Analysis
-
max time kernel
131s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 14:56
Static task
static1
Behavioral task
behavioral1
Sample
Kuraue/047bc92d1dd3edd255f4eb31b42b1f1fbc9ce087096652c7c65fa4b14ba26d9e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Kuraue/047bc92d1dd3edd255f4eb31b42b1f1fbc9ce087096652c7c65fa4b14ba26d9e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Kuraue/10d901f924e9009c88e2021c8ab55a029743a682df01de2f1fb4227afe8ceb82.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Kuraue/10d901f924e9009c88e2021c8ab55a029743a682df01de2f1fb4227afe8ceb82.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Kuraue/873782499615a3825a38623440408cc78ac6ab38d8e05379aa921b9185df4075.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Kuraue/873782499615a3825a38623440408cc78ac6ab38d8e05379aa921b9185df4075.exe
Resource
win10v2004-20241007-en
General
-
Target
Kuraue/873782499615a3825a38623440408cc78ac6ab38d8e05379aa921b9185df4075.exe
-
Size
1.9MB
-
MD5
056ccd0b9d7ef99759dc9aa9954ab038
-
SHA1
b4b629190a8f97ad06eb14b7448e7eb4770f1b51
-
SHA256
873782499615a3825a38623440408cc78ac6ab38d8e05379aa921b9185df4075
-
SHA512
566cf007ffa296a73b6529dd1768a8a92d01716a6b61a9c14b2834f420f56dca7554f7979aaf045e65956e2ee3020501b7edb4355ed7a78d26d097b3b8d57390
-
SSDEEP
49152:R0y8xS0Lrb/TGvO90d7HjmAFd4A64nsfJm0B02uPc87TTp90SgM4:8TKt
Malware Config
Extracted
cobaltstrike
100000
http://101.42.2.218:443/jquery-3.3.1.min.js
-
access_type
512
-
beacon_type
2048
-
host
101.42.2.218,/jquery-3.3.1.min.js
-
http_header1
AAAACgAAAEdBY2NlcHQ6IHRleHQvaHRtbCxhcHBsaWNhdGlvbi94aHRtbCt4bWwsYXBwbGljYXRpb24veG1sO3E9MC45LCovKjtxPTAuOAAAAAoAAAAgUmVmZXJlcjogaHR0cDovL2NvZGUuanF1ZXJ5LmNvbS8AAAAKAAAAHkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQAAAAcAAAAAAAAADQAAAAIAAAAJX19jZmR1aWQ9AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
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
-
http_method1
GET
-
http_method2
POST
-
jitter
12800
-
polling_time
1000
-
port_number
443
-
sc_process32
%windir%\syswow64\WerFault.exe
-
sc_process64
%windir%\sysnative\WerFault.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC4i4awlFJiy8RuC7n1kqpTlzo5TyjHX3j+f4Jtigr1USOy5D+WYVx991hPcUGQsMPDKAwB8OkIGyKN03IMOjKe4XCS6B7Zwl4ntQSrsd6c2R+54SXfAXfCOuvKSq2RNPFdM+XNtriypZMQRfM3LmHSMzbiEN3c2wEFUANBk+E/FwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4.234810624e+09
-
unknown2
AAAABAAAAAEAAAXyAAAAAgAAAFQAAAACAAAPWwAAAA0AAAAPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/jquery-3.3.2.min.js
-
user_agent
Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko
-
watermark
100000
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Cobaltstrike family
-
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 223.5.5.5