| File name: | 2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk |
| Full analysis: | https://app.any.run/tasks/caf0afab-eb04-4124-b521-f70c594114c9 |
| Verdict: | Malicious activity |
| Threats: | A backdoor is a type of cybersecurity threat that allows attackers to secretly compromise a system and conduct malicious activities, such as stealing data and modifying files. Backdoors can be difficult to detect, as they often use legitimate system applications to evade defense mechanisms. Threat actors often utilize special malware, such as PlugX, to establish backdoors on target devices. |
| Analysis date: | October 28, 2024, 14:39:48 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (GUI) x86-64, for MS Windows, 12 sections |
| MD5: | C9C4D2C659985660EB9D8AFC35BB51B8 |
| SHA1: | 622E529898CB530AD93937FC50E7C1225C179021 |
| SHA256: | 14030B5868E045EB1508F44697520CCADCB3247D9165E3E02F45B1CF94CB93EF |
| SSDEEP: | 49152:fjj5hOpu3JwIvrpsKdqY3BDhS418t8rlWZFPjBrDkrzglW7rluncEV:bj3OqJfrpjdqY3Z3WZFPjxkrzic |
| .exe | | | Generic Win/DOS Executable (50) |
|---|---|---|
| .exe | | | DOS Executable Generic (49.9) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2024:10:24 02:38:34+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14 |
| CodeSize: | 704000 |
| InitializedDataSize: | 835584 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x7d0c8 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 6464 | "C:\Users\admin\Desktop\2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe" | C:\Users\admin\Desktop\2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
xor-url(PID) Process(6464) 2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe Decrypted-URLs (1)http://code.jquery.com/ CobalStrike(PID) Process(6464) 2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe C2 (1)bbs.lvsehacker.com/jquery-3.3.1.min.js BeaconTypeHTTPS Port443 SleepTime45000 MaxGetSize1403644 Jitter37 PublicKey-----BEGIN PUBLIC KEY-----
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCySJmC2Kejyh8wxJ7se4S8yRTR
Dzcy9+eXXqg9piZJEbTSHg1tnouvf/iODXvyVIQn1CXADdK4eJlxGpkOyB10zSV6
UMOmvqDD2zvoTgkVuSVxgSwtkPlAcrpRUmJTiaAa/ipJ5Yn+vbAO7RWGnOViyP8J
GdrnXD1Dwv4eW3L2CQIDAQAB
-----END PUBLIC KEY----- DNS_strategyround-robin DNS_strategy_rotate_seconds-1 DNS_strategy_fail_x-1 DNS_strategy_fail_seconds-1 SpawnTo00000000000000000000000000000000 Spawnto_x86%windir%\syswow64\dllhost.exe Spawnto_x64%windir%\sysnative\dllhost.exe CryptoScheme0 HttpGet_VerbGET HttpPost_VerbPOST HttpPostChunk0 Watermark987654321 bStageCleanupTrue bCFGCautionFalse UserAgentMozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko HttpPostUri/jquery-3.3.2.min.js Malleable_C2_InstructionsRemove 1 bytes at the end, Remove 84 bytes from the beginning, Remove 3931 bytes from the beginning, Base64 URL-safe decode, XOR mask w/ random key HttpGet_Metadata ConstHeaders (3)Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Referer: http://code.jquery.com/ Accept-Encoding: gzip, deflate SessionId (3)base64url prepend: __cfduid= header: Cookie HttpPost_Metadata ConstHeaders (3)Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Referer: http://code.jquery.com/ Accept-Encoding: gzip, deflate SessionId (3)mask base64url parameter: __cfduid Output (3)mask base64url print bUsesCookies0001 Proxy_BehaviorUse IE settings tcpFrameHeader0005800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 smbFrameHeader0005800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 KillDate0-0-0 bProcInject_StartRWXFalse bProcInject_UseRWXFalse bProcInject_MinAllocSize17500 ProcInject_PrependAppend_x869090.. ProcInject_PrependAppend_x649090.. ProcInject_Stubae5afcfee8026674dc8f3b4f2da46c7f ProcInject_AllocationMethodNtMapViewOfSection | |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6464 | 2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsSecurityHealthSystray.lnk | binary | |
