Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2023 01:46

General

  • Target

    e6a7c218fb8c7e1e323b2423e39bcf70d529edd87abdb5da5f6a03e36b99e39e.exe

  • Size

    38KB

  • MD5

    413d23c00c5ba3555027d7d2628c35c3

  • SHA1

    962c05cddae5e28042278b894f6ecc1e61925832

  • SHA256

    e6a7c218fb8c7e1e323b2423e39bcf70d529edd87abdb5da5f6a03e36b99e39e

  • SHA512

    4bf62a65c07c930bc71510b0ee404970e3e93dfee2331ab97bafae9635dc3230480b6546f68107705753d60b337103917d747992d4c6319696b72917f2e44ff7

  • SSDEEP

    768:oFS/ebH9OhqvZ449GL1MdS4o8BWPKbKqBtQNCgHJ5:oFma9eaZHwmS4oqi8QV

Malware Config

Extracted

Family

cobaltstrike

C2

http://image-sangfoross.b4a.run:443/jquery-3.3.2.slim.min.js

Attributes
  • user_agent

    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Referer: http://code.jquery.com/ Accept-Encoding: gzip, deflate User-Agent: Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36ghtt Host: image-sangfoross.b4a.run

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Blocklisted process makes network request 40 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6a7c218fb8c7e1e323b2423e39bcf70d529edd87abdb5da5f6a03e36b99e39e.exe
    "C:\Users\Admin\AppData\Local\Temp\e6a7c218fb8c7e1e323b2423e39bcf70d529edd87abdb5da5f6a03e36b99e39e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1104
    • \??\c:\windows\system32\rundll32.exe
      c:\windows\system32\rundll32.exe
      2⤵
      • Blocklisted process makes network request
      PID:3008
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://www.google.com/chrome/update/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1504
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1504 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2752

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    d8b84b1c7ef6ae1d29cb0810ed34347b

    SHA1

    d8ec4794f2bed0c9b0b59790a8092ff1a8ecb62c

    SHA256

    186193bb93fc1527585f417dd2dbd241b60f05ac209e43b8130d94d80c33b06b

    SHA512

    1e73296ae9800f30eacce324a38fa52846e1a5eefc0e32869f272c33cac759f94d278f34565f6b4b48106d0d90d8adfa87cfbbbefeeba074e212a727074e5e6d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    9168a9a74722754e508db717bd58ae6b

    SHA1

    180aa833d3b348df31ee4f2d326bb84b936219ec

    SHA256

    b802b840315e6cc1b1664ffda8e84ef17bccb49bfb49fae6658e43dba8c7ae0e

    SHA512

    59defcc65a72aa14c924c341d024f59722cb16cc05b948a40033ee39613667f3343efda58ffaae940511a3c8dc1cd22bdb8965400fafeb40742d6c4bbf769293

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    75c16eceb0e34c308527a774c7a6a9b1

    SHA1

    5ab1225648f634dbb0b837c8542719e71a703af0

    SHA256

    5b85fe3058425a3e1ec3f298a6962216ccb61c0a2d2894da926ad4a1f7524019

    SHA512

    dc9fda3cb057ed81993a4405aae3622d24cd15dd9efce9f0297203a66d6b33e3dfcd31db01fb1611e389c77f7176d840ffcdd68d7e94e1a775f54fee3bc7c667

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    29f96038a6de9394b46175b0dc852af4

    SHA1

    2b94b0f32e7216b65907d7b7cc9139177ada7766

    SHA256

    1ce347a8bd83ba254ffab2cac56e8832540603ef7afa12af72c9ad03deb99735

    SHA512

    a87dcf6b40bbef19ef173be4fe6f55f28cdb9ea3ac541212069de7ec8bff696e041d8bb192303f87174caf94ce4070dead7107bcf1da4b5dcb0cb2c8c270c390

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    0960085a80f1ef653d18c69fa0775e29

    SHA1

    fa4ed062adc1668bcb74e832811ecb996b513146

    SHA256

    cf5a29129995e926031ce216860ee3a7ef13ad1a3a5c704303fea99cd8c59b08

    SHA512

    f17e9b8a920daf2970f614b45882245c3b694d16c762507d79171225afb794c98597a44d2b77b81f12ed728e0e7af7529c760d938be04930492dbe2e162bc760

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    16a211676eec78bc1c06270dcb37dcf4

