File name: | 2025-04-29_fab6ad8ad8afd49199d3d5346f0cbd99_akira_cobalt-strike_satacom |
Full analysis: | https://app.any.run/tasks/e5f86048-af4b-42aa-9e4a-01b77711864f |
Verdict: | Malicious activity |
Analysis date: | April 29, 2025, 18:51:05 |
OS: | Windows 10 Professional (build: 19044, 64 bit) |
Tags: | |
Indicators: | |
MIME: | application/vnd.microsoft.portable-executable |
File info: | PE32+ executable (GUI) x86-64, for MS Windows, 6 sections |
MD5: | FAB6AD8AD8AFD49199D3D5346F0CBD99 |
SHA1: | 57BB44FBBCD765064961E7EDDCAEC5F49140B702 |
SHA256: | BBC4F49BD024CE23F952A1644451D68F80445E52E24E90FF448E5B9D2C1D7C0D |
SSDEEP: | 98304:B8WUp3P3b13Ob0EPGkxaqxGEA3Pu2N2qI81u/POuLr+Erc7IFYn/DLw/DBW0616b:STXJpOCQX6 |
.exe | | | Generic Win/DOS Executable (50) |
---|---|---|
.exe | | | DOS Executable Generic (49.9) |
MachineType: | AMD AMD64 |
---|---|
TimeStamp: | 2025:04:27 16:05:58+00:00 |
ImageFileCharacteristics: | Executable, Large address aware |
PEType: | PE32+ |
LinkerVersion: | 14.41 |
CodeSize: | 2279424 |
InitializedDataSize: | 22918656 |
UninitializedDataSize: | - |
EntryPoint: | 0x212828 |
OSVersion: | 6 |
ImageVersion: | - |
SubsystemVersion: | 6 |
Subsystem: | Windows GUI |
FileVersionNumber: | 0.1.0.0 |
ProductVersionNumber: | 0.1.0.0 |
FileFlagsMask: | 0x003f |
FileFlags: | (none) |
FileOS: | Windows NT 32-bit |
ObjectFileType: | Executable application |
FileSubtype: | - |
LanguageCode: | Neutral |
CharacterSet: | Unicode |
LegalCopyright: | Copyright © 2023 |
ProductVersion: | 0.1.0 |
FileVersion: | 0.1.0 |
ProductName: | Application Setup |
FileDescription: | Application Setup |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
496 | "C:\Users\admin\Desktop\2025-04-29_fab6ad8ad8afd49199d3d5346f0cbd99_akira_cobalt-strike_satacom.exe" | C:\Users\admin\Desktop\2025-04-29_fab6ad8ad8afd49199d3d5346f0cbd99_akira_cobalt-strike_satacom.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Application Setup Exit code: 3221226540 Version: 0.1.0 Modules
| |||||||||||||||
496 | /Processid:{13B6B196-AD7B-4C7F-9BDC-B1CB2EE86552} | C:\Windows\SysWOW64\dllhost.exe | ReleaseDirect.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: COM Surrogate Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
680 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | MIdCXYueaYVjpwb.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
728 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | WMIC.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
928 | C:\WINDOWS\system32\DllHost.exe /Processid:{A6BFEA43-501F-456F-A845-983D3AD7B8F0} | C:\Windows\System32\dllhost.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: COM Surrogate Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
1228 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1276 | "powershell" -NoLogo -NoProfile -ExecutionPolicy Bypass -Command "Start-Process -NoNewWindow -Wait -FilePath \"C:\Program Files (x86)\BrokerAdminister\MIdCXYueaYVjpwb.exe\" -ArgumentList @(\"x\",'\"C:\Program Files (x86)\BrokerAdminister\InspireInvestigatorJubilant\"', '\"-p9)=88wzYxSImproveProtectorCreative\"', '-o\"C:\Program Files (x86)\BrokerAdminister\"', \"-y\")" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | 2025-04-29_fab6ad8ad8afd49199d3d5346f0cbd99_akira_cobalt-strike_satacom.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1276 | /Processid:{13B6B196-AD7B-4C7F-9BDC-B1CB2EE86552} | C:\Windows\SysWOW64\dllhost.exe | — | ReleaseDirect.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: COM Surrogate Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
1324 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | WMIC.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1348 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
|
(PID) Process: | (2148) dllhost.exe | Key: | HKEY_CURRENT_USER\WEByte\Setup |
Operation: | delete value | Name: | kpi |
Value: | |||
(PID) Process: | (6576) ReleaseDirect.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Avast Software\Avast |
Operation: | write | Name: | ProgramFolder |
Value: C:\Windows | |||
(PID) Process: | (496) dllhost.exe | Key: | HKEY_CURRENT_USER\WEByte\Setup |
Operation: | write | Name: | MarkTime |
Value: 2025-04-29 18:52 | |||
(PID) Process: | (5400) wsc_proxy.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Avast Software\Avast\properties |
Operation: | write | Name: | UseRegistry |
Value: 1 | |||
(PID) Process: | (5400) wsc_proxy.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Avast Software\Avast\Wsc |
Operation: | write | Name: | IWscASStatus |
Value: Windows °²È«ÖÐÐÄ | |||
(PID) Process: | (5400) wsc_proxy.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Avast Software\Avast\Wsc |
Operation: | write | Name: | IWscAVStatus4 |
Value: Windows °²È«ÖÐÐÄ | |||
(PID) Process: | (2332) WerFault.exe | Key: | \REGISTRY\A\{283fd4da-e520-1ae2-47e6-12e835c77cc8}\Root\InventoryApplicationFile |