MD5:1D961B76DB408C755D6059C28D606D23 | SHA256:69734E7A9FD2E7565697BDCF4C31CD2AF9BFE82A7923F80E7FBA513F9B303A35 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1252 | RUXIMICS.exe | GET | 200 | 2.16.164.9:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6944 | svchost.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
1252 | RUXIMICS.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 45.14.226.64:443 | https://bbs.lvsehacker.com/jquery-3.3.1.min.js | unknown | binary | 5.50 Kb | malicious |
6944 | svchost.exe | GET | 200 | 2.16.164.9:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5488 | MoUsoCoreWorker.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5488 | MoUsoCoreWorker.exe | GET | 200 | 2.16.164.9:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | — | 45.14.226.64:443 | https://bbs.lvsehacker.com/jquery-3.3.1.min.js | unknown | — | — | — |
— | — | GET | 200 | 45.14.226.64:443 | https://bbs.lvsehacker.com/jquery-3.3.1.min.js | unknown | binary | 5.50 Kb | malicious |
— | — | GET | 200 | 45.14.226.64:443 | https://bbs.lvsehacker.com/jquery-3.3.1.min.js | unknown | binary | 5.56 Kb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
6944 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1252 | RUXIMICS.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
5488 | MoUsoCoreWorker.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 2.23.209.189:443 | www.bing.com | Akamai International B.V. | GB | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
6464 | 2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe | 142.250.185.228:443 | www.google.com | GOOGLE | US | whitelisted |
6464 | 2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe | 103.235.47.188:443 | www.baidu.com | Beijing Baidu Netcom Science and Technology Co., Ltd. | HK | whitelisted |
6464 | 2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe | 45.14.226.64:443 | bbs.lvsehacker.com | SpectraIP B.V. | NL | unknown |
6464 | 2024-10-28_c9c4d2c659985660eb9d8afc35bb51b8_cobalt-strike_cobaltstrike_ryuk.exe | 162.159.46.1:443 | cloudflare-ip-v4.html.zone | CLOUDFLARENET | — | unknown |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
google.com |
| whitelisted |
cloudflare-ip-v4.html.zone |
| unknown |
www.google.com |
| whitelisted |
www.baidu.com |
| whitelisted |
bbs.lvsehacker.com |
| malicious |
f3hrq9vj.bjguigang.com |
| unknown |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Malware Command and Control Activity Detected | ET MALWARE Cobalt Strike Malleable C2 JQuery Custom Profile M2 |
— | — | A Network Trojan was detected | ET MALWARE Cobalt Strike Beacon Activity (GET) |
— | — | Malware Command and Control Activity Detected | ET MALWARE Cobalt Strike Malleable C2 JQuery Custom Profile Response |
— | — | Malware Command and Control Activity Detected | ET MALWARE Cobalt Strike Malleable C2 JQuery Custom Profile M2 |
— | — | A Network Trojan was detected | ET MALWARE Cobalt Strike Beacon Activity (GET) |
— | — | Malware Command and Control Activity Detected | ET MALWARE Cobalt Strike Malleable C2 JQuery Custom Profile M2 |
— | — | A Network Trojan was detected | ET MALWARE Cobalt Strike Beacon Activity (GET) |
— | — | Malware Command and Control Activity Detected | ET MALWARE Cobalt Strike Malleable C2 JQuery Custom Profile Response |
— | — | Malware Command and Control Activity Detected | ET MALWARE Cobalt Strike Malleable C2 JQuery Custom Profile M2 |
— | — | A Network Trojan was detected | ET MALWARE Cobalt Strike Beacon Activity (GET) |