    SHA1

    ef23c6d2162ebb83bd615db4eced73233b3ae3be

    SHA256

    9230f18c90da9c0d57087a5d13d7105ac1e44456c574d534731a64891efaad6f

    SHA512

    e5c119224d8306b6cbd75ac62bfe8e69af674444f0f65892009fd61f1ee5b4ff885bdccf6ecca47c7774b0e7c33657cf527ac7da4a4b1deb422db3842b6c9b0f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    77002bc2f851caa0dcc7e29e6d3726f4

    SHA1

    b79f003aa475cca31f47b0f516891cd5052be0c6

    SHA256

    2c132040ea7ec70c305f4dd4c42c64aa96920b22ed5b59f030257382b9bdb313

    SHA512

    8247803cf74d0b7f0927a3af9d0f5fe8b59a48262067a349143861737a2ceb5a95c75a234ce22d2100fc78eb536cb6a25d178530408e0d048559ab3463a0ebd7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    d80154e6257ec83ad43f7380ab981ae7

    SHA1

    44e95a64d839098dc46fae2efc9e28ee932a7c7c

    SHA256

    6d1cda20b88d4ecfbb279051a355957b8a0ce0fcc5b4ad13b09ba08ba32c0a9f

    SHA512

    ed3971457790524a0c368dfa71efd167c028a59532b7bc36446989466019e2bf6dfd8689a009e4dd6da1ffd9d85f969875deba6e2886c02d2c982f943c42f19c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    6078dc02518601a792f542f344b24859

    SHA1

    bc66df478e4164624ff7a741e20e365274a17195

    SHA256

    f78ffd3f4caf6b0f9769b532c0843d971cee944e2ef3d250c073e3b8d1fd70fd

    SHA512

    4bc10c8efc1db39bf8e8fb9f84cfde51e9ec06ff5f9bc3c6bd6167e438a4d3424ecb37e20345778cb687bfb07cbc912312e5bdbf154003fcd51e711fd2a65541

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    861c676393799c02a56a670353cb5e5c

    SHA1

    34838215cbd23faf634f05f9bbd382b5bc883d28

    SHA256

    9d34c841ca56183b670abdc7175cd17b5b2fe71dbcf359a9d8000ccb53869ec9

    SHA512

    4034b4362541e904e86fbdd23af3b09d924f6b84323ff181324b413e998ff97200aae1fea94a3f8fa0b6b764316d42082a028827d2c552d4a23e0b66018ec9c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    026d70d40233cb8ecb26182f78542206

    SHA1

    45b66a66f14162baba32edbd79d2a6393968cec4

    SHA256

    2ca7ae86569f2d37c1852ddf600cb4d1bdcf2481d26e6c2aa97ce631bbc5d71a

    SHA512

    2174385b22b01253ba0f034b6b47dafa4ea1abfe20406f49375abd5a03f3718216dd781ca1ed5f39e38d2d63358f351ec3ef68d35552eca93534bf409495e18e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    f5cf24ebcdae15d29786660835f92d8e

    SHA1

    4fba11187eab085ce8d24b9508452e08c2f08370

    SHA256

    4b5aa84ad1ba72819648ef19b770f4c9599e1ff3a73d3537e8fe8c288c2767bd

    SHA512

    791810ed02d590c1ef2a3d11449ff5ba228cb2ebb5b630bb6ea99f652ecf1220462d6a44fc448b7c243efc0a828fe124af0609c249b41edcf658f214528be220

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a73ed9571cdd664b314625873f807c7e

    SHA1

    815b475c0ad613cecab265add264809b7ad9937b

    SHA256

    ac9bcb1a6c49abeece39f500b713060d6d47088702199510094b2754665e73dc

    SHA512

    ef13461035134c48bf0812a9a7634814ac048fe4776126a474f63dbea8836b043daada3882c21d8d106120b138ed65b6107b4764f88ca9dcd5946cf0598d4706

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    7535f1633093635d1517de4d76f5c7b1

    SHA1

    7e842cb4adb225e9f0ee2c8709b5e9f789e0cf88

    SHA256

    1a1174809d98358c8769686269da2616aeca895d0151d805c7cc058d8f2eb7ed

    SHA512

    5e01411a83952305f34a177ff43fea084f4f4bd379b86a9fb83c4cfd5094a933e328afb2dfdc1ee698435a7a4d77fdc547eda0579200a46d2a49a15eb89abd61

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    83b9947473dcbe278b15aa6e53bfb81a

