| File name: | 2025-04-29_fab6ad8ad8afd49199d3d5346f0cbd99_akira_cobalt-strike_satacom |
| Full analysis: | https://app.any.run/tasks/e5f86048-af4b-42aa-9e4a-01b77711864f |
| Verdict: | Malicious activity |
| Analysis date: | April 29, 2025, 18:51:05 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (GUI) x86-64, for MS Windows, 6 sections |
| MD5: | FAB6AD8AD8AFD49199D3D5346F0CBD99 |
| SHA1: | 57BB44FBBCD765064961E7EDDCAEC5F49140B702 |
| SHA256: | BBC4F49BD024CE23F952A1644451D68F80445E52E24E90FF448E5B9D2C1D7C0D |
| SSDEEP: | 98304:B8WUp3P3b13Ob0EPGkxaqxGEA3Pu2N2qI81u/POuLr+Erc7IFYn/DLw/DBW0616b:STXJpOCQX6 |
| .exe | | | Generic Win/DOS Executable (50) |
|---|---|---|
| .exe | | | DOS Executable Generic (49.9) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2025:04:27 16:05:58+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.41 |
| CodeSize: | 2279424 |
| InitializedDataSize: | 22918656 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x212828 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 0.1.0.0 |
| ProductVersionNumber: | 0.1.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| LegalCopyright: | Copyright © 2023 |
| ProductVersion: | 0.1.0 |
| FileVersion: | 0.1.0 |
| ProductName: | Application Setup |
| FileDescription: | Application Setup |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 496 | "C:\Users\admin\Desktop\2025-04-29_fab6ad8ad8afd49199d3d5346f0cbd99_akira_cobalt-strike_satacom.exe" | C:\Users\admin\Desktop\2025-04-29_fab6ad8ad8afd49199d3d5346f0cbd99_akira_cobalt-strike_satacom.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Application Setup Exit code: 3221226540 Version: 0.1.0 Modules
| |||||||||||||||
| 496 | /Processid:{13B6B196-AD7B-4C7F-9BDC-B1CB2EE86552} | C:\Windows\SysWOW64\dllhost.exe | ReleaseDirect.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: COM Surrogate Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 680 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | MIdCXYueaYVjpwb.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 728 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | WMIC.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 928 | C:\WINDOWS\system32\DllHost.exe /Processid:{A6BFEA43-501F-456F-A845-983D3AD7B8F0} | C:\Windows\System32\dllhost.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: COM Surrogate Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1228 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1276 | "powershell" -NoLogo -NoProfile -ExecutionPolicy Bypass -Command "Start-Process -NoNewWindow -Wait -FilePath \"C:\Program Files (x86)\BrokerAdminister\MIdCXYueaYVjpwb.exe\" -ArgumentList @(\"x\",'\"C:\Program Files (x86)\BrokerAdminister\InspireInvestigatorJubilant\"', '\"-p9)=88wzYxSImproveProtectorCreative\"', '-o\"C:\Program Files (x86)\BrokerAdminister\"', \"-y\")" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | 2025-04-29_fab6ad8ad8afd49199d3d5346f0cbd99_akira_cobalt-strike_satacom.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1276 | /Processid:{13B6B196-AD7B-4C7F-9BDC-B1CB2EE86552} | C:\Windows\SysWOW64\dllhost.exe | — | ReleaseDirect.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: COM Surrogate Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1324 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | WMIC.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1348 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (2148) dllhost.exe | Key: | HKEY_CURRENT_USER\WEByte\Setup |
| Operation: | delete value | Name: | kpi |
Value: | |||
| (PID) Process: | (6576) ReleaseDirect.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Avast Software\Avast |
| Operation: | write | Name: | ProgramFolder |
Value: C:\Windows | |||
| (PID) Process: | (496) dllhost.exe | Key: | HKEY_CURRENT_USER\WEByte\Setup |
| Operation: | write | Name: | MarkTime |
Value: 2025-04-29 18:52 | |||
| (PID) Process: | (5400) wsc_proxy.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Avast Software\Avast\properties |
| Operation: | write | Name: | UseRegistry |
Value: 1 | |||
| (PID) Process: | (5400) wsc_proxy.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Avast Software\Avast\Wsc |
| Operation: | write | Name: | IWscASStatus |
Value: Windows °²È«ÖÐÐÄ | |||
| (PID) Process: | (5400) wsc_proxy.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Avast Software\Avast\Wsc |
| Operation: | write | Name: | IWscAVStatus4 |
Value: Windows °²È«ÖÐÐÄ | |||
| (PID) Process: | (2332) WerFault.exe | Key: | \REGISTRY\A\{283fd4da-e520-1ae2-47e6-12e835c77cc8}\Root\InventoryApplicationFile |
| Operation: | write | Name: | WritePermissionsCheck |
Value: 1 | |||
| (PID) Process: | (2332) WerFault.exe | Key: | \REGISTRY\A\{283fd4da-e520-1ae2-47e6-12e835c77cc8}\Root\InventoryApplicationFile\PermissionsCheckTestKey |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (2332) WerFault.exe | Key: | \REGISTRY\A\{283fd4da-e520-1ae2-47e6-12e835c77cc8}\Root\InventoryApplicationFile\wsc_proxy.exe|16071c0161cb698e |
