Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17/06/2024, 08:01
Static task
static1
Behavioral task
behavioral1
Sample
663aaedc2a446353b9d44e9acb47b1f77b864f1d303fd81a884ea13ba77bd2ec.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
663aaedc2a446353b9d44e9acb47b1f77b864f1d303fd81a884ea13ba77bd2ec.exe
Resource
win10v2004-20240508-en
General
-
Target
663aaedc2a446353b9d44e9acb47b1f77b864f1d303fd81a884ea13ba77bd2ec.exe
-
Size
2.5MB
-
MD5
ec32ce29d31a797a82cfbeff8040e86e
-
SHA1
61040c0e08b8870bf0d558e1e051d2fc85284321
-
SHA256
663aaedc2a446353b9d44e9acb47b1f77b864f1d303fd81a884ea13ba77bd2ec
-
SHA512
a8fc43091dd5cfd841c409262f4d59522396792e543aaf91306405b707425355227e8b2fc81d86df49fba56c6fab306b56cb32d1fea0140baa884963c133da52
-
SSDEEP
49152:TI2KnwKzdsaXvfIGd8L0z8f55rzOWYnxXNPzdd8V37fz941DMyMC4oxK8:TGn/dsYHTasWLzqnxdZE37LJybHxK8
Malware Config
Extracted
cobaltstrike
http://192.168.108.129:60001/IyHS
-
user_agent
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322; BOIE8;ENUS)
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Executes dropped EXE 2 IoCs
pid Process 2820 flashcenter.exe 2736 1.exe -
Loads dropped DLL 6 IoCs
pid Process 2236 663aaedc2a446353b9d44e9acb47b1f77b864f1d303fd81a884ea13ba77bd2ec.exe 2236 663aaedc2a446353b9d44e9acb47b1f77b864f1d303fd81a884ea13ba77bd2ec.exe 2236 663aaedc2a446353b9d44e9acb47b1f77b864f1d303fd81a884ea13ba77bd2ec.exe 2236 663aaedc2a446353b9d44e9acb47b1f77b864f1d303fd81a884ea13ba77bd2ec.exe 2236 663aaedc2a446353b9d44e9acb47b1f77b864f1d303fd81a884ea13ba77bd2ec.exe 2236 663aaedc2a446353b9d44e9acb47b1f77b864f1d303fd81a884ea13ba77bd2ec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main flashcenter.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2820 flashcenter.exe 2820 flashcenter.exe 2820 flashcenter.exe 2820 flashcenter.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2820 2236 663aaedc2a446353b9d44e9acb47b1f77b864f1d303fd81a884ea13ba77bd2ec.exe 28 PID 2236 wrote to memory of 2820 2236 663aaedc2a446353b9d44e9acb47b1f77b864f1d303fd81a884ea13ba77bd2ec.exe 28 PID 2236 wrote to memory of 2820 2236 663aaedc2a446353b9d44e9acb47b1f77b864f1d303fd81a884ea13ba77bd2ec.exe 28 PID 2236 wrote to memory of 2820 2236 663aaedc2a446353b9d44e9acb47b1f77b864f1d303fd81a884ea13ba77bd2ec.exe 28 PID 2236 wrote to memory of 2736 2236 663aaedc2a446353b9d44e9acb47b1f77b864f1d303fd81a884ea13ba77bd2ec.exe 29 PID 2236 wrote to memory of 2736 2236 663aaedc2a446353b9d44e9acb47b1f77b864f1d303fd81a884ea13ba77bd2ec.exe 29 PID 2236 wrote to memory of 2736 2236 663aaedc2a446353b9d44e9acb47b1f77b864f1d303fd81a884ea13ba77bd2ec.exe 29 PID 2236 wrote to memory of 2736 2236 663aaedc2a446353b9d44e9acb47b1f77b864f1d303fd81a884ea13ba77bd2ec.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\663aaedc2a446353b9d44e9acb47b1f77b864f1d303fd81a884ea13ba77bd2ec.exe"C:\Users\Admin\AppData\Local\Temp\663aaedc2a446353b9d44e9acb47b1f77b864f1d303fd81a884ea13ba77bd2ec.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\Temp\flashcenter.exe"C:\Windows\Temp\flashcenter.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
-
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"2⤵
- Executes dropped EXE
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5b64c616a78bbef1050766ce8f0168c6d
SHA17247219b42bcf142b66a38edacb2c8e9c7b3222d
SHA256294a9d2c2527572a30741c9af3c073442a3fc29ee58c548faee86a16fd36467c
SHA5120713208cf03aa266c52e85725ca80a9da90ed5aa4be4b524fb8e3d32b71f61ffb2ab7a42f9064a8baeb9564c8a0be8855fc765aa97d0e2208eda607f71f8cf22
-
Filesize
2.2MB
MD54a0b3b022f0ec45801848dba53397e0a
SHA18cb047a9e0966e760e6768e46caf1981fe8d9b9f
SHA25630e5cdddfd883d8188b55066941df471b5d2247a1077419f10190da5a91d0c5e
SHA5129d67ceff74c981cdad46e81fbd526530b7f69003e5bf3369edc52a6ddb2272397c8b27d4d3e650efcfcf49a6b4525fd4ca9015ba26970d72ce77460dd2ba33f2