Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-06-2024 18:27

General

  • Target

    07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5.exe

  • Size

    105KB

  • MD5

    a10ae788f0cb230b6a271a03278692a0

  • SHA1

    f0538ca316da2b1555e438e7d0f041668060e411

  • SHA256

    07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5

  • SHA512

    b42fe9ad8f1c212041c14966d49ee976dcb70b870631fb712463d106c40e2f6aa8c456d200a1b219a4c4f6749469a3bb4a9fa04d6d9a7b760ebd6567fad29c15

  • SSDEEP

    1536:be1+PsRuRfDOyMsqGvq3ogaI/n01l6zUhOq2qDYjVCCizbgECnpE9+eV1gJ:bpURuRfDO+qKq3oga1qQI8WVC9lF9X6

Malware Config

Extracted

Family

cobaltstrike

C2

http://154.211.98.3:1368/6Djy

Attributes
  • user_agent

    User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; WOW64; Trident/6.0; MALNJS)

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5.exe
    "C:\Users\Admin\AppData\Local\Temp\07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    PID:2800

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2800-0-0x00007FF7BD7F0000-0x00007FF7BD826000-memory.dmp
    Filesize

    216KB

  • memory/2800-1-0x000001D230A00000-0x000001D230A01000-memory.dmp
    Filesize

    4KB