| File name: | 2025-04-29_fab6ad8ad8afd49199d3d5346f0cbd99_akira_cobalt-strike_satacom |
| Full analysis: | https://app.any.run/tasks/e5f86048-af4b-42aa-9e4a-01b77711864f |
| Verdict: | Malicious activity |
| Analysis date: | April 29, 2025, 18:51:05 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (GUI) x86-64, for MS Windows, 6 sections |
| MD5: | FAB6AD8AD8AFD49199D3D5346F0CBD99 |
| SHA1: | 57BB44FBBCD765064961E7EDDCAEC5