    SHA1

    b2f71e7d7968178c0c61dbaba18c4a7e056f2e80

    SHA256

    60a5e8fda4df5b80cc3b604c321181f7916fbe201d5672b50c70e77c3e71be3b

    SHA512

    55504185eb8b738d5405a988beda5b04b1388b77c80a6b569fe18803f48d412af8fa48f9142fcc3edbf59b7bcb7b9e742c813c3bba66d6f86753e9ec46f9a2dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    d4c2f7154d36d3d2cb01a0c0e3433c4f

    SHA1

    84179db7deaa73acfc78c40a82a52825c030eba3

    SHA256

    e18990998fff9ea96389c585bf2a7815400434f87fc0dfdbd14ae3042b80d86e

    SHA512

    c988cbb71c6374ddb4f84e3ec6a7e005466726f3ec22840ab8503768bffb97c42d45a9e6bfb263e10bae2f44a5f7cd0dec4bd4298cf064a9cbaf5c8d9d7c2024

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    796582471aad37b999fecff044b35fdb

    SHA1

    64b8ef7134a8fa64f0026444247f81fff44a7c3b

    SHA256

    c86837e356d6cfdd9ef0d3c94934f22de02fdefb673af14151a4a31ca9a53e13

    SHA512

    a9de67d0798286450bcbd734cb7217bb97ab8a480cf2d02e12a141aa753f21f28e36dd4e081fbda922692bf638d238504a9eb635185009ca1ae16353d0bc0f15

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    02b6a7fb984b8a025c4deda373adac05

    SHA1

    5918caa000aacfe62f4c9446d2b709cbd9dbc04c

    SHA256

    28ee84c8e1042192eddf8722d4af909acfd0460087ab3059f96931c646f30349

    SHA512

    797d3bd0d24d7f9d03d76ab484d2bf27ae091eab21536d54c578a829ac9a60e24dbd29ebbfbd1700b1ed3cd826ecace0495dc81f8e1921cadfb06fa6c860b302

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    3c3e409c2f2ccd6d74a6b06e56922ede

    SHA1

    edbe93e42a0a09bf6dbb63d2cebe70b1183687ce

    SHA256

    b1a935bb687e0ae63a826aab71329e6597b01180ff0830411505df844185eadd

    SHA512

    01b001c57908734025027bfa43fdea6e31eedc9c26e735282f067711c7111c4609c51fc6860a58a0790ab1573ae4fb4bbce34730b855eb9354de445e546dc178

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    aa9eb877d2d927050acd450d9266999a

    SHA1

    67441c5c836517bc221a8ea62431dfaa5eba449e

    SHA256

    44cf8d8f985f806d3f33c475b949a9493f8c9325d1fdbd5956e164b7c592a194

    SHA512

    3d3aed8cb85f1473c9bf47b3061db0e9fc31d5bbe71518b2c7b32426cc72065faca9214cda21d9a5063cfe4fd43d5b445da0b700fff29a3f30fb2803c17a889c

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\t83hqs9\imagestore.dat
    Filesize

    881B

    MD5

    aab85e76f9883e4f45a918b66899c8fa

    SHA1

    260851ac7490768d8c8a9cb87d9a33257ff8cc37

    SHA256

    e4a0878afeace2927df2dc82c79da6b76fb0a9dc67aebf9c8f8760b0ddf6cf68

    SHA512

    8ca7baa7d8c81ccd155406b5134473f8deba099211bc0938e9356c775115b78260e1868ae9161ba6ebf8033736b8c5d15b971b5e6e71836751e27c2c5259970a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6WEH2YLI\favicon-16x16[1].png
    Filesize

    695B

    MD5

    7fc6324199de70f7cb355c77347f0e1a

    SHA1

    d94d173f3f5140c1754c16ac29361ac1968ba8e2

    SHA256

    97d4556f7e8364fb3e0f0ccf58ab6614af002dfca4fe241095cf645a71df0949

    SHA512

    09f44601fa449b1608eb3d338b68ea9fd5540f66ea4f3f21534e9a757355a6133ae8fb9b4544f943ca5c504e45a3431bf3f3d24de2302d0439d8a13a0f2d544f

  • C:\Users\Admin\AppData\Local\Temp\Cab5B7A.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar5B7B.tmp
    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/3008-2-0x0000000000060000-0x0000000000061000-memory.dmp
    Filesize

    4KB

  • memory/3008-0-0x0000000000060000-0x0000000000061000-memory.dmp
    Filesize

    4KB