Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 15:09
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-24_c64c3bd487b6d1d34a7cf2ac077ba19c_cobalt-strike_megazord.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-24_c64c3bd487b6d1d34a7cf2ac077ba19c_cobalt-strike_megazord.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-24_c64c3bd487b6d1d34a7cf2ac077ba19c_cobalt-strike_megazord.exe
-
Size
11.1MB
-
MD5
c64c3bd487b6d1d34a7cf2ac077ba19c
-
SHA1
73481bf10b2658305ca5263788b44f85f5843371
-
SHA256
4d234c2492c20f209c48c5d1314eb9218cd65efd674b28e2f93d8bd7adde35f4
-
SHA512
f267ac6b60df583447dd4a798695ce4eccd87f3d3a88c101c988de2c1df691e55ec6b9188d4cbd63f4b0894f1f430bdb23b082e05040ebd7bbadff05160084a2
-
SSDEEP
98304:HNty57QQPujFFL7PBVOoAABT12NoF2GOZcr/ktiDJWt5dZ/Zvh:HNO2/ZVOoAABOowGwXwVWt5dt
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
metasploit_stager
192.168.1.150:4444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2252 1720 2024-11-24_c64c3bd487b6d1d34a7cf2ac077ba19c_cobalt-strike_megazord.exe 32 PID 1720 wrote to memory of 2252 1720 2024-11-24_c64c3bd487b6d1d34a7cf2ac077ba19c_cobalt-strike_megazord.exe 32 PID 1720 wrote to memory of 2252 1720 2024-11-24_c64c3bd487b6d1d34a7cf2ac077ba19c_cobalt-strike_megazord.exe 32 PID 1720 wrote to memory of 2252 1720 2024-11-24_c64c3bd487b6d1d34a7cf2ac077ba19c_cobalt-strike_megazord.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-24_c64c3bd487b6d1d34a7cf2ac077ba19c_cobalt-strike_megazord.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-24_c64c3bd487b6d1d34a7cf2ac077ba19c_cobalt-strike_megazord.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe2⤵PID:2252
-