Detection(s): CobaltStrikeStager
Category | Package | Started | Completed | Duration | Log(s) |
---|---|---|---|---|---|
FILE | exe | 2025-05-06 07:12:10 | 2025-05-06 07:16:20 | 250 seconds | Show Analysis Log |
2024-11-25 13:37:15,397 [root] INFO: Date set to: 20250506T07:12:09, timeout set to: 200 2025-05-06 08:12:09,032 [root] DEBUG: Starting analyzer from: C:\tmp_gell1p8 2025-05-06 08:12:09,032 [root] DEBUG: Storing results at: C:\uyHCokWh 2025-05-06 08:12:09,032 [root] DEBUG: Pipe server name: \\.\PIPE\IpEgLKC 2025-05-06 08:12:09,032 [root] DEBUG: Python path: C:\Users\Packager\AppData\Local\Programs\Python\Python310-32 2025-05-06 08:12:09,032 [root] INFO: analysis running as an admin 2025-05-06 08:12:09,032 [root] INFO: analysis package specified: "exe" 2025-05-06 08:12:09,032 [root] DEBUG: importing analysis package module: "modules.packages.exe"... 2025-05-06 08:12:10,095 [root] DEBUG: imported analysis package "exe" 2025-05-06 08:12:10,095 [root] DEBUG: initializing analysis package "exe"... 2025-05-06 08:12:10,095 [lib.common.common] INFO: wrapping 2025-05-06 08:12:10,095 [lib.core.compound] INFO: C:\Users\Packager\AppData\Local\Temp already exists, skipping creation 2025-05-06 08:12:10,110 [root] DEBUG: New location of moved file: C:\Users\Packager\AppData\Local\Temp\1.exe 2025-05-06 08:12:10,110 [root] INFO: Analyzer: Package modules.packages.exe does not specify a DLL option 2025-05-06 08:12:10,110 [root] INFO: Analyzer: Package modules.packages.exe does not specify a DLL_64 option 2025-05-06 08:12:10,110 [root] INFO: Analyzer: Package modules.packages.exe does not specify a loader option 2025-05-06 08:12:10,110 [root] INFO: Analyzer: Package modules.packages.exe does not specify a loader_64 option 2025-05-06 08:12:10,330 [root] DEBUG: Imported auxiliary module "modules.auxiliary.browser" 2025-05-06 08:12:10,345 [root] DEBUG: Imported auxiliary module "modules.auxiliary.digisig" 2025-05-06 08:12:10,376 [root] DEBUG: Imported auxiliary module "modules.auxiliary.disguise" 2025-05-06 08:12:10,392 [root] DEBUG: Imported auxiliary module "modules.auxiliary.human" 2025-05-06 08:12:10,392 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageChops' 2025-05-06 08:12:10,392 [lib.api.screenshot] ERROR: No module named 'PIL' 2025-05-06 08:12:10,392 [root] DEBUG: Imported auxiliary module "modules.auxiliary.screenshots" 2025-05-06 08:12:10,407 [root] DEBUG: Imported auxiliary module "modules.auxiliary.tlsdump" 2025-05-06 08:12:10,407 [root] DEBUG: Initialized auxiliary module "Browser" 2025-05-06 08:12:10,407 [root] DEBUG: attempting to configure 'Browser' from data 2025-05-06 08:12:10,407 [root] DEBUG: module Browser does not support data configuration, ignoring 2025-05-06 08:12:10,407 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.browser"... 2025-05-06 08:12:10,407 [root] DEBUG: Started auxiliary module modules.auxiliary.browser 2025-05-06 08:12:10,407 [root] DEBUG: Initialized auxiliary module "DigiSig" 2025-05-06 08:12:10,407 [root] DEBUG: attempting to configure 'DigiSig' from data 2025-05-06 08:12:10,407 [root] DEBUG: module DigiSig does not support data configuration, ignoring 2025-05-06 08:12:10,407 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.digisig"... 