Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 10:53
Static task
static1
Behavioral task
behavioral1
Sample
fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe
Resource
win10v2004-20240426-en
General
-
Target
fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe
-
Size
1.7MB
-
MD5
57db7f1815015a7f7a266f3fde48f395
-
SHA1
4d563b7afef70df4a8a65e68e830494ffd51f149
-
SHA256
fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b
-
SHA512
81b7faf51ceca0a577f43fe51791e1f12c49bf5c8a8e073344429ea9df1d013aab32b9d73070ab866a359420878757169aa523f35902c265fed76dc5ae95c8b5
-
SSDEEP
49152:FfkflZUokpXob39cid+mSuHf81ocITFeNr:Ff0l3AXq33d+vuHf81BN
Malware Config
Extracted
cobaltstrike
http://121.196.245.40:80/D5nv
-
user_agent
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe 2320 fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe"C:\Users\Admin\AppData\Local\Temp\fd3f48be97abe0e504038fd143d248991bb8c3559b74aaf7ca7eb5ec465c628b.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
PID:2320