Behavioral task
behavioral1
Sample
2024-02-26_715149d27a83d90e18e6629ff9393835_cobalt-strike_cobaltstrike.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-26_715149d27a83d90e18e6629ff9393835_cobalt-strike_cobaltstrike.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-26_715149d27a83d90e18e6629ff9393835_cobalt-strike_cobaltstrike
-
Size
8.3MB
-
MD5
715149d27a83d90e18e6629ff9393835
-
SHA1
55c90881a4cd68841d0d3e7804d0b4d313bdb631
-
SHA256
6e5e202975a9892f20b7312bab8f073f42cce906949cbb319575acbaf6f70b42
-
SHA512
770c74075afc1bdadd59bcd76cc103212f5b26f2ec9c23090e8fd81650d3a5e914b820e59e2e1f953994b4f3eb238ecaca581556adc94c5c3e401b9adb925c78
-
SSDEEP
98304:nemTLkNdfE0pZvH56utgpPFotBER/mQ32lUq:e+O56utgpPF8u/7q
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 1 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule sample cobalt_reflective_dll -
Cobaltstrike family
-
Detects Reflective DLL injection artifacts 1 IoCs
Processes:
resource yara_rule sample INDICATOR_SUSPICIOUS_ReflectiveLoader -
XMRig Miner payload 1 IoCs
Processes:
resource yara_rule sample xmrig -
Xmrig family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2024-02-26_715149d27a83d90e18e6629ff9393835_cobalt-strike_cobaltstrike
Files
-
2024-02-26_715149d27a83d90e18e6629ff9393835_cobalt-strike_cobaltstrike.exe windows:6 windows x64 arch:x64
35779e8082008a4313f09477bef2dc17
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
WaitForSingleObjectEx
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
ResetEvent
InitializeCriticalSectionAndSpinCount
RtlCaptureContext
CreateEventW
InitializeSListHead
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStdHandle
GetConsoleMode
SetConsoleMode
GetLastError
CreateMutexW
Sleep
CreateProcessW
MultiByteToWideChar
GetCurrentProcess
GetCurrentThread
SetThreadPriority
SetPriorityClass
GetModuleHandleW
GetProcAddress
SetThreadAffinityMask
CloseHandle
FreeConsole
GetConsoleWindow
FlushInstructionCache
VirtualAlloc
VirtualProtect
VirtualFree
GetLargePageMinimum
LocalAlloc
LocalFree
GetFileType
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
RegisterWaitForSingleObject
UnregisterWait
GetConsoleCursorInfo
CreateFileW
DuplicateHandle
PostQueuedCompletionStatus
QueueUserWorkItem
SetConsoleCursorInfo
FillConsoleOutputCharacterW
ReadConsoleInputW
CreateFileA
ReadConsoleW
WriteConsoleInputW
FillConsoleOutputAttribute
WriteConsoleW
GetNumberOfConsoleInputEvents
WideCharToMultiByte
SetConsoleCursorPosition
EnterCriticalSection
GetModuleFileNameW
LeaveCriticalSection
InitializeCriticalSection
IsDebuggerPresent
GetSystemInfo
GetCurrentDirectoryW
GetCurrentProcessId
GetSystemTimeAsFileTime
QueryPerformanceCounter
SetConsoleCtrlHandler
CancelIo
SetHandleInformation
CreateEventA
CreateIoCompletionPort
SetFileCompletionNotificationModes
SetErrorMode
GetQueuedCompletionStatus
GetQueuedCompletionStatusEx
SleepConditionVariableCS
TlsSetValue
ReleaseSemaphore
WakeConditionVariable
InitializeConditionVariable
WaitForSingleObject
ResumeThread
SetEvent
TlsAlloc
DeleteCriticalSection
CreateSemaphoreW
CreateSemaphoreA
GetLongPathNameW
ReadDirectoryChangesW
ReadFile
SetNamedPipeHandleState
SetLastError
WriteFile
CreateNamedPipeW
PeekNamedPipe
CancelSynchronousIo
GetNamedPipeHandleStateA
CancelIoEx
SwitchToThread
ConnectNamedPipe
FlushFileBuffers
TerminateProcess
UnregisterWaitEx
GetExitCodeProcess
FormatMessageA
DebugBreak
GetModuleHandleA
LoadLibraryA
GetProcessAffinityMask
SetProcessAffinityMask
