Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-04-2024 01:13

General

  • Target

    ac8a5271c09dbfb1a486487743c6cec1a4c81ef56bf5e05d88b7d4b4d2e31482.ps1

  • Size

    3KB

  • MD5

    3372576f21e7cd0d4a5e4e7dd211dba0

  • SHA1

    3029d955dc5f030dde174e7bd8c1a86cb62b0bd9

  • SHA256

    ac8a5271c09dbfb1a486487743c6cec1a4c81ef56bf5e05d88b7d4b4d2e31482

  • SHA512

    3a3eebcf5a8b2d3445d32772102f68c835ca0937a910ddde02195ae70314a489419ad529f77d011c033fc083063d7b707e2d6528cc56acae6e85b9d106d6f30e

Malware Config

Extracted

Family

cobaltstrike

C2

http://www.stylejason.com:2096/3bbf

Attributes
  • user_agent

    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727)

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Blocklisted process makes network request 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\ac8a5271c09dbfb1a486487743c6cec1a4c81ef56bf5e05d88b7d4b4d2e31482.ps1
    1⤵
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2408

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2408-5-0x000007FEF4CB0000-0x000007FEF564D000-memory.dmp
    Filesize

    9.6MB

  • memory/2408-4-0x000000001B5C0000-0x000000001B8A2000-memory.dmp
    Filesize

    2.9MB

  • memory/2408-7-0x0000000002970000-0x00000000029F0000-memory.dmp
    Filesize

    512KB

  • memory/2408-8-0x000007FEF4CB0000-0x000007FEF564D000-memory.dmp
    Filesize

    9.6MB

  • memory/2408-6-0x00000000028E0000-0x00000000028E8000-memory.dmp
    Filesize

    32KB

  • memory/2408-9-0x0000000002970000-0x00000000029F0000-memory.dmp
    Filesize

    512KB

  • memory/2408-10-0x0000000002970000-0x00000000029F0000-memory.dmp
    Filesize

    512KB

  • memory/2408-11-0x000000001BBE0000-0x000000001BBE1000-memory.dmp
    Filesize

    4KB

  • memory/2408-13-0x000007FEF4CB0000-0x000007FEF564D000-memory.dmp
    Filesize

    9.6MB

  • memory/2408-12-0x000000001D210000-0x000000001D610000-memory.dmp
    Filesize

    4.0MB