Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 11:27
Static task
static1
Behavioral task
behavioral1
Sample
06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe
Resource
win10v2004-20240802-en
General
-
Target
06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe
-
Size
1.3MB
-
MD5
223aee3f86a178df73c9dda86284ae64
-
SHA1
f7b2abf596768dacce222927c87312682461458f
-
SHA256
06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7
-
SHA512
00915ce54803e540f84265964870203c925f31443eb06f125646edcdd7b0766c30dcaafd7cc0d851776169e8533ef5bbebaf978f29a903a38de25a2683530c24
-
SSDEEP
24576:hc3K7UhKn4ZzOE3oSNdUXIy6pybLwnYGdqiUqm9W6cZYY1C68xW9idIfH47znynh:1UhhzP3VdUFbGUiUN9W6cZYYL1c+fH4q
Malware Config
Extracted
cobaltstrike
http://192.168.128.129:8080/XKrH
-
user_agent
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSCOM)
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe 2472 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe"C:\Users\Admin\AppData\Local\Temp\06e84d4ca066dbe20b4d37686b65493fcef7f085e377af0afe9ec2b4ee57d7e7.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
PID:2472