Analysis
-
max time kernel
134s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
03-12-2023 00:18
Behavioral task
behavioral1
Sample
a1a9dfb8a4e8328b7c232ccd2f85ff97309a94ddc7c767b1f4d9e8c5ff6bce0d.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
a1a9dfb8a4e8328b7c232ccd2f85ff97309a94ddc7c767b1f4d9e8c5ff6bce0d.exe
Resource
win10v2004-20231127-en
General
-
Target
a1a9dfb8a4e8328b7c232ccd2f85ff97309a94ddc7c767b1f4d9e8c5ff6bce0d.exe
-
Size
1.0MB
-
MD5
da78b8df786bea3c9e448609ca44df43
-
SHA1
6a891781c916491de8489edbe64e8083c30c486a
-
SHA256
a1a9dfb8a4e8328b7c232ccd2f85ff97309a94ddc7c767b1f4d9e8c5ff6bce0d
-
SHA512
e3960c3f66a9bb6709cec63fe3f331f614fa7723e39dacdc2868a6612d61fc52eb2ab6516fadea1f1bf39b4a127049988822967d77cb525060fdb4f4567f8f50
-
SSDEEP
24576:4nq9UQ0kHOr3WHEk1+pzcSkXvM1KLZ8nDBCQok1SWQu1VQeDD1vw4fJ8rCOd2fjY:4ne21DRHV49
Malware Config
Extracted
cobaltstrike
100000
http://43.153.222.28:443/IE9CompatViewList.xml
-
access_type
512
-
beacon_type
2048
-
host
43.153.222.28,/IE9CompatViewList.xml
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
60000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCPwjCZRkIjRN92nugrS5l0384q/BWQnN0JKM8QSNJru7gg5JibPdKhwgWse4/vRHpd9eu0wpSN1kxhMXC0GOhRg/TRyv5q41zzWurCIOHq13S55c+J/27HYD/DBLtL+5BWbXx9lhM38OGBxcVec4FxCLotANPMB+vOv/rVa32tYQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; WOW64; Trident/5.0)
-
watermark
100000
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
a1a9dfb8a4e8328b7c232ccd2f85ff97309a94ddc7c767b1f4d9e8c5ff6bce0d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\XX64.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\\\XX64.exe\"" a1a9dfb8a4e8328b7c232ccd2f85ff97309a94ddc7c767b1f4d9e8c5ff6bce0d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a1a9dfb8a4e8328b7c232ccd2f85ff97309a94ddc7c767b1f4d9e8c5ff6bce0d.exedescription pid process Token: SeDebugPrivilege 2380 a1a9dfb8a4e8328b7c232ccd2f85ff97309a94ddc7c767b1f4d9e8c5ff6bce0d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
a1a9dfb8a4e8328b7c232ccd2f85ff97309a94ddc7c767b1f4d9e8c5ff6bce0d.exepid process 2380 a1a9dfb8a4e8328b7c232ccd2f85ff97309a94ddc7c767b1f4d9e8c5ff6bce0d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1a9dfb8a4e8328b7c232ccd2f85ff97309a94ddc7c767b1f4d9e8c5ff6bce0d.exe"C:\Users\Admin\AppData\Local\Temp\a1a9dfb8a4e8328b7c232ccd2f85ff97309a94ddc7c767b1f4d9e8c5ff6bce0d.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar5C3B.tmpFilesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
memory/2380-19-0x0000000003B50000-0x0000000003F50000-memory.dmpFilesize
4.0MB
-
memory/2380-20-0x0000000003810000-0x000000000384E000-memory.dmpFilesize
248KB
-
memory/2380-41-0x0000000003810000-0x000000000384E000-memory.dmpFilesize
248KB