File name:

226e8f646a61026f4a57a56e0d4d972978a9e1d41e05cf950180eda5c11b35e0

Full analysis: https://app.any.run/tasks/216a0126-a34c-45bb-abe1-7c3334c3427c
Verdict: Malicious activity
Threats:

Cobalt Strike is a legitimate penetration software toolkit developed by Forta. But its cracked versions are widely adopted by bad actors, who use it as a C2 system of choice for targeted attacks.

Analysis date: April 18, 2025, 10:37:05
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
cobaltstrike
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 6 sections
MD5:

112C8A63B8EC283EFFE46CCCBBFB0545

SHA1:

BBE3712731B1E7413CC32493A89A1B69A4C8D65A

SHA256:

226E8F646A61026F4A57A56E0D4D972978A9E1D41E05CF950180EDA5C11B35E0

SSDEEP:

12288:EyOlkk1+BNxBoEmrQ3vdhLP9JULV9FfY+h:vI+Ay/DjizJh

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • COBALTSTRIKE has been detected (YARA)

      • winlogon.exe (PID: 7492)
    • Executing a file with an untrusted certificate

      • 226e8f646a61026f4a57a56e0d4d972978a9e1d41e05cf950180eda5c11b35e0.exe (PID: 7432)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • The sample compiled with chinese language support

      • 226e8f646a61026f4a57a56e0d4d972978a9e1d41e05cf950180eda5c11b35e0.exe (PID: 7432)
    • Checks supported languages

      • 226e8f646a61026f4a57a56e0d4d972978a9e1d41e05cf950180eda5c11b35e0.exe (PID: 7432)
    • Checks proxy server information

      • winlogon.exe (PID: 7492)
      • slui.exe (PID: 7772)
    • Reads security settings of Internet Explorer

      • winlogon.exe (PID: 7492)
    • Reads the software policy settings

      • slui.exe (PID: 7772)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

CobalStrike

(PID) Process(7492) winlogon.exe
C2 (1)127.0.0.1/IE9CompatViewList.xml
BeaconTypeHTTP
Port80
SleepTime60000
MaxGetSize1048576
Jitter0
MaxDNS255
PublicKey-----BEGIN PUBLIC KEY----- MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCTUlJ7J79z/MkkV8+MsYlOvREE 2hhdGNzrKPFZ10lY0K5legA+um5JxESEaC0woDgSmOGrkh1giz/aQwd6tG4mihFg pi0oIbfwu6XZbE6ghYGyu2F7+A5TifRUzvU0YLXjK78EW12XhjHx4KopMF/AtOAu eGwfiI2DmXwNzrBDvwIDAQAB -----END PUBLIC KEY-----
UserAgentMozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; QQDownload 733; .NET CLR 2.0.50727)
HttpPostUri/submit.php
HttpGet_Metadata
SessionId (2)base64
header: Cookie
HttpPost_Metadata
ConstHeaders (1)Content-Type: application/octet-stream
SessionId (1)parameter: id
Output (1)print
SpawnTo00000000000000000000000000000000
Spawnto_x86%windir%\syswow64\rundll32.exe
Spawnto_x64%windir%\sysnative\rundll32.exe
CryptoScheme0
DNS_Idle0.0.0.0
DNS_Sleep0
HttpGet_VerbGET
HttpPost_VerbPOST
HttpPostChunk0
Watermark305419896
bStageCleanupFalse
bCFGCautionFalse
bUsesCookies0001
Proxy_BehaviorUse IE settings
KillDate0-0-0
bProcInject_StartRWXTrue
bProcInject_UseRWXTrue
bProcInject_MinAllocSize0
ProcInject_PrependAppend_x86000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000...
ProcInject_PrependAppend_x64000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000...
ProcInject_Stuba56c813864af878a4c10083ca1578e0a
ProcInject_AllocationMethodVirtualAllocEx
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:04:18 08:29:01+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.43
CodeSize: 8192
InitializedDataSize: 409088
UninitializedDataSize: -
EntryPoint: 0x2528
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
FileVersionNumber: 3.1.2.1
ProductVersionNumber: 3.1.2.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Chinese (Simplified)
CharacterSet: Unicode
CompanyName: LSZ
FileDescription: LSZ's Paper
FileVersion: 3.1.2.1
InternalName: AA-Virus.exe
LegalCopyright: Copyright (C) 2025
OriginalFileName: AA-Virus.exe
ProductName: LSZ's Paper
ProductVersion: 3.1.2.1
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
122
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 226e8f646a61026f4a57a56e0d4d972978a9e1d41e05cf950180eda5c11b35e0.exe no specs conhost.exe no specs #COBALTSTRIKE winlogon.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
7432"C:\Users\admin\Desktop\226e8f646a61026f4a57a56e0d4d972978a9e1d41e05cf950180eda5c11b35e0.exe" C:\Users\admin\Desktop\226e8f646a61026f4a57a56e0d4d972978a9e1d41e05cf950180eda5c11b35e0.exeexplorer.exe
User:
admin
Company:
LSZ
Integrity Level:
MEDIUM
Description:
LSZ's Paper
Exit code:
0
Version:
3.1.2.1
Modules
Images
c:\users\admin\desktop\226e8f646a61026f4a57a56e0d4d972978a9e1d41e05cf950180eda5c11b35e0.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7440\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exe226e8f646a61026f4a57a56e0d4d972978a9e1d41e05cf950180eda5c11b35e0.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7492winlogonC:\Windows\System32\winlogon.exe
226e8f646a61026f4a57a56e0d4d972978a9e1d41e05cf950180eda5c11b35e0.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Logon Application
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\winlogon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
CobalStrike
(PID) Process(7492) winlogon.exe
C2 (1)127.0.0.1/IE9CompatViewList.xml
BeaconTypeHTTP
Port80
SleepTime60000
MaxGetSize1048576
Jitter0
MaxDNS255
PublicKey-----BEGIN PUBLIC KEY----- MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCTUlJ7J79z/MkkV8+MsYlOvREE 2hhdGNzrKPFZ10lY0K5legA+um5JxESEaC0woDgSmOGrkh1giz/aQwd6tG4mihFg pi0oIbfwu6XZbE6ghYGyu2F7+A5TifRUzvU0YLXjK78EW12XhjHx4KopMF/AtOAu eGwfiI2DmXwNzrBDvwIDAQAB -----END PUBLIC KEY-----
UserAgentMozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; QQDownload 733; .NET CLR 2.0.50727)
HttpPostUri/submit.php
HttpGet_Metadata
SessionId (2)base64
header: Cookie
HttpPost_Metadata
ConstHeaders (1)Content-Type: application/octet-stream
SessionId (1)parameter: id
Output (1)print
SpawnTo00000000000000000000000000000000
Spawnto_x86%windir%\syswow64\rundll32.exe
Spawnto_x64%windir%\sysnative\rundll32.exe
CryptoScheme0
DNS_Idle0.0.0.0
DNS_Sleep0
HttpGet_VerbGET
HttpPost_VerbPOST
HttpPostChunk0
Watermark305419896
bStageCleanupFalse
bCFGCautionFalse
bUsesCookies0001
Proxy_BehaviorUse IE settings
KillDate0-0-0
bProcInject_StartRWXTrue
bProcInject_UseRWXTrue
bProcInject_MinAllocSize0
ProcInject_PrependAppend_x86000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000...
ProcInject_PrependAppend_x64000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000...
ProcInject_Stuba56c813864af878a4c10083ca1578e0a
ProcInject_AllocationMethodVirtualAllocEx
7772C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
3 861
Read events
3 861
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
20
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
7176
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7772
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.206
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info