File name:

2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk

Full analysis: https://app.any.run/tasks/caf0afab-eb04-4124-b521-f70c594114c9
Verdict: Malicious activity
Threats:

A backdoor is a type of cybersecurity threat that allows attackers to secretly compromise a system and conduct malicious activities, such as stealing data and modifying files. Backdoors can be difficult to detect, as they often use legitimate system applications to evade defense mechanisms. Threat actors often utilize special malware, such as PlugX, to establish backdoors on target devices.

Analysis date: October 28, 2024, 14:39:48
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
cobaltstrike
backdoor
xor-url
generic
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 12 sections
MD5:

C9C4D2C659985660EB9D8AFC35BB51B8

SHA1:

622E529898CB530AD93937FC50E7C1225C179021

SHA256:

14030B5868E045EB1508F44697520CCADCB3247D9165E3E02F45B1CF94CB93EF

SSDEEP:

49152:fjj5hOpu3JwIvrpsKdqY3BDhS418t8rlWZFPjBrDkrzglW7rluncEV:bj3OqJfrpjdqY3Z3WZFPjxkrzic

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • XORed URL has been found (YARA)

      • 2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe (PID: 6464)
    • COBALTSTRIKE has been detected (YARA)

      • 2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe (PID: 6464)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • 2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe (PID: 6464)
    • Checks Windows Trust Settings

      • 2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe (PID: 6464)
    • Connects to unusual port

      • 2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe (PID: 6464)
  • INFO

    • Checks supported languages

      • 2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe (PID: 6464)
    • Reads the computer name

      • 2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe (PID: 6464)
    • Reads the machine GUID from the registry

      • 2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe (PID: 6464)
    • Checks proxy server information

      • 2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe (PID: 6464)
    • Reads the software policy settings

      • 2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe (PID: 6464)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

xor-url

(PID) Process(6464) 2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe
Decrypted-URLs (1)http://code.jquery.com/

CobalStrike

(PID) Process(6464) 2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe
C2 (1)bbs.lvsehacker.com/jquery-3.3.1.min.js
BeaconTypeHTTPS
Port443
SleepTime45000
MaxGetSize1403644
Jitter37
PublicKey-----BEGIN PUBLIC KEY----- MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCySJmC2Kejyh8wxJ7se4S8yRTR Dzcy9+eXXqg9piZJEbTSHg1tnouvf/iODXvyVIQn1CXADdK4eJlxGpkOyB10zSV6 UMOmvqDD2zvoTgkVuSVxgSwtkPlAcrpRUmJTiaAa/ipJ5Yn+vbAO7RWGnOViyP8J GdrnXD1Dwv4eW3L2CQIDAQAB -----END PUBLIC KEY-----
DNS_strategyround-robin
DNS_strategy_rotate_seconds-1
DNS_strategy_fail_x-1
DNS_strategy_fail_seconds-1
SpawnTo00000000000000000000000000000000
Spawnto_x86%windir%\syswow64\dllhost.exe
Spawnto_x64%windir%\sysnative\dllhost.exe
CryptoScheme0
HttpGet_VerbGET
HttpPost_VerbPOST
HttpPostChunk0
Watermark987654321
bStageCleanupTrue
bCFGCautionFalse
UserAgentMozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko
HttpPostUri/jquery-3.3.2.min.js
Malleable_C2_InstructionsRemove 1 bytes at the end, Remove 84 bytes from the beginning, Remove 3931 bytes from the beginning, Base64 URL-safe decode, XOR mask w/ random key
HttpGet_Metadata
ConstHeaders (3)Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://code.jquery.com/
Accept-Encoding: gzip, deflate
SessionId (3)base64url
prepend: __cfduid=
header: Cookie
HttpPost_Metadata
ConstHeaders (3)Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://code.jquery.com/
Accept-Encoding: gzip, deflate
SessionId (3)mask
base64url
parameter: __cfduid
Output (3)mask
base64url
print
bUsesCookies0001
Proxy_BehaviorUse IE settings
tcpFrameHeader0005800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
smbFrameHeader0005800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
KillDate0-0-0
bProcInject_StartRWXFalse
bProcInject_UseRWXFalse
bProcInject_MinAllocSize17500
ProcInject_PrependAppend_x869090..
ProcInject_PrependAppend_x649090..
ProcInject_Stubae5afcfee8026674dc8f3b4f2da46c7f
ProcInject_AllocationMethodNtMapViewOfSection
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:10:24 02:38:34+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14
CodeSize: 704000
InitializedDataSize: 835584
UninitializedDataSize: -
EntryPoint: 0x7d0c8
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
126
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #COBALTSTRIKE 2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe

