Analysis
-
max time kernel
152s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 04:16
Static task
static1
Behavioral task
behavioral1
Sample
4bfebd6269d81de5d3719309a3a71d2637deb1d48fa340b6ce7b53e47bcc1a40.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4bfebd6269d81de5d3719309a3a71d2637deb1d48fa340b6ce7b53e47bcc1a40.exe
Resource
win10v2004-20240226-en
General
-
Target
4bfebd6269d81de5d3719309a3a71d2637deb1d48fa340b6ce7b53e47bcc1a40.exe
-
Size
19KB
-
MD5
47cbfb3e162e4302053a5ec5415e6eb4
-
SHA1
eba4c613122536b426c21b03abdfe96437e82637
-
SHA256
4bfebd6269d81de5d3719309a3a71d2637deb1d48fa340b6ce7b53e47bcc1a40
-
SHA512
176834b54754bc7bb0fdd92e645fe808238b154f14a1a74cbf2b893fac9116b570c872e4dd29e7f7c95e3f651c42d23dfbe9a469fb5af019db5b046d45711dc2
-
SSDEEP
192:eV7qaCF6Op1t2dobVXujRDcBaXWQjwOT/2XYEWF8qa1Dojjgi:oqaCF31cix+Dc4zjwYxFF46gi
Malware Config
Extracted
cobaltstrike
http://199.180.119.62:2333/x6hG
-
user_agent
User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; Trident/6.0; Touch)
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bfebd6269d81de5d3719309a3a71d2637deb1d48fa340b6ce7b53e47bcc1a40.exe"C:\Users\Admin\AppData\Local\Temp\4bfebd6269d81de5d3719309a3a71d2637deb1d48fa340b6ce7b53e47bcc1a40.exe"1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3756 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4544-0-0x0000000000020000-0x0000000000021000-memory.dmpFilesize
4KB
-
memory/4544-1-0x00000000035A0000-0x00000000039A0000-memory.dmpFilesize
4.0MB
-
memory/4544-2-0x00000000006C0000-0x0000000000716000-memory.dmpFilesize
344KB
-
memory/4544-3-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/4544-5-0x00000000006C0000-0x0000000000716000-memory.dmpFilesize
344KB