Static task
static1
Behavioral task
behavioral1
Sample
2024091144c36bc55af58eb506d1760ab608402bcobaltstrikehellokitty.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024091144c36bc55af58eb506d1760ab608402bcobaltstrikehellokitty.exe
Resource
win10v2004-20240802-en
General
-
Target
2024091144c36bc55af58eb506d1760ab608402bcobaltstrikehellokitty
-
Size
462KB
-
MD5
44c36bc55af58eb506d1760ab608402b
-
SHA1
f2e35260e8aefd4a8222602001b387fc901b29a1
-
SHA256
7bdb0be5e4c376bbb3533b8872f3ba72b7876ef261b94f6799010f55160d8adb
-
SHA512
3cf43c51ec0de31548be9b905c7cfa1d10f39644cfa73429abe99162654f124079a2291d06d95e70f3df8d56cbcaf947cda9522221f14999d53d41ace64cc3b3
-
SSDEEP
1536:bKcrl2hD/7NDeLLdl7XVcExynCaBl0BR7GtlqJN122fIRQGjDIn6LC1kUXsWgncb:0SLaXC+lIma1fz6LGkUSWsMH3Eq1x4m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024091144c36bc55af58eb506d1760ab608402bcobaltstrikehellokitty
Files
-
2024091144c36bc55af58eb506d1760ab608402bcobaltstrikehellokitty.exe windows:5 windows x86 arch:x86
593b61df0f3b8d68fe1726159597097d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
GetCommandLineW
FindNextFileW
GetCurrentProcess
lstrlenW
WriteFile
InterlockedDecrement
WaitForMultipleObjects
LeaveCriticalSection
InitializeCriticalSection
SetErrorMode
GetQueuedCompletionStatus
FindClose
CreateFileW
ResumeThread
lstrcatA
GetModuleHandleA
PostQueuedCompletionStatus
SetFileAttributesW
Sleep
GetLastError
InterlockedExchangeAdd
CloseHandle
HeapFree
LoadLibraryW
CreateThread
HeapAlloc
GetProcAddress
LocalFree
DeleteCriticalSection
ExitProcess
GetProcessHeap
SystemTimeToFileTime
InterlockedIncrement
GetSystemTime
lstrcmpiW
CreateIoCompletionPort
GetTickCount
lstrcmpW
MoveFileW
GetDriveTypeW
QueryPerformanceCounter
HeapReAlloc
HeapSize
WriteConsoleW
GetFileSizeEx
FindFirstFileW
CancelIo
GetLogicalDrives
GetSystemInfo
ReadFile
FlushFileBuffers
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
DecodePointer
FindNextFileA
FindFirstFileExA
GetConsoleCP
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
TerminateProcess
RtlUnwind
RaiseException
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
EncodePointer
GetModuleHandleExW
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
GetStdHandle
GetACP
SetFilePointerEx
GetConsoleMode
GetFileType
LCMapStringW
user32
CharLowerW
wsprintfW
advapi32
CryptGenRandom
CryptReleaseContext
OpenProcessToken
SetThreadToken
GetTokenInformation
CryptAcquireContextW
shell32
SHEmptyRecycleBinA
CommandLineToArgvW
ole32
CoCreateInstance
CoSetProxyBlanket
CoInitialize
oleaut32
VariantClear
SysAllocString
VariantInit
SysFreeString
shlwapi
StrStrW
wnsprintfA
mpr
WNetEnumResourceW
WNetCloseEnum
WNetOpenEnumW
Sections
.text Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.shell Size: 320KB - Virtual size: 320KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