Process information

PID
CMD
Path
Indicators
Parent process
6464"C:\Users\admin\Desktop\2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe" C:\Users\admin\Desktop\2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
xor-url
(PID) Process(6464) 2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe
Decrypted-URLs (1)http://code.jquery.com/
CobalStrike
(PID) Process(6464) 2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe
C2 (1)bbs.lvsehacker.com/jquery-3.3.1.min.js
BeaconTypeHTTPS
Port443
SleepTime45000
MaxGetSize1403644
Jitter37
PublicKey-----BEGIN PUBLIC KEY----- MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCySJmC2Kejyh8wxJ7se4S8yRTR Dzcy9+eXXqg9piZJEbTSHg1tnouvf/iODXvyVIQn1CXADdK4eJlxGpkOyB10zSV6 UMOmvqDD2zvoTgkVuSVxgSwtkPlAcrpRUmJTiaAa/ipJ5Yn+vbAO7RWGnOViyP8J GdrnXD1Dwv4eW3L2CQIDAQAB -----END PUBLIC KEY-----
DNS_strategyround-robin
DNS_strategy_rotate_seconds-1
DNS_strategy_fail_x-1
DNS_strategy_fail_seconds-1
SpawnTo00000000000000000000000000000000
Spawnto_x86%windir%\syswow64\dllhost.exe
Spawnto_x64%windir%\sysnative\dllhost.exe
CryptoScheme0
HttpGet_VerbGET
HttpPost_VerbPOST
HttpPostChunk0
Watermark987654321
bStageCleanupTrue
bCFGCautionFalse
UserAgentMozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko
HttpPostUri/jquery-3.3.2.min.js
Malleable_C2_InstructionsRemove 1 bytes at the end, Remove 84 bytes from the beginning, Remove 3931 bytes from the beginning, Base64 URL-safe decode, XOR mask w/ random key
HttpGet_Metadata
ConstHeaders (3)Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://code.jquery.com/
Accept-Encoding: gzip, deflate
SessionId (3)base64url
prepend: __cfduid=
header: Cookie
HttpPost_Metadata
ConstHeaders (3)Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://code.jquery.com/
Accept-Encoding: gzip, deflate
SessionId (3)mask
base64url
parameter: __cfduid
Output (3)mask
base64url
print
bUsesCookies0001
Proxy_BehaviorUse IE settings
tcpFrameHeader0005800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
smbFrameHeader0005800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
KillDate0-0-0
bProcInject_StartRWXFalse
bProcInject_UseRWXFalse
bProcInject_MinAllocSize17500
ProcInject_PrependAppend_x869090..
ProcInject_PrependAppend_x649090..
ProcInject_Stubae5afcfee8026674dc8f3b4f2da46c7f
ProcInject_AllocationMethodNtMapViewOfSection
Total events
3 798
Read events
3 798
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
64642024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsSecurityHealthSystray.lnkbinary
MD5:1D961B76DB408C755D6059C28D606D23
SHA256:69734E7A9FD2E7565697BDCF4C31CD2AF9BFE82A7923F80E7FBA513F9B303A35
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
42
DNS requests
15
Threats
11

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1252
RUXIMICS.exe
GET
200
2.16.164.9:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6944
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1252
RUXIMICS.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
45.14.226.64:443
https://bbs.lvsehacker.com/jquery-3.3.1.min.js
unknown
binary
5.50 Kb
malicious
6944
svchost.exe
GET
200
2.16.164.9:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
2.16.164.9:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
45.14.226.64:443
https://bbs.lvsehacker.com/jquery-3.3.1.min.js
unknown
GET
200
45.14.226.64:443
https://bbs.lvsehacker.com/jquery-3.3.1.min.js
unknown
binary
5.50 Kb
malicious
GET
200
45.14.226.64:443
https://bbs.lvsehacker.com/jquery-3.3.1.min.js
unknown
binary
5.56 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6944
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
1252
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5488
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.23.209.189:443
www.bing.com
Akamai International B.V.
GB
whitelisted
4
System
192.168.100.255:138
whitelisted
6464
2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe
142.250.185.228:443
www.google.com
GOOGLE
US
whitelisted
6464
2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe
103.235.47.188:443
www.baidu.com
Beijing Baidu Netcom Science and Technology Co., Ltd.
HK
whitelisted
6464
2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe
45.14.226.64:443
bbs.lvsehacker.com
SpectraIP B.V.
NL
unknown
6464
2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe
162.159.46.1:443
cloudflare-ip-v4.html.zone
CLOUDFLARENET
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
whitelisted
www.bing.com
  • 2.23.209.189
  • 2.23.209.143
  • 2.23.209.142
  • 2.23.209.137
  • 2.23.209.133
  • 2.23.209.135
  • 2.23.209.144
  • 2.23.209.140
  • 2.23.209.186
whitelisted
google.com
  • 142.250.185.78
whitelisted
cloudflare-ip-v4.html.zone
  • 162.159.46.1
  • 162.159.36.1
unknown
www.google.com
  • 142.250.185.228
whitelisted
www.baidu.com
  • 103.235.47.188
  • 103.235.46.96
whitelisted
bbs.lvsehacker.com
  • 45.14.226.64
malicious
f3hrq9vj.bjguigang.com
  • 45.14.224.176
unknown
crl.microsoft.com
  • 2.16.164.9
  • 2.16.164.43
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted

Threats

PID
Process
Class
Message
Malware Command and Control Activity Detected
ET MALWARE Cobalt Strike Malleable C2 JQuery Custom Profile M2
A Network Trojan was detected
ET MALWARE Cobalt Strike Beacon Activity (GET)
Malware Command and Control Activity Detected
ET MALWARE Cobalt Strike Malleable C2 JQuery Custom Profile Response
Malware Command and Control Activity Detected
ET MALWARE Cobalt Strike Malleable C2 JQuery Custom Profile M2
A Network Trojan was detected
ET MALWARE Cobalt Strike Beacon Activity (GET)
Malware Command and Control Activity Detected
ET MALWARE Cobalt Strike Malleable C2 JQuery Custom Profile M2
A Network Trojan was detected
ET MALWARE Cobalt Strike Beacon Activity (GET)
Malware Command and Control Activity Detected
ET MALWARE Cobalt Strike Malleable C2 JQuery Custom Profile Response
Malware Command and Control Activity Detected
ET MALWARE Cobalt Strike Malleable C2 JQuery Custom Profile M2
A Network Trojan was detected
ET MALWARE Cobalt Strike Beacon Activity (GET)
No debug info