GetCurrentThreadId
QueryPerformanceFrequency
advapi32
AdjustTokenPrivileges
OpenProcessToken
GetTokenInformation
LookupPrivilegeValueW
LsaClose
LsaOpenPolicy
LsaAddAccountRights
api-ms-win-crt-convert-l1-1-0
atof
strtoul
_strtoui64
mbstowcs
strtoull
strtoll
atoi
strtol
api-ms-win-crt-environment-l1-1-0
getenv
api-ms-win-crt-filesystem-l1-1-0
_unlock_file
_lock_file
_fstat64i32
_stat64i32
api-ms-win-crt-heap-l1-1-0
_set_new_mode
realloc
_aligned_malloc
malloc
free
calloc
_callnewh
_aligned_free
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-math-l1-1-0
modff
nan
_dtest
__setusermatherr
fabs
api-ms-win-crt-runtime-l1-1-0
_invalid_parameter_noinfo_noreturn
_control87
_errno
terminate
abort
_beginthreadex
_register_thread_local_exe_atexit_callback
_c_exit
_set_invalid_parameter_handler
__p___argc
_exit
_initterm_e
_initterm
_get_initial_narrow_environment
_set_app_type
_seh_filter_exe
_cexit
_crt_atexit
_register_onexit_function
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
strerror
exit
__p___argv
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vsscanf
fflush
_open
fwrite
fputs
__stdio_common_vsprintf
__acrt_iob_func
ftell
fgetc
fgets
fseek
fgetpos
fputc
__stdio_common_vfprintf
ferror
fsetpos
_fseeki64
_close
_read
setvbuf
ungetc
fread
_get_osfhandle
__p__commode
fclose
_set_fmode
fopen
__stdio_common_vswprintf
_get_stream_buffer_pointers
api-ms-win-crt-string-l1-1-0
_wcsnicmp
strlen
wcslen
strncmp
_stricmp
tolower
_strnicmp
strncpy
strcpy
strcmp
strcspn
_strdup
isspace
strspn
wcsncpy
api-ms-win-crt-time-l1-1-0
_time64
_localtime64_s
api-ms-win-crt-utility-l1-1-0
srand
rand
qsort
_rotr
msvcp140
?_Gndec@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ
?gbump@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXH@Z
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
?pbump@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXH@Z
?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
_Thrd_hardware_concurrency
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z
?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J@Z
??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ
??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ
?_Xlength_error@std@@YAXPEBD@Z
?_Xout_of_range@std@@YAXPEBD@Z
_Xtime_get_ticks
_Mtx_init_in_situ
_Mtx_destroy_in_situ
_Mtx_lock
_Mtx_unlock
?_Throw_C_error@std@@YAXH@Z
_Query_perf_counter
_Query_perf_frequency
_Thrd_join
_Thrd_id
_Cnd_do_broadcast_at_thread_exit
?_Throw_Cpp_error@std@@YAXH@Z
_Thrd_sleep
_Thrd_yield
??0_Lockit@std@@QEAA@H@Z
??1_Lockit@std@@QEAA@XZ
??Bid@locale@std@@QEAA_KXZ
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
?always_noconv@codecvt_base@std@@QEBA_NXZ
?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ
user32
ShowWindow
GetSystemMetrics
GetMessageA
MapVirtualKeyW
DispatchMessageA
TranslateMessage
vcruntime140
__std_exception_destroy
__std_exception_copy
strstr
__C_specific_handler
strchr
memchr
__std_terminate
__CxxFrameHandler3
_CxxThrowException
memset
strrchr
memcmp
memcpy
_purecall
memmove
ws2_32
WSARecvFrom
WSAIoctl
WSASend
WSASocketW
GetAddrInfoW
FreeAddrInfoW
WSARecv
Sections
.text Size: 620KB - Virtual size: 620KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_TEXT_CN Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
_TEXT_CN Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
gu_idata Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
gu_rsrcs Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