Operation: | write | Name: | WritePermissionsCheck |
Value: 1 | |||
(PID) Process: | (2332) WerFault.exe | Key: | \REGISTRY\A\{283fd4da-e520-1ae2-47e6-12e835c77cc8}\Root\InventoryApplicationFile\PermissionsCheckTestKey |
Operation: | delete key | Name: | (default) |
Value: | |||
(PID) Process: | (2332) WerFault.exe | Key: | \REGISTRY\A\{283fd4da-e520-1ae2-47e6-12e835c77cc8}\Root\InventoryApplicationFile\wsc_proxy.exe|16071c0161cb698e |
Operation: | write | Name: | ProgramId |
Value: 0006b6aa4fee73eab365f3bda034d8ea1e0e00000904 | |||
(PID) Process: | (2332) WerFault.exe | Key: | \REGISTRY\A\{283fd4da-e520-1ae2-47e6-12e835c77cc8}\Root\InventoryApplicationFile\wsc_proxy.exe|16071c0161cb698e |
Operation: | write | Name: | FileId |
Value: 0000ff2d55a844c1fd37b3841cefa7e2d21de5fa8bac |
PID | Process | Filename | Type | |
---|---|---|---|---|
6744 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_kf4nepno.tjd.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
1276 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_gjfqbmei.r1r.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
2852 | 2025-04-29_fab6ad8ad8afd49199d3d5346f0cbd99_akira_cobalt-strike_satacom.exe | C:\Program Files (x86)\BrokerAdminister\InspireInvestigatorJubilant | compressed | |
MD5:A47FC9FF96285807EBAFB754D8F47DCD | SHA256:91161956EDF08F76352D77582416FF4940DA5FBA212563E05D8CFC97BD195199 | |||
1276 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | binary | |
MD5:DEDC4C6EF77BA56159C7A83BFB6101F8 | SHA256:DDF6D79DC2091E3AB3F3879A300B8DB8199647FDA4B2DFC216789BAB223A2C8A | |||
2852 | 2025-04-29_fab6ad8ad8afd49199d3d5346f0cbd99_akira_cobalt-strike_satacom.exe | C:\Program Files (x86)\BrokerAdminister\MIdCXYueaYVjpwb.exe | executable | |
MD5:E877ED2D9463E6729DB5768F23640AA4 | SHA256:2E2E69B6E3DA6D3BB46207D1393D6253E96ECB7DD1C4D6A41EC41A55F1516549 | |||
1616 | MIdCXYueaYVjpwb.exe | C:\Program Files (x86)\BrokerAdminister\InfluenceBackerAstute | compressed | |
MD5:622C52C222A5835FC8653C85CA5439DF | SHA256:E94BF30D4A9982C84365D979DCCF844DB22524BE822C26E3AA1F58AABE0744B5 | |||
6744 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_rw3ytz0t.qzw.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
4208 | MIdCXYueaYVjpwb.exe | C:\Program Files (x86)\BrokerAdminister\2_LearnLead.exe | executable | |
MD5:D6F14C7A678C49C841C3C3D805FD6573 | SHA256:0BFD82D554A7A8A32BE3D9A0914071B375E1F827DEF85410E36690BADDF867CC | |||
4208 | MIdCXYueaYVjpwb.exe | C:\Program Files (x86)\BrokerAdminister\2_WipeHumble.xml | text | |
MD5:66C2F2B7C82C90ED649CA54ACA141773 | SHA256:894977B93AB4FDEB9179329672ACA2860D57A70F52B90CF7E69D1513D4D8CAC7 | |||
4208 | MIdCXYueaYVjpwb.exe | C:\Program Files (x86)\BrokerAdminister\2_ReleaseDirect.exe | executable | |
MD5:17E91366D47747E4BC057CE3AC756F2F | SHA256:994ADE4418FBE04B5B36C8822C2C83A993E3ABF9E39251BFEC8B6FB97166BFEF |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
— | — | GET | 304 | 20.12.23.50:443 | https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL | unknown | — | — | — |
2984 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
2104 | svchost.exe | GET | 200 | 23.48.23.156:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2104 | svchost.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 20.12.23.50:443 | https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL | unknown | — | — | — |
2984 | SIHClient.exe | GET | 200 | 23.48.23.194:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl | unknown | — | — | whitelisted |
2984 | SIHClient.exe | GET | 200 | 23.48.23.194:80 | http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 52.165.164.15:443 | https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping | unknown | — | — | — |
— | — | GET | 200 | 20.12.23.50:443 | https://slscr.update.microsoft.com/sls/ping | unknown | — | — | — |
2984 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1616 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
2104 | svchost.exe | 23.48.23.156:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
2104 | svchost.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
1616 | RUXIMICS.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
— | — | 40.126.29.7:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
6544 | svchost.exe | 40.126.29.7:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
wan.baidu.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
2.100.168.192.in-addr.arpa |
| whitelisted |
jiankang.baidu.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potentially Bad Traffic | ET INFO DNS Query for Suspicious .icu Domain |
— | — | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
Process | Message |
---|---|
wsc_proxy.exe | [2025-04-29 18:52:02.303] [error ] [crashguard ] [ 5400: 5436] [E9669F: 103] Dump path 'C:\ProgramData\Avast Software\Avast\log' does not exist. Directory should be already created.
|