Analysis
-
max time kernel
129s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 03:31
Static task
static1
Behavioral task
behavioral1
Sample
0809d9b8ecb4c722dfd6ab59c45332385e98ee8aaf62b7ef4a27405f244477a8.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0809d9b8ecb4c722dfd6ab59c45332385e98ee8aaf62b7ef4a27405f244477a8.exe
Resource
win10v2004-20240802-en
General
-
Target
0809d9b8ecb4c722dfd6ab59c45332385e98ee8aaf62b7ef4a27405f244477a8.exe
-
Size
276KB
-
MD5
e16c60977d6da4088a90282cb27d8cc6
-
SHA1
09d3870de7883e220acc73ad52daf23ac20dcaea
-
SHA256
0809d9b8ecb4c722dfd6ab59c45332385e98ee8aaf62b7ef4a27405f244477a8
-
SHA512
59c43048de42ddb5f533ac3b6965b3e9de535ea7a78570565cb99711c211407562dcc112cc9e8d054d374d803e83227a0751df57a9ca80a793afcb6ab7edae84
-
SSDEEP
3072:CDzfOxoooooooooooo00SumUgoo/jO4XxJlzb7EAs4Ge7qNAlaVjzgoogmszfOxK:CDrt0StUn4Xx7zbIAJGe7tlyasrt0SZ
Malware Config
Extracted
cobaltstrike
100000000
http://47.238.125.145:8080/jquery-3.4.8.min.js
-
access_type
512
-
host
47.238.125.145,/jquery-3.4.8.min.js
-
http_header1
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
-
http_header2
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
-
http_method1
GET
-
http_method2
POST
-
jitter
9472
-
polling_time
45000
-
port_number
8080
-
sc_process32
%windir%\syswow64\dllhost.exe
-
sc_process64
%windir%\sysnative\dllhost.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDxJlSXKDJMkhLZM2HYjSEYtrUIWdwWQREm2kxDq539atq6Ll7IxKdeRGeBgoUwLI3p2rCPA7LIRqJ6N+F1ayyk42ntrWQa46d6qGt8z9sLEU2oSVwB5Y68jj3M4Dvb1KfyqCdSsdI6b5FdALGQcxWOcxDBvxdTkF7VQJS8Pn/MSQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4.234810624e+09
-
unknown2
AAAABAAAAAEAAAXyAAAAAgAAAFQAAAACAAAPWwAAAA0AAAAPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/jquery-3.4.9.min.js
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.3
-
watermark
100000000
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0809d9b8ecb4c722dfd6ab59c45332385e98ee8aaf62b7ef4a27405f244477a8.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2536 0809d9b8ecb4c722dfd6ab59c45332385e98ee8aaf62b7ef4a27405f244477a8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0809d9b8ecb4c722dfd6ab59c45332385e98ee8aaf62b7ef4a27405f244477a8.exe"C:\Users\Admin\AppData\Local\Temp\0809d9b8ecb4c722dfd6ab59c45332385e98ee8aaf62b7ef4a27405f244477a8.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2536