Analysis
-
max time kernel
132s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 06:45
Static task
static1
Behavioral task
behavioral1
Sample
建筑工人实名制管理平台标准化服务接口登记信息.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
建筑工人实名制管理平台标准化服务接口登记信息.exe
Resource
win10v2004-20241007-en
General
-
Target
建筑工人实名制管理平台标准化服务接口登记信息.exe
-
Size
2.4MB
-
MD5
1a0e50a7a3bb6056f7f58919f35111bf
-
SHA1
559f7cd0ee4b1b9da70bd58f51df8653f779f19d
-
SHA256
bd2475288e3753ab87602e5b0c51b212c5bac79bef0fbebecfca961c17aaa21d
-
SHA512
956dc91c3f469c317e62d6b268eb8002f13abf2a952853be5aee4a5ca559666a75668ccba18d46a89a096ed474013e1bb6758dab595291ff72714b7bdd8796ed
-
SSDEEP
24576:YURHk6/fx3m2wYCP5G5irGCuFqE5g87PY3cxlD1:YyEcfxW2wYQY5IGCmg87Pa2lD1
Malware Config
Extracted
cobaltstrike
http://139.224.216.18:443/react.development.js
-
user_agent
Accept: text/html, application/xhtml+xml, image/jxr, */* Referer: https://unpkg.com/browse/[email protected]/umd/ User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Win64; x64; Trident/4.0)
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Cobaltstrike family
-
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
建筑工人实名制管理平台标准化服务接口登记信息.exedescription pid Process procid_target PID 2856 wrote to memory of 2060 2856 建筑工人实名制管理平台标准化服务接口登记信息.exe 32 PID 2856 wrote to memory of 2060 2856 建筑工人实名制管理平台标准化服务接口登记信息.exe 32 PID 2856 wrote to memory of 2060 2856 建筑工人实名制管理平台标准化服务接口登记信息.exe 32 PID 2856 wrote to memory of 2060 2856 建筑工人实名制管理平台标准化服务接口登记信息.exe 32 PID 2856 wrote to memory of 2060 2856 建筑工人实名制管理平台标准化服务接口登记信息.exe 32