Analysis
-
max time kernel
286s -
max time network
295s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 09:01
Static task
static1
Behavioral task
behavioral1
Sample
55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe
Resource
win10v2004-20241007-en
General
-
Target
55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe
-
Size
628KB
-
MD5
2e01e07dd7d228810126e8e449ffd97b
-
SHA1
144639db8ba3e7ce5ba03fa9c9cee61758e34de9
-
SHA256
55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee
-
SHA512
9cebf8f26da3cdb15dd01b275b030151f11c48a19a6c16274a50fb5d5099f6db3c77b9d9d4f7ab899ba9630a99ccdfa5702490c113978250584a00ec9fc92ad2
-
SSDEEP
12288:JAsWP4S+JJ91FEUPiNavGL+mRjTfFkbfp6OZr9JbFSBZ:yHYJJ97F6NSGLlRu4I4BZ
Malware Config
Extracted
cobaltstrike
0
http://178.132.4.150:80/owa/
-
access_type
512
-
host
178.132.4.150,/owa/
-
http_header1
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
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAcAAAABAAAADQAAAAUAAAACd2EAAAAHAAAAAAAAAA0AAAACAAAABndsYTQyPQAAAAIAAAALeGlkPTczMGJmNzsAAAACAAAAEk1TUEF1dGg9M0VrQWpES2pJOwAAAAIAAAAXQ2xpZW50SWQ9MUMwRjZDNUQ5MTBGOTsAAAACAAAAOE1pY3Jvc29mdEFwcGxpY2F0aW9uc1RlbGVtZXRyeURldmljZUlkPTk1YzE4ZDgtNGRjZTk4NTQ7AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
GET
-
jitter
5120
-
polling_time
30000
-
port_number
80
-
sc_process32
%windir%\syswow64\gpupdate.exe
-
sc_process64
%windir%\sysnative\gpupdate.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCnOM3nXx+7HBhkbDd+AwFrFisSunK999w2tM0uTpuuEiBalcJhcL+QgQWtf6S7zPp5hjImG+2YcPl18geU4f5JlSPXHwilbK4DFb/ePWyKFjhrA7emVRqhM21QMlo1ANsn14rY/RO2pzuft8P7TXoIjjI/B2GGVuzYNZX6X4I2EwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
1.448416512e+09
-
unknown2
AAAABAAAAA0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown3
1.610612736e+09
-
uri
/OWA/
-
user_agent
Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko)
-
watermark
0
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Cobaltstrike family
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exedescription pid process target process PID 3204 set thread context of 3636 3204 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exeRegSvcs.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exepid process 3204 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe 3204 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe 3204 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe 3204 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exedescription pid process Token: SeDebugPrivilege 3204 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exedescription pid process target process PID 3204 wrote to memory of 4612 3204 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 3204 wrote to memory of 4612 3204 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 3204 wrote to memory of 4612 3204 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 3204 wrote to memory of 1396 3204 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 3204 wrote to memory of 1396 3204 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 3204 wrote to memory of 1396 3204 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 3204 wrote to memory of 3636 3204 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 3204 wrote to memory of 3636 3204 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 3204 wrote to memory of 3636 3204 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 3204 wrote to memory of 3636 3204 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 3204 wrote to memory of 3636 3204 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 3204 wrote to memory of 3636 3204 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 3204 wrote to memory of 3636 3204 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 3204 wrote to memory of 3636 3204 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 3204 wrote to memory of 3636 3204 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 3204 wrote to memory of 3636 3204 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe PID 3204 wrote to memory of 3636 3204 55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe"C:\Users\Admin\AppData\Local\Temp\55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:4612
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:1396
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3636
-