Analysis
-
max time kernel
292s -
max time network
281s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 09:01
Static task
static1
Behavioral task
behavioral1
Sample
55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe
Resource
win10v2004-20241007-en
General
-
Target
55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe
-
Size
628KB
-
MD5
2e01e07dd7d228810126e8e449ffd97b
-
SHA1
144639db8ba3e7ce5ba03fa9c9cee61758e34de9
-
SHA256
55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee
-
SHA512
9cebf8f26da3cdb15dd01b275b030151f11c48a19a6c16274a50fb5d5099f6db3c77b9d9d4f7ab899ba9630a99ccdfa5702490c113978250584a00ec9fc92ad2
-
SSDEEP
12288:JAsWP4S+JJ91FEUPiNavGL+mRjTfFkbfp6OZr9JbFSBZ:yHYJJ97F6NSGLlRu4I4BZ
Malware Config
Extracted
cobaltstrike
0
http://178.132.4.150:80/owa/
-
access_type
512
-
host
178.132.4.150,/owa/
-
http_header1
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
-
http_header2
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
-
http_method1
GET
-
http_method2
GET
-
jitter
5120
-
polling_time
30000
-
port_number
80
-
sc_process32
%windir%\syswow64\gpupdate.exe
-
sc_process64
%windir%\sysnative\gpupdate.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCnOM3nXx+7HBhkbDd+AwFrFisSunK999w2tM0uTpuuEiBalcJhcL+QgQWtf6S7zPp5hjImG+2YcPl18geU4f5JlSPXHwilbK4DFb/ePWyKFjhrA7emVRqhM21QMlo1ANsn14rY/RO2pzuft8P7TXoIjjI/B2GGVuzYNZX6X4I2EwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
1.448416512e+09
-
unknown2
AAAABAAAAA0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown3
1.610612736e+09
-
uri
/OWA/
-
user_agent
Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko)
-
watermark
0
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Cobaltstrike family
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exedescription pid process target process PID 2924 set thread context of 2840 2924 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exeRegSvcs.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exedescription pid process target process PID 2924 wrote to memory of 2840 2924 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 2924 wrote to memory of 2840 2924 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 2924 wrote to memory of 2840 2924 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 2924 wrote to memory of 2840 2924 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 2924 wrote to memory of 2840 2924 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 2924 wrote to memory of 2840 2924 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 2924 wrote to memory of 2840 2924 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 2924 wrote to memory of 2840 2924 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 2924 wrote to memory of 2840 2924 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 2924 wrote to memory of 2840 2924 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 2924 wrote to memory of 2840 2924 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 2924 wrote to memory of 2840 2924 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 2924 wrote to memory of 2840 2924 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 2924 wrote to memory of 2840 2924 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 2924 wrote to memory of 2840 2924 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe"C:\Users\Admin\AppData\Local\Temp\55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2840
-