2025-05-06 08:12:10,423 [modules.auxiliary.digisig] DEBUG: Checking for a digital signature 2025-05-06 08:12:10,689 [modules.auxiliary.digisig] DEBUG: File is not signed 2025-05-06 08:12:10,689 [modules.auxiliary.digisig] INFO: Uploading signature results to aux/DigiSig.json 2025-05-06 08:12:10,689 [root] DEBUG: Started auxiliary module modules.auxiliary.digisig 2025-05-06 08:12:10,689 [root] DEBUG: Initialized auxiliary module "Disguise" 2025-05-06 08:12:10,689 [root] DEBUG: attempting to configure 'Disguise' from data 2025-05-06 08:12:10,689 [root] DEBUG: module Disguise does not support data configuration, ignoring 2025-05-06 08:12:10,689 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.disguise"... 2025-05-06 08:12:10,689 [modules.auxiliary.disguise] INFO: Disguising GUID to 9b7cdcea-e4d9-4c24-8a0c-bc615bd315ed 2025-05-06 08:12:10,689 [root] DEBUG: Started auxiliary module modules.auxiliary.disguise 2025-05-06 08:12:10,689 [root] DEBUG: Initialized auxiliary module "Human" 2025-05-06 08:12:10,689 [root] DEBUG: attempting to configure 'Human' from data 2025-05-06 08:12:10,689 [root] DEBUG: module Human does not support data configuration, ignoring 2025-05-06 08:12:10,689 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.human"... 2025-05-06 08:12:10,689 [root] DEBUG: Started auxiliary module modules.auxiliary.human 2025-05-06 08:12:10,689 [root] DEBUG: Initialized auxiliary module "Screenshots" 2025-05-06 08:12:10,689 [root] DEBUG: attempting to configure 'Screenshots' from data 2025-05-06 08:12:10,689 [root] DEBUG: module Screenshots does not support data configuration, ignoring 2025-05-06 08:12:10,689 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.screenshots"... 2025-05-06 08:12:10,704 [modules.auxiliary.screenshots] WARNING: Python Image Library is not installed, screenshots are disabled 2025-05-06 08:12:10,704 [root] DEBUG: Started auxiliary module modules.auxiliary.screenshots 2025-05-06 08:12:10,704 [root] DEBUG: Initialized auxiliary module "TLSDumpMasterSecrets" 2025-05-06 08:12:10,704 [root] DEBUG: attempting to configure 'TLSDumpMasterSecrets' from data 2025-05-06 08:12:10,704 [root] DEBUG: module TLSDumpMasterSecrets does not support data configuration, ignoring 2025-05-06 08:12:10,704 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.tlsdump"... 2025-05-06 08:12:10,704 [modules.auxiliary.tlsdump] INFO: lsass.exe found, pid 696 2025-05-06 08:12:10,751 [lib.api.process] INFO: Monitor config for <Process 696 lsass.exe>: C:\tmp_gell1p8\dll\696.ini 2025-05-06 08:12:10,751 [lib.api.process] INFO: Option 'tlsdump' with value '1' sent to monitor 2025-05-06 08:12:10,751 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmp_gell1p8\dll\pQxbIz.dll, loader C:\tmp_gell1p8\bin\EPCPTrhb.exe 2025-05-06 08:12:10,814 [root] DEBUG: Loader: Injecting process 696 with C:\tmp_gell1p8\dll\pQxbIz.dll. 2025-05-06 08:12:10,845 [root] DEBUG: 696: Python path set to 'C:\Users\Packager\AppData\Local\Programs\Python\Python310-32'. 2025-05-06 08:12:10,845 [root] INFO: Disabling sleep skipping. 2025-05-06 08:12:10,845 [root] DEBUG: 696: TLS secret dump mode enabled. 