| Operation: | write | Name: | ProgramId |
Value: 0006b6aa4fee73eab365f3bda034d8ea1e0e00000904 | |||
| (PID) Process: | (2332) WerFault.exe | Key: | \REGISTRY\A\{283fd4da-e520-1ae2-47e6-12e835c77cc8}\Root\InventoryApplicationFile\wsc_proxy.exe|16071c0161cb698e |
| Operation: | write | Name: | FileId |
Value: 0000ff2d55a844c1fd37b3841cefa7e2d21de5fa8bac | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6744 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_kf4nepno.tjd.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 2852 | 2025-04-29_fab6ad8ad8afd49199d3d5346f0cbd99_akira_cobalt-strike_satacom.exe | C:\Program Files (x86)\BrokerAdminister\MIdCXYueaYVjpwb.exe | executable | |
MD5:E877ED2D9463E6729DB5768F23640AA4 | SHA256:2E2E69B6E3DA6D3BB46207D1393D6253E96ECB7DD1C4D6A41EC41A55F1516549 | |||
| 2852 | 2025-04-29_fab6ad8ad8afd49199d3d5346f0cbd99_akira_cobalt-strike_satacom.exe | C:\Program Files (x86)\BrokerAdminister\InspireInvestigatorJubilant | compressed | |
MD5:A47FC9FF96285807EBAFB754D8F47DCD | SHA256:91161956EDF08F76352D77582416FF4940DA5FBA212563E05D8CFC97BD195199 | |||
| 4208 | MIdCXYueaYVjpwb.exe | C:\Program Files (x86)\BrokerAdminister\EmphasizeEmphasize.exe | executable | |
MD5:4E85CC36ADC996C3DDD3A9825D4B7F73 | SHA256:7B36E127E1FA53E0C6462312777C5D004EA83BDE67E6DF32FB8920B6C001D664 | |||
| 4208 | MIdCXYueaYVjpwb.exe | C:\Program Files (x86)\BrokerAdminister\powrprof.dll | executable | |
MD5:FB761CCEF534D74C038EB2BB06D92520 | SHA256:8D3A3A1395853AD3370751C9FA42BE7C402003B7A24A747A48BCD67BE1BB8B87 | |||
| 6744 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_rw3ytz0t.qzw.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 4208 | MIdCXYueaYVjpwb.exe | C:\Program Files (x86)\BrokerAdminister\LocateInvestigate.sys | binary | |
MD5:F9439325476953659B217D9B3C69E11F | SHA256:6AE39D629A811E4F77EC6C20E324C05E3192E2C71940FE39F52F6819CC0CACD7 | |||
| 2852 | 2025-04-29_fab6ad8ad8afd49199d3d5346f0cbd99_akira_cobalt-strike_satacom.exe | C:\Program Files (x86)\BrokerAdminister\ReleaseDirect.exe | executable | |
MD5:17E91366D47747E4BC057CE3AC756F2F | SHA256:994ADE4418FBE04B5B36C8822C2C83A993E3ABF9E39251BFEC8B6FB97166BFEF | |||
| 4208 | MIdCXYueaYVjpwb.exe | C:\Program Files (x86)\BrokerAdminister\GroupDefine.exe | executable | |
MD5:662AFB17F56E59E568FA3BC4967540AD | SHA256:CF6AA755224E5DA3CEE8B256269ABDD4D76D59906F5C60FD85851BCD9E0708F7 | |||
| 1616 | MIdCXYueaYVjpwb.exe | C:\Program Files (x86)\BrokerAdminister\InfluenceBackerAstute | compressed | |
MD5:622C52C222A5835FC8653C85CA5439DF | SHA256:E94BF30D4A9982C84365D979DCCF844DB22524BE822C26E3AA1F58AABE0744B5 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2104 | svchost.exe | GET | 200 | 23.48.23.156:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2104 | svchost.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2852 | 2025-04-29_fab6ad8ad8afd49199d3d5346f0cbd99_akira_cobalt-strike_satacom.exe | GET | — | 110.242.69.67:80 | http://110.242.69.67:80/gift | unknown | — | — | unknown |
— | — | GET | 200 | 20.12.23.50:443 | https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL | unknown | — | — | unknown |
2984 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
— | — | GET | 304 | 20.12.23.50:443 | https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL | unknown | — | — | unknown |
— | — | GET | 200 | 52.165.164.15:443 | https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping | unknown | — | — | unknown |
— | — | GET | 200 | 20.12.23.50:443 | https://slscr.update.microsoft.com/sls/ping | unknown | — | — | unknown |
2984 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
2984 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1616 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
2104 | svchost.exe | 23.48.23.156:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
2104 | svchost.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
1616 | RUXIMICS.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
— | — | 40.126.29.7:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
6544 | svchost.exe | 40.126.29.7:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
wan.baidu.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
2.100.168.192.in-addr.arpa |
| whitelisted |
jiankang.baidu.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2196 | svchost.exe | Potentially Bad Traffic | ET INFO DNS Query for Suspicious .icu Domain |
2196 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
Process | Message |
|---|---|
wsc_proxy.exe | [2025-04-29 18:52:02.303] [error ] [crashguard ] [ 5400: 5436] [E9669F: 103] Dump path 'C:\ProgramData\Avast Software\Avast\log' does not exist. Directory should be already created.
|