ScreenShot
Created | 2024.10.15 14:18 | Machine | s1_win7_x6401 |
Filename | artifact.exe | ||
Type | PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 63 detected (Shelma, tsgG, Malicious, score, CobaltStr, S17675256, GenericKDZ, Unsafe, CobaltStrike, confidence, 100%, Genus, Cobalt, gen1, Windows, Artifact, CozyDuke, CLASSIC, bikjb, Tool, COBEACON, Static AI, Malicious PE, fsibr, Detected, Bulz, SPVV, NDUP, R360995, Artemis, GenAsa, ZICJWVi3Ujg, susgen, Hacktool) | ||
md5 | cecc2b6b3bd5983b991fd86a185952b6 | ||
sha256 | 65b69eb0077b583a41b7415b984e71f0da8595c3261d1db19b3cb7dda74b7117 | ||
ssdeep | 192:yDMAe4Ckj19RZZ6wpSfu1bKcq5uHj7khBDSeKNH4/YJQ1Xc00BUbOj6kxiY:yDMAoKz6WtKEj7aBDiUYJ60bAY | ||
imphash | 17b461a082950fc6332228572138b80c | ||
impfuzzy | 24:Q2kfg1JlDzncLb9aa0mezlMC95XGDZ8k1koDquQZn:gfg1jc/bezlzJGV8k1koqz |
Network IP location
Signature (7cnts)
Level | Description |
---|---|
danger | File has been identified by 63 AntiVirus engines on VirusTotal as malicious |
watch | Communicates with host for which no DNS query was performed |
watch | Network activity contains more than one unique useragent |
notice | A process attempted to delay the analysis task. |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) |
info | Queries for the computername |
Rules (3cnts)
Level | Name | Description | Collection |
---|---|---|---|
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
info | IsPE64 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Suricata ids
ET MALWARE Cobalt Strike Beacon Observed
ET MALWARE Successful Cobalt Strike Shellcode Download (x64) M1
ET MALWARE Successful Cobalt Strike Shellcode Download (x64) M1
PE API
IAT(Import Address Table) Library
KERNEL32.dll
0x409244 CloseHandle
0x40924c ConnectNamedPipe
0x409254 CreateFileA
0x40925c CreateNamedPipeA
0x409264 CreateThread
0x40926c DeleteCriticalSection
0x409274 EnterCriticalSection
0x40927c GetCurrentProcess
0x409284 GetCurrentProcessId
0x40928c GetCurrentThreadId
0x409294 GetLastError
0x40929c GetModuleHandleA
0x4092a4 GetProcAddress
0x4092ac GetStartupInfoA
0x4092b4 GetSystemTimeAsFileTime
0x4092bc GetTickCount
0x4092c4 InitializeCriticalSection
0x4092cc LeaveCriticalSection
0x4092d4 LoadLibraryW
0x4092dc QueryPerformanceCounter
0x4092e4 ReadFile
0x4092ec RtlAddFunctionTable
0x4092f4 RtlCaptureContext
0x4092fc RtlLookupFunctionEntry
0x409304 RtlVirtualUnwind
0x40930c SetUnhandledExceptionFilter
0x409314 Sleep
0x40931c TerminateProcess
0x409324 TlsGetValue
0x40932c UnhandledExceptionFilter
0x409334 VirtualAlloc
0x40933c VirtualProtect
0x409344 VirtualQuery
0x40934c WriteFile
msvcrt.dll
0x40935c __C_specific_handler
0x409364 __dllonexit
0x40936c __getmainargs
0x409374 __initenv
0x40937c __iob_func
0x409384 __lconv_init
0x40938c __set_app_type
0x409394 __setusermatherr
0x40939c _acmdln
0x4093a4 _amsg_exit
0x4093ac _cexit
0x4093b4 _fmode
0x4093bc _initterm
0x4093c4 _lock
0x4093cc _onexit
0x4093d4 _unlock
0x4093dc abort
0x4093e4 calloc
0x4093ec exit
0x4093f4 fprintf
0x4093fc free
0x409404 fwrite
0x40940c malloc
0x409414 memcpy
0x40941c signal
0x409424 sprintf
0x40942c strlen
0x409434 strncmp
0x40943c vfprintf
EAT(Export Address Table) is none
KERNEL32.dll
0x409244 CloseHandle
0x40924c ConnectNamedPipe
0x409254 CreateFileA
0x40925c CreateNamedPipeA
0x409264 CreateThread
0x40926c DeleteCriticalSection
0x409274 EnterCriticalSection
0x40927c GetCurrentProcess
0x409284 GetCurrentProcessId
0x40928c GetCurrentThreadId
0x409294 GetLastError
0x40929c GetModuleHandleA
0x4092a4 GetProcAddress
0x4092ac GetStartupInfoA
0x4092b4 GetSystemTimeAsFileTime
0x4092bc GetTickCount
0x4092c4 InitializeCriticalSection
0x4092cc LeaveCriticalSection
0x4092d4 LoadLibraryW
0x4092dc QueryPerformanceCounter
0x4092e4 ReadFile
0x4092ec RtlAddFunctionTable
0x4092f4 RtlCaptureContext
0x4092fc RtlLookupFunctionEntry
0x409304 RtlVirtualUnwind
0x40930c SetUnhandledExceptionFilter
0x409314 Sleep
0x40931c TerminateProcess
0x409324 TlsGetValue
0x40932c UnhandledExceptionFilter
0x409334 VirtualAlloc
0x40933c VirtualProtect
0x409344 VirtualQuery
0x40934c WriteFile
msvcrt.dll
0x40935c __C_specific_handler
0x409364 __dllonexit
0x40936c __getmainargs
0x409374 __initenv
0x40937c __iob_func
0x409384 __lconv_init
0x40938c __set_app_type
0x409394 __setusermatherr
0x40939c _acmdln
0x4093a4 _amsg_exit
0x4093ac _cexit
0x4093b4 _fmode
0x4093bc _initterm
0x4093c4 _lock
0x4093cc _onexit
0x4093d4 _unlock
0x4093dc abort
0x4093e4 calloc
0x4093ec exit
0x4093f4 fprintf
0x4093fc free
0x409404 fwrite
0x40940c malloc
0x409414 memcpy
0x40941c signal
0x409424 sprintf
0x40942c strlen
0x409434 strncmp
0x40943c vfprintf
EAT(Export Address Table) is none