2025-05-06 08:12:10,860 [root] DEBUG: 696: InternalYaraScan: Scanning 0x00007FF84A790000, size 0x1f4542 2025-05-06 08:12:10,860 [root] DEBUG: 696: InternalYaraScan hit: RtlInsertInvertedFunctionTable 2025-05-06 08:12:10,860 [root] DEBUG: 696: RtlInsertInvertedFunctionTable 0x00007FF84A7A090E, LdrpInvertedFunctionTableSRWLock 0x00007FF84A8FB4F0 2025-05-06 08:12:10,860 [root] DEBUG: 696: Monitor initialised: 64-bit capemon loaded in process 696 at 0x00007FF8234D0000, thread 6892, image base 0x00007FF60D500000, stack from 0x0000008EFAA74000-0x0000008EFAA80000 2025-05-06 08:12:10,860 [root] DEBUG: 696: Commandline: C:\Windows\system32\lsass.exe 2025-05-06 08:12:10,876 [root] DEBUG: 696: Hooked 5 out of 5 functions 2025-05-06 08:12:10,876 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread. 2025-05-06 08:12:10,876 [root] DEBUG: Successfully injected DLL C:\tmp_gell1p8\dll\pQxbIz.dll. 2025-05-06 08:12:10,876 [lib.api.process] INFO: Injected into 64-bit <Process 696 lsass.exe> 2025-05-06 08:12:10,876 [root] DEBUG: Started auxiliary module modules.auxiliary.tlsdump 2025-05-06 08:12:16,298 [root] INFO: Restarting WMI Service 2025-05-06 08:12:18,376 [root] DEBUG: package modules.packages.exe does not support configure, ignoring 2025-05-06 08:12:18,376 [root] WARNING: configuration error for package modules.packages.exe: error importing data.packages.exe: No module named 'data.packages' 2025-05-06 08:12:18,376 [lib.core.compound] INFO: C:\Users\Packager\AppData\Local\Temp already exists, skipping creation 2025-05-06 08:12:18,689 [lib.api.process] INFO: Successfully executed process from path "C:\Users\Packager\AppData\Local\Temp\1.exe" with arguments "" with pid 6444 2025-05-06 08:12:18,689 [lib.api.process] INFO: Monitor config for <Process 6444 1.exe>: C:\tmp_gell1p8\dll\6444.ini 2025-05-06 08:12:18,704 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmp_gell1p8\dll\pQxbIz.dll, loader C:\tmp_gell1p <truncated>
Name | Label | Manager | Started On | Shutdown On | Route |
---|---|---|---|---|---|
win10-2 | win10-2 | KVM | 2025-05-06 07:12:10 | 2025-05-06 07:16:00 | none |
Type | CobaltStrikeStager Config | ||
---|---|---|---|
Extracted From |
|
||
netloc | 118.24.173.126 | ||
path | /Select/gifs/E1A12889V | ||
port | 89 | ||
headers |
|
||
inet_flags |
|
||
watermark | 987654321 | ||
type | HTTP |
File Name |
1.exe
|
---|---|
File Type | PE32+ executable (GUI) x86-64, for MS Windows |
File Size | 233472 bytes |
MD5 | a61481f5377130bc28a67ef4ccb90e59 |
SHA1 | 1857d8fea8320c8865d9301bbce4d3da2481fd81 |
SHA256 | 8af4fda691439a2c58a65c2dc1ba085f47d1c53ce82a720b272c657dd8b17141 [VT] [MWDB] [Bazaar] |
SHA3-384 | 55d440d9be6b99b8656e9087054b4a0a5d7410789bc0a00068df5b47b53da4f7a8b86f12ff6aa9369798e4d9d033b14c |
CRC32 | A910F0F3 |
TLSH | T16D348C17739570F4E46A42348B5289B5A3327C3283D4AF6F0EE87AE62D336D55D39A20 |
Ssdeep | 3072:T6IMDsVAmT8d92YYVhJYtH3v52JhL/tfxq8+DViY5HMXxzftw8uP8RNP8RY:uIMDsVBTC9rGCHgdfKVB5s1tw8uy |
PE | File Strings BinGraph Vba2Graph |
Engine | Result | Engine | Result | Engine | Result | Bkav | W64.AIDetectMalware | Elastic | malicious (high confidence) | Skyhigh | BehavesLike.Win64.Generic.dh | McAfee | Artemis!A61481F53771 | Cylance | Unsafe | Sangfor | Trojan.Win64.Agent.V9le | CrowdStrike | win/malicious_confidence_70% (W) | Symantec | ML.Attribute.HighConfidence | ESET-NOD32 | a variant of Generik.CYDHKBZ | APEX | Malicious | Kaspersky | Trojan.Win64.Ogneglazka.asx | Avast | Win64:MalwareX-gen [Misc] | Rising | Trojan.Kryptik@AI.91 (RDML:9lFd8Hvg1yf13yrM+5J4lw) | F-Secure | Trojan.TR/AVI.Agent.dpnxp | McAfeeD | ti!8AF4FDA69143 | Trapmine | suspicious.low.ml.score | CTX | exe.trojan.generic | Sophos | Mal/Generic-S | Ikarus | Win32.Outbreak | GData | MSIL.Backdoor.Rozena.8SL6SK | Avira | TR/AVI.Agent.dpnxp | Antiy-AVL | Trojan/Win32.Sonbokli | Kingsoft | malware.kb.a.987 | Microsoft | VirTool:Win64/CobaltStrike!rfn | Cynet | Malicious (score: 100) | Panda | Trj/Chgt.AD | Fortinet | W32/PossibleThreat | AVG | Win64:MalwareX-gen [Misc] | DeepInstinct | MALICIOUS |
