Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 10:04
Static task
static1
Behavioral task
behavioral1
Sample
ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308.exe
Resource
win10v2004-20240802-en
General
-
Target
ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308.exe
-
Size
24KB
-
MD5
e21f3ef3f5c69eb62c15ef87528dbb0d
-
SHA1
5e7be9b8ab4f154afdca2729cbe6eb9c4b6a4a70
-
SHA256
ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308
-
SHA512
c8dddff5ab2f6237177cba4bb50f2ecfe8fd56a5f9b364091385e2a70369cefe1952a5008c55c805a475dcc3621b31a24a282671a01a5e0989a1d7f81fb33cc5
-
SSDEEP
384:V2jsjFZ+57ZIJe8OTQAdbtBCEWi4GkBLOubTLNCtnG2Be9iqWPosoWZ7:yIj6gOlbBNlFkBLPT+Rwsz
Malware Config
Extracted
cobaltstrike
http://39.99.234.112:2003/cMt9
-
user_agent
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308.exe File opened (read-only) \??\I: ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308.exe File opened (read-only) \??\L: ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308.exe File opened (read-only) \??\P: ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308.exe File opened (read-only) \??\V: ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308.exe File opened (read-only) \??\W: ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308.exe File opened (read-only) \??\A: ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308.exe File opened (read-only) \??\B: ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308.exe File opened (read-only) \??\O: ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308.exe File opened (read-only) \??\G: ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308.exe File opened (read-only) \??\M: ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308.exe File opened (read-only) \??\Q: ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308.exe File opened (read-only) \??\R: ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308.exe File opened (read-only) \??\X: ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308.exe File opened (read-only) \??\U: ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308.exe File opened (read-only) \??\Y: ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308.exe File opened (read-only) \??\E: ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308.exe File opened (read-only) \??\J: ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308.exe File opened (read-only) \??\K: ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308.exe File opened (read-only) \??\N: ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308.exe File opened (read-only) \??\S: ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308.exe File opened (read-only) \??\T: ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308.exe File opened (read-only) \??\Z: ea38c533662b353a9d473e8f59f39de0c23ff1cf3726f676feca800a0c934308.exe