Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 19:00
Static task
static1
Behavioral task
behavioral1
Sample
d7b9dc73549657950f4335f3c75ea7e1784b0e798461c98577ab2c42b6a80da3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d7b9dc73549657950f4335f3c75ea7e1784b0e798461c98577ab2c42b6a80da3.exe
Resource
win10v2004-20240226-en
General
-
Target
d7b9dc73549657950f4335f3c75ea7e1784b0e798461c98577ab2c42b6a80da3.exe
-
Size
1.1MB
-
MD5
72786caa2500ffa576c37f1c19f2bec1
-
SHA1
5b32cb8a64d499432ee6a061ce12cae16a41f368
-
SHA256
d7b9dc73549657950f4335f3c75ea7e1784b0e798461c98577ab2c42b6a80da3
-
SHA512
a399d6ee67712c238e11781256dd0b60bbc451e06a75afe44f0cb02a604220372477a8be70f62c94b29c4c3d903a572065b2d64cefbb18e8ec315c35b22e6c7f
-
SSDEEP
12288:cWpWcDQ2bwSFIy2c8VWJ1Uqmm0saop/4iT9vfCFaxCg8MJ/elfIoqP9zP:cZJ2cSFIa8VWJcYSiNfMCCgNJ/yFqPBP
Malware Config
Extracted
cobaltstrike
http://code.nodesources.top:2096/jquery-3.3.2.slim.min.js
-
user_agent
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Host: code.nodesources.top Referer: http://code.jquery.com/ Accept-Encoding: gzip, deflate User-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Blocklisted process makes network request 5 IoCs
flow pid Process 4 2892 cmd.exe 6 2892 cmd.exe 7 2892 cmd.exe 8 2892 cmd.exe 9 2892 cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2892 2020 d7b9dc73549657950f4335f3c75ea7e1784b0e798461c98577ab2c42b6a80da3.exe 28 PID 2020 wrote to memory of 2892 2020 d7b9dc73549657950f4335f3c75ea7e1784b0e798461c98577ab2c42b6a80da3.exe 28 PID 2020 wrote to memory of 2892 2020 d7b9dc73549657950f4335f3c75ea7e1784b0e798461c98577ab2c42b6a80da3.exe 28 PID 2020 wrote to memory of 2892 2020 d7b9dc73549657950f4335f3c75ea7e1784b0e798461c98577ab2c42b6a80da3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7b9dc73549657950f4335f3c75ea7e1784b0e798461c98577ab2c42b6a80da3.exe"C:\Users\Admin\AppData\Local\Temp\d7b9dc73549657950f4335f3c75ea7e1784b0e798461c98577ab2c42b6a80da3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\system32\cmd.execmd.exe2⤵
- Blocklisted process makes network request
PID:2892
-