Analysis
-
max time kernel
141s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12-01-2024 13:13
Static task
static1
Behavioral task
behavioral1
Sample
AliyunScan.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
AliyunScan.exe
Resource
win10v2004-20231222-en
General
-
Target
AliyunScan.exe
-
Size
778KB
-
MD5
7f7b9a45ca794a926be38a1b76a2ddb4
-
SHA1
28bd7770545f3c9bf90df0bce69ac66f946f20fe
-
SHA256
c1898219b1796112547649fa7c1b623fb8fdac78b17860175ddd504960de80f5
-
SHA512
ee4179826188301f2d01b006825475699ae1d8b43458c71c1fe35bdc61fd78ad37566a691eb60e5bf6194e90a1afcc87e930ed8d9b5bf4e9f31e52f51768038f
-
SSDEEP
12288:n8GHPLJOG4wUSo2aHBzEeKacGa6lM6hzlNK:nRHDoyo2aHBzTcGa6lZNlNK
Malware Config
Extracted
cobaltstrike
http://update.chrome-update.net:2083/jquery-3.3.2.slim.min.js
-
user_agent
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Referer: http://code.jquery.com/ Accept-Encoding: gzip, deflate User-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko
Extracted
cobaltstrike
100000000
http://update.chrome-update.net:2083/jquery-3.3.1.min.js
-
access_type
512
-
beacon_type
2048
-
host
update.chrome-update.net,/jquery-3.3.1.min.js
-
http_header1
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
-
http_header2
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
-
http_method1
GET
-
http_method2
POST
-
jitter
9472
-
polling_time
45000
-
port_number
2083
-
sc_process32
%windir%\syswow64\dllhost.exe
-
sc_process64
%windir%\sysnative\dllhost.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCEt+P0E8qf/s+sWVB9d+CwaDZAh4Qo04HQHubXNGyZZhGWosAdtvJmtDl2pP15wgfaWXSnAaMuhVTHWA2Hx31xAmtK0xG9PSyX4IfwiegoQAldKAjl4svdC9LbHd+qHiOcwkUpdrKggeoiDvMtpDJW0+PW28Gioyeqm4Do3PB+jwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4.234810624e+09
-
unknown2
AAAABAAAAAEAAAXyAAAAAgAAAFQAAAACAAAPWwAAAA0AAAAPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/jquery-3.3.2.min.js
-
user_agent
Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko
-
watermark
100000000
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
AliyunScan.exeAliyunScan.exedescription pid process target process PID 2908 wrote to memory of 2864 2908 AliyunScan.exe AliyunScan.exe PID 2908 wrote to memory of 2864 2908 AliyunScan.exe AliyunScan.exe PID 2908 wrote to memory of 2864 2908 AliyunScan.exe AliyunScan.exe PID 2864 wrote to memory of 2924 2864 AliyunScan.exe calc.exe PID 2864 wrote to memory of 2924 2864 AliyunScan.exe calc.exe PID 2864 wrote to memory of 2924 2864 AliyunScan.exe calc.exe PID 2864 wrote to memory of 2924 2864 AliyunScan.exe calc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AliyunScan.exe"C:\Users\Admin\AppData\Local\Temp\AliyunScan.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\AliyunScan.exeC:\Users\Admin\AppData\Local\Temp\AliyunScan.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\calc.execalc.exe3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\Tar84DE.tmpFilesize
92KB
MD571e4ce8b3a1b89f335a6936bbdafce4c
SHA16e0d450eb5f316a9924b3e58445b26bfb727001e
SHA256a5edfae1527d0c8d9fe5e7a2c5c21b671e61f9981f3bcf9e8cc9f9bb9f3b44c5
SHA512b80af88699330e1ff01e409daabdedeef350fe7d192724dfa8622afa71e132076144175f6e097f8136f1bba44c7cb30cfdd0414dbe4e0a4712b3bad7b70aeff7
-
memory/2864-2-0x000000013F2D0000-0x000000013F39E000-memory.dmpFilesize
824KB
-
memory/2908-1-0x000000013F2D0000-0x000000013F39E000-memory.dmpFilesize
824KB
-
memory/2908-19-0x000000013F2D0000-0x000000013F39E000-memory.dmpFilesize
824KB
-
memory/2924-3-0x0000000000060000-0x0000000000061000-memory.dmpFilesize
4KB
-
memory/2924-18-0x0000000003730000-0x0000000003BA2000-memory.dmpFilesize
4.4MB