Behavioral task
behavioral1
Sample
a0743e616cf310724b8175aa27e7e22d.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a0743e616cf310724b8175aa27e7e22d.exe
Resource
win10v2004-20240221-en
General
-
Target
a0743e616cf310724b8175aa27e7e22d
-
Size
317KB
-
MD5
a0743e616cf310724b8175aa27e7e22d
-
SHA1
d54e0e53517716d725f5675223ae1dd4c6723b66
-
SHA256
71f73949614c5e15f2682cf1dbd21688f19e5ba52bc0ed93909eb5346d12652a
-
SHA512
b2b08116daf0ff45e312dcc0dcd134937f32907ce652985dd5bc3e3d284bd924a73e16ef624163f550bed48790ac137250f1948435c28f528bf3071f6d79cc40
-
SSDEEP
6144:7JwpYVNcn3pTdNe+WXVi1SB4R7zH2mTK/fN2H5021:7G6cniFiSB4t3K3qd
Malware Config
Extracted
cobaltstrike
305419896
http://192.168.43.189:80/ucD
-
access_type
512
-
host
192.168.43.189,/ucD
-
http_header1
AAAACgAAABdDYWNoZS1Db250cm9sOiBuby1jYWNoZQAAAAoAAAAWQ29ubmVjdGlvbjogS2VlcC1BbGl2ZQAAAAoAAAAQUHJhZ21hOiBuby1jYWNoZQAAAAcAAAAAAAAADQAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAABdDYWNoZS1Db250cm9sOiBuby1jYWNoZQAAAAoAAAAWQ29ubmVjdGlvbjogS2VlcC1BbGl2ZQAAAAoAAAAQUHJhZ21hOiBuby1jYWNoZQAAAAcAAAAAAAAADQAAAAEAAABsVU1KakFpTlVVdHZOd3cwbEJqOXR6V2Vnd3BodUluNmhOUDllZUlEZk9yY0hKM25vellGUFQtSmw3V3NtYm1qWm5RWFVlc29Ka2NKa3BkWUVkcWdRRkU2UVpnaldWc0xTU0RvbkwyOERZRFZKAAAADAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
polling_time
1000
-
port_number
80
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCFmBMBEy36k4luvY2SO97E+bxgA1A5GYjk2mhMQPzoQ2oQ9cu4A3nne00/RaKPT1pulvwqKi8HYz1vS4J2eC7EsMVuPhkwYr6zn/fPS49oTc9onKqB2dBi8u6p+2LPrZQBjQIX9A1sw49jrzCcZgGT8yCXSq9zRlS0/PE4bVMvzQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/ucW
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:90.0) like Gecko
-
watermark
305419896
Signatures
-
Cobaltstrike family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a0743e616cf310724b8175aa27e7e22d
Files
-
a0743e616cf310724b8175aa27e7e22d.exe windows:4 windows x64 arch:x64
ac7b6f3efe50b8fb31418f456ab23234
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CloseHandle
CreateRemoteThread
DeleteCriticalSection
EnterCriticalSection
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
InitializeCriticalSection
LeaveCriticalSection
OpenProcess
QueryPerformanceCounter
RtlAddFunctionTable
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualAllocEx
VirtualProtect
VirtualQuery
WriteProcessMemory
msvcrt
__C_specific_handler
__getmainargs
__initenv
__iob_func
__lconv_init
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_fmode
_initterm
_onexit
abort
calloc
exit
fprintf
free
fwrite
malloc
memcpy
signal
strcmp
strlen
strncmp
system
vfprintf
psapi
EnumProcessModules
EnumProcesses
GetModuleBaseNameA
libstdc++-6
_ZNSolsEPFRSoS_E
_ZNSolsEPFRSt8ios_baseS0_E
_ZNSolsEPKv
_ZNSolsEm
_ZNSt8ios_base4InitC1Ev
_ZNSt8ios_base4InitD1Ev
_ZSt4cerr
_ZSt4cout
_ZSt4endlIcSt11char_traitsIcEERSt13basic_ostreamIT_T0_ES6_
_ZStlsISt11char_traitsIcEERSt13basic_ostreamIcT_ES5_PKc
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 256KB - Virtual size: 255KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 1024B - Virtual size: 744B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 1024B - Virtual size: 612B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
/4 Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/19 Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/31 Size: 512B - Virtual size: 329B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/45 Size: 1024B - Virtual size: 546B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/57 Size: 512B - Virtual size: 72B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/70 Size: 512B - Virtual size: 155B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