Analysis
-
max time kernel
126s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 08:01
Static task
static1
Behavioral task
behavioral1
Sample
8185e6bee9f2ebc825f67e5aeb1c85651f0ee17d48cc4a4f005a306926be76b5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8185e6bee9f2ebc825f67e5aeb1c85651f0ee17d48cc4a4f005a306926be76b5.exe
Resource
win10v2004-20240802-en
General
-
Target
8185e6bee9f2ebc825f67e5aeb1c85651f0ee17d48cc4a4f005a306926be76b5.exe
-
Size
1.2MB
-
MD5
c1602b6660abaf13d627e26dc691aff3
-
SHA1
071f6f2df41957a98a880cebb375a4261aecfffb
-
SHA256
8185e6bee9f2ebc825f67e5aeb1c85651f0ee17d48cc4a4f005a306926be76b5
-
SHA512
cb30242e8757575246880a87e20f1e93e8ce9223583d82de1b499ac208f4ac4a7f8694e96090c662503f91b2a66faa3e6c32f570913d0de32c4379c0a0fd73aa
-
SSDEEP
24576:wHSBj6JBSweFQPeSan1uS0kxfes5yaGQELBU:ISBKBSweFZbf5G
Malware Config
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4924 8185e6bee9f2ebc825f67e5aeb1c85651f0ee17d48cc4a4f005a306926be76b5.exe 4924 8185e6bee9f2ebc825f67e5aeb1c85651f0ee17d48cc4a4f005a306926be76b5.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4924 wrote to memory of 3424 4924 8185e6bee9f2ebc825f67e5aeb1c85651f0ee17d48cc4a4f005a306926be76b5.exe 56 PID 4924 wrote to memory of 3424 4924 8185e6bee9f2ebc825f67e5aeb1c85651f0ee17d48cc4a4f005a306926be76b5.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\8185e6bee9f2ebc825f67e5aeb1c85651f0ee17d48cc4a4f005a306926be76b5.exe"C:\Users\Admin\AppData\Local\Temp\8185e6bee9f2ebc825f67e5aeb1c85651f0ee17d48cc4a4f005a306926be76b5.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4924
-