File name:

3x24-12-14.zip

Full analysis: https://app.any.run/tasks/e23ce71d-e8f5-4841-9d1f-4642c8c8a8cd
Verdict: Malicious activity
Threats:

Cobalt Strike is a legitimate penetration software toolkit developed by Forta. But its cracked versions are widely adopted by bad actors, who use it as a C2 system of choice for targeted attacks.

Analysis date: December 14, 2024, 07:30:05
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
cobaltstrike
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=AES Encrypted
MD5:

822AAF1D2944A55EC5601C8A123CD7BD

SHA1:

9BCE8204060F4C6146BBABF4509B75D8BD6A87D2

SHA256:

38C68D9BF561E61B7AC46E5CFA6BF5F92C866340898A71D5530ED995C4A4DA2F

SSDEEP:

98304:s5PP/NnQ92oWveMHLqq6qx1iIpA/bN7KDkfCxgWIWVQp0Oq6FMIeQ7pHFhIx7P2m:CbGO

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • Telegram.exe (PID: 4628)
    • COBALTSTRIKE has been detected (YARA)

      • Telegram.exe (PID: 4628)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Telegram.exe (PID: 4628)
    • Checks Windows Trust Settings

      • Telegram.exe (PID: 4628)
  • INFO

    • The process uses the downloaded file

      • WinRAR.exe (PID: 6096)
    • Reads the computer name

      • 王子皓-监督反馈-关于在招聘过程中遭遇到的不公平对待反馈.exe (PID: 4876)
      • Telegram.exe (PID: 4628)
      • 必须从不行.exe (PID: 5972)
    • Checks supported languages

      • 王子皓-监督反馈-关于在招聘过程中遭遇到的不公平对待反馈.exe (PID: 4876)
      • Telegram.exe (PID: 4628)
      • 必须从不行.exe (PID: 5972)
    • Manual execution by a user

      • Telegram.exe (PID: 4628)
      • 王子皓-监督反馈-关于在招聘过程中遭遇到的不公平对待反馈.exe (PID: 4876)
      • 必须从不行.exe (PID: 5972)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 6096)
    • Checks proxy server information

      • Telegram.exe (PID: 4628)
    • Reads the software policy settings

      • Telegram.exe (PID: 4628)
    • Reads the machine GUID from the registry

      • Telegram.exe (PID: 4628)
    • Create files in a temporary directory

      • 必须从不行.exe (PID: 5972)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: ??????-?ල????-????????Ƹ?????????????IJ???ƽ?Դ?????.exe
ZipUncompressedSize: 20480
ZipCompressedSize: 9530
ZipCRC: 0xd30ca6bd
ZipModifyDate: 2024:12:14 11:46:32
ZipCompression: Unknown (99)
ZipBitFlag: 0x0009
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
123
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs 王子皓-监督反馈-关于在招聘过程中遭遇到的不公平对待反馈.exe no specs #COBALTSTRIKE telegram.exe 必须从不行.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6096"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\3x24-12-14.zipC:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
4876"C:\Users\admin\Desktop\王子皓-监督反馈-关于在招聘过程中遭遇到的不公平对待反馈.exe" C:\Users\admin\Desktop\王子皓-监督反馈-关于在招聘过程中遭遇到的不公平对待反馈.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\王子皓-监督反馈-关于在招聘过程中遭遇到的不公平对待反馈.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
4628"C:\Users\admin\Desktop\Telegram.exe" C:\Users\admin\Desktop\Telegram.exe
explorer.exe
User:
admin
Company:
Telegram FZ-LLC
Integrity Level:
MEDIUM
Description:
Telegram Desktop
Version:
5.8.3.0
Modules
Images
c:\users\admin\desktop\telegram.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\vcruntime140.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
5972"C:\Users\admin\Desktop\必须从不行.exe" C:\Users\admin\Desktop\必须从不行.exeexplorer.exe
User:
admin
Company:
TODO: <Company name>
Integrity Level:
MEDIUM
Description:
SunloginClient
Version:
1.0.0.1
Modules
Images
c:\users\admin\desktop\必须从不行.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
5 159
Read events
5 143
Write events
16
Delete events
0

Modification events

(PID) Process:(6096) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6096) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6096) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6096) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\3x24-12-14.zip
(PID) Process:(6096) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6096) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6096) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6096) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6096) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\VirusScan
Operation:writeName:DefScanner
Value:
Windows Defender
(PID) Process:(6096) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Notifications
Operation:writeName:NotifyPswMan
Value:
1
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
18
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
74.48.129.165:443
https://74.48.129.165/jquery-3.3.1.min.js
unknown
binary
5.58 Kb
GET
200
74.48.129.165:443
https://74.48.129.165/jquery-3.3.1.min.js
unknown
binary
5.52 Kb
GET
200
74.48.129.165:443
https://74.48.129.165/jquery-3.3.1.min.js
unknown
binary
5.52 Kb
GET
200
74.48.129.165:443
https://74.48.129.165/jquery-3.3.1.min.js
unknown
binary
5.48 Kb
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:138
whitelisted
3000
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6032
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
3000
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3976
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4628
Telegram.exe
74.48.129.165:443
CA
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
google.com
  • 142.250.185.174
whitelisted
self.events.data.microsoft.com
  • 20.42.73.27
whitelisted

Threats

No threats detected
No debug info