---|
Image Base | Entry Point | Reported Checksum | Actual Checksum | Minimum OS Version | Compile Time | Import Hash |
---|---|---|---|---|---|---|
0x140000000 | 0x0000cb74 | 0x00000000 | 0x0003916e | 6.0 | 2025-04-30 06:45:15 | 7dd43f69585b7ae9b0797243b0c3da8d |
CompanyName | Tencent |
---|---|
FileDescription | QQEX |
FileVersion | 9.9.16.29927 |
InternalName | |
LegalCopyright | Copyright (C) 1999-2024 Tencent. All Rights Reserved |
OriginalFilename | |
ProductName | QQEX |
ProductVersion | 9.9.16.29927-bf4701c1 |
SquirrelAwareVersion | 1 |
Translation | 0x0409 0x04b0 |
Name | RAW Address | Virtual Address | Virtual Size | Size of Raw Data | Characteristics | Entropy |
---|---|---|---|---|---|---|
.text | 0x00000400 | 0x00001000 | 0x0000ef86 | 0x0000f000 | IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ | 6.52 |
.rdata | 0x0000f400 | 0x00010000 | 0x000091d4 | 0x00009200 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ | 4.71 |
.data | 0x00018600 | 0x0001a000 | 0x0000fa9c | 0x0000ea00 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE | 7.90 |
.pdata | 0x00027000 | 0x0002a000 | 0x00000fcc | 0x00001000 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ | 4.83 |
.00cfg | 0x00028000 | 0x0002b000 | 0x00000038 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ | 0.39 |
.gxfg | 0x00028200 | 0x0002c000 | 0x00001000 | 0x00001000 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ | 5.08 |
_RDATA | 0x00029200 | 0x0002d000 | 0x000001f4 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ | 3.69 |
.reloc | 0x00029400 | 0x0002e000 | 0x00000688 | 0x00000800 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ | 4.95 |
.rsrc | 0x00029c00 | 0x0002f000 | 0x00001000 | 0x00001000 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ | 0.00 |
.l2 | 0x0002ac00 | 0x00030000 | 0x00007000 | 0x00007000 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ | 4.36 |
.l2 | 0x00031c00 | 0x00037000 | 0x00007400 | 0x00007400 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ | 4.37 |
Name | Offset | Size | Language | Sub-language | Entropy | File type |
---|---|---|---|---|---|---|
RT_ICON | 0x00037258 | 0x00000128 | LANG_ENGLISH | SUBLANG_ENGLISH_US | 3.09 | None |
RT_ICON | 0x00037380 | 0x000002e8 | LANG_ENGLISH | SUBLANG_ENGLISH_US | 3.50 | None |
RT_ICON | 0x00037668 | 0x00000568 | LANG_ENGLISH | SUBLANG_ENGLISH_US | 4.16 | None |
RT_ICON | 0x00037bd0 | 0x000008a8 | LANG_ENGLISH | SUBLANG_ENGLISH_US | 3.52 | None |
RT_ICON | 0x00038478 | 0x00000ea8 | LANG_ENGLISH | SUBLANG_ENGLISH_US | 2.70 | None |
RT_ICON | 0x00039320 | 0x00000468 | LANG_ENGLISH | SUBLANG_ENGLISH_US | 2.97 | None |
RT_ICON | 0x00039788 | 0x000010a8 | LANG_ENGLISH | SUBLANG_ENGLISH_US | 2.60 | None |
RT_ICON | 0x0003a830 | 0x000025a8 | LANG_ENGLISH | SUBLANG_ENGLISH_US | 2.26 | None |
RT_ICON | 0x0003cdd8 | 0x0000116a | LANG_ENGLISH | SUBLANG_ENGLISH_US | 7.76 | None |
RT_VERSION | 0x0003dfc8 | 0x00000314 | LANG_ENGLISH | SUBLANG_ENGLISH_US | 3.48 | None |
No hosts contacted.
No domains contacted.
No hosts contacted.
No TCP connections recorded.
No UDP connections recorded.
No domains contacted.
No HTTP(s) requests performed.
No SMTP traffic performed.
No IRC requests performed.
No ICMP traffic performed.
No CIF Results
No Suricata Alerts
No Suricata TLS
No Suricata HTTP