Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 18:27
Behavioral task
behavioral1
Sample
07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5.exe
Resource
win10v2004-20240508-en
General
-
Target
07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5.exe
-
Size
105KB
-
MD5
a10ae788f0cb230b6a271a03278692a0
-
SHA1
f0538ca316da2b1555e438e7d0f041668060e411
-
SHA256
07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5
-
SHA512
b42fe9ad8f1c212041c14966d49ee976dcb70b870631fb712463d106c40e2f6aa8c456d200a1b219a4c4f6749469a3bb4a9fa04d6d9a7b760ebd6567fad29c15
-
SSDEEP
1536:be1+PsRuRfDOyMsqGvq3ogaI/n01l6zUhOq2qDYjVCCizbgECnpE9+eV1gJ:bpURuRfDO+qKq3oga1qQI8WVC9lF9X6
Malware Config
Extracted
cobaltstrike
http://154.211.98.3:1368/6Djy
-
user_agent
User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; WOW64; Trident/6.0; MALNJS)
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Processes:
resource yara_rule behavioral2/memory/2800-0-0x00007FF7BD7F0000-0x00007FF7BD826000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Security = "C:\\Users\\Admin\\AppData\\Local\\Temp\\07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5.exe" 07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5.exepid process 2800 07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5.exe 2800 07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5.exe"C:\Users\Admin\AppData\Local\Temp\07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses