5ac6797630a0d2615df48fcc1a1ba98d042e1422c8ffb5ab2e9cb387515c248889199db61f205aa4db

  • C:\Users\Admin\AppData\Local\Temp\CabA611.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarA691.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • memory/1516-0-0x00000000009A0000-0x0000000000A20000-memory.dmp

    Filesize

    512KB

  • memory/1516-62-0x0000000005050000-0x00000000054C2000-memory.dmp

    Filesize

    4.4MB

  • memory/1516-63-0x0000000004C50000-0x0000000005050000-memory.dmp

    Filesize

    4.0MB

  • memory/1516-82-0x000000013F4A0000-0x000000013F959000-memory.dmp

    Filesize

    4.7MB

  • memory/1516-121-0x0000000004C50000-0x0000000005050000-memory.dmp

    Filesize

    4.0MB