C:\Users\Administrator\Downloads\CS-Bypass\CS-Bypass\Aes加解密\Debug\Project1.pdb
Behavioral task
behavioral1
Sample
272eb8156a15ada59b8b067c5b902d3943ca7d6920d3b3367b9ca0df1e237664.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
272eb8156a15ada59b8b067c5b902d3943ca7d6920d3b3367b9ca0df1e237664.exe
Resource
win10v2004-20240802-en
General
-
Target
272eb8156a15ada59b8b067c5b902d3943ca7d6920d3b3367b9ca0df1e237664
-
Size
51KB
-
MD5
396b0d6eb8c084b498c47837c8b34bb6
-
SHA1
ccc014348c36e2d21b766c0ef6ec1f7482bbddc1
-
SHA256
272eb8156a15ada59b8b067c5b902d3943ca7d6920d3b3367b9ca0df1e237664
-
SHA512
da0dd9579da5b98b00e2f5c5b1de7cfabdea9e7f2f6ee78111955eec2ef1a9374359071b2b5bd6c879af37fc7d169955279706deccf05fcd431dce4d971fed7c
-
SSDEEP
768:074wdD0GZfz2tto0wn54wVz7hJYSxDDo:0FaGZfzUS0S54Az7hJYy
Malware Config
Extracted
cobaltstrike
http://38.60.249.64:443/jquery-3.3.2.slim.min.js
-
user_agent
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Referer: http://code.jquery.com/ Accept-Encoding: gzip, deflate User-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko
Signatures
-
Cobaltstrike family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 272eb8156a15ada59b8b067c5b902d3943ca7d6920d3b3367b9ca0df1e237664
Files
-
272eb8156a15ada59b8b067c5b902d3943ca7d6920d3b3367b9ca0df1e237664.exe windows:6 windows x86 arch:x86
0710381d6ac479a9758a3d8442b0eb1a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
vcruntime140d
__vcrt_GetModuleHandleW
__vcrt_GetModuleFileNameW
_except_handler4_common
__current_exception_context
__current_exception
__std_type_info_destroy_list
memcpy
__vcrt_LoadLibraryExW
memset
ucrtbased
_set_new_mode
__p__commode
strcpy_s
_register_thread_local_exe_atexit_callback
__stdio_common_vsprintf_s
_seh_filter_dll
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
_crt_at_quick_exit
_controlfp_s
terminate
_wmakepath_s
_wsplitpath_s
wcscpy_s
_configthreadlocale
_c_exit
_cexit
__p___argv
__p___argc
_set_fmode
_exit
exit
_initterm_e
_initterm
_get_initial_narrow_environment
_initialize_narrow_environment
_configure_narrow_argv
__setusermatherr
_set_app_type
_seh_filter_exe
_CrtDbgReportW
_CrtDbgReport
malloc
free
__stdio_common_vfprintf
puts
__acrt_iob_func
strcat_s
kernel32
GetModuleHandleW
IsDebuggerPresent
RaiseException
MultiByteToWideChar
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetProcAddress
FreeLibrary
VirtualQuery
GetProcessHeap
HeapFree
HeapAlloc
GetLastError
GetCurrentThreadId
GetStartupInfoW
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.msvcjmc Size: 512B - Virtual size: 468B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 270B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