Analysis
-
max time kernel
134s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 20:40
Behavioral task
behavioral1
Sample
34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe
Resource
win10v2004-20240802-en
General
-
Target
34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe
-
Size
6.0MB
-
MD5
e59cea939446d6c203b80eb6487d0705
-
SHA1
c912d930360ffd2bf5ff8d79834474be94d91849
-
SHA256
34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969
-
SHA512
74dbdc05d267bdb8bcb4088d691eae0cc66f508e4f3bdd5b6b43a26e1f435f1a2a571a3f974f2332c615e342b179de6c379807580ab0fe448b8d907a58fb7c07
-
SSDEEP
98304:gl6sdECBCgVQWJuhswoYv5eOaVczo0Ahd6y0Naxxv8fqDDAx5rlcgVeRWHtw9ust:gl3/CguWJysVYvsO5oyMxxvjDDAx5rl2
Malware Config
Extracted
cobaltstrike
http://209.146.125.199:8889/jquery-3.3.2.slim.min.js
-
user_agent
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Referer: http://code.jquery.com/ Accept-Encoding: gzip, deflate User-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Loads dropped DLL 6 IoCs
pid Process 1124 34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe 1124 34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe 1124 34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe 1124 34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe 1124 34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe 1124 34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1124 set thread context of 5060 1124 34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe 89 -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4768 wrote to memory of 1124 4768 34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe 86 PID 4768 wrote to memory of 1124 4768 34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe 86 PID 1124 wrote to memory of 5060 1124 34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe 89 PID 1124 wrote to memory of 5060 1124 34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe 89 PID 1124 wrote to memory of 5060 1124 34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe 89 PID 1124 wrote to memory of 5060 1124 34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe 89 PID 1124 wrote to memory of 5060 1124 34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe 89 PID 1124 wrote to memory of 5060 1124 34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe 89 PID 1124 wrote to memory of 5060 1124 34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe 89 PID 1124 wrote to memory of 5060 1124 34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe 89 PID 1124 wrote to memory of 5060 1124 34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe 89 PID 1124 wrote to memory of 5060 1124 34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe 89 PID 1124 wrote to memory of 5060 1124 34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe 89 PID 1124 wrote to memory of 5060 1124 34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe 89 PID 1124 wrote to memory of 5060 1124 34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe"C:\Users\Admin\AppData\Local\Temp\34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe"C:\Users\Admin\AppData\Local\Temp\34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SYSTEM32\winlogon.exewinlogon.exe3⤵PID:5060
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD50e675d4a7a5b7ccd69013386793f68eb
SHA16e5821ddd8fea6681bda4448816f39984a33596b
SHA256bf5ff4603557c9959acec995653d052d9054ad4826df967974efd2f377c723d1
SHA512cae69a90f92936febde67dacd6ce77647cb3b3ed82bb66463cd9047e90723f633aa2fc365489de09fecdc510be15808c183b12e6236b0893af19633f6a670e66
-
Filesize
120KB
MD5f1e33a8f6f91c2ed93dc5049dd50d7b8
SHA123c583dc98aa3f6b8b108db5d90e65d3dd72e9b4
SHA2569459d246df7a3c638776305cf3683946ba8db26a7de90df8b60e1be0b27e53c4
SHA512229896da389d78cbdf2168753ed7fcc72d8e0e62c6607a3766d6d47842c0abd519ac4f5d46607b15e7ba785280f9d27b482954e931645337a152b8a54467c6a5
-
Filesize
1003KB
MD547dda01b3f3799c44a68bc93ed895a47
SHA1aa2adfb109ea622c9bd46a5493aec49e915ca75b
SHA2567ffd6a4e7574f52f62285b3e5c3316dd87abb2f0aac7319e3edc32709fd67bf3
SHA512628554c15dc29f6addd5180697943511d1975a010474b580daeaf430486d71162bd4d70107fc5d623a08e1df10189a9ca894549992845affe703921aa365e526
-
Filesize
32KB
MD54424baf6ed5340df85482fa82b857b03
SHA1181b641bf21c810a486f855864cd4b8967c24c44
SHA2568c1f7f64579d01fedfde07e0906b1f8e607c34d5e6424c87abe431a2322eba79
SHA5128adb94893ada555de2e82f006ab4d571fad8a1b16ac19ca4d2efc1065677f25d2de5c981473fabd0398f6328c1be1ebd4d36668ea67f8a5d25060f1980ee7e33
-
Filesize
4.0MB
MD5d2a8a5e7380d5f4716016777818a32c5
SHA1fb12f31d1d0758fe3e056875461186056121ed0c
SHA25659ab345c565304f638effa7c0236f26041fd06e35041a75988e13995cd28ace9
SHA512ad1269d1367f587809e3fbe44af703c464a88fa3b2ae0bf2ad6544b8ed938e4265aab7e308d999e6c8297c0c85c608e3160796325286db3188a3edf040a02ab7
-
Filesize
31KB
MD5629f76ef6491d11b06133c37692b04d6
SHA1a55c64556929bb984906a16c3f3c2d425b0712c9
SHA25683c3532c4355dfe635df4462da7bd767d8c96bf85cb60f80072cec3cf1da24c1
SHA512f26dfa24bcc34f1958ce2f96db41f7a02ffed6577d18e07efce6ef89773604c257d709150235367e6b8866c536d679b159a6976037e02d2c8e28d321fd49c395
-
Filesize
994KB
MD58e7680a8d07c3c4159241d31caaf369c
SHA162fe2d4ae788ee3d19e041d81696555a6262f575
SHA25636cc22d92a60e57dee394f56a9d1ed1655ee9db89d2244a959005116a4184d80
SHA5129509f5b07588a08a490f4c3cb859bbfe670052c1c83f92b9c3356afa664cb500364e09f9dafac7d387332cc52d9bb7bb84ceb1493f72d4d17ef08b9ee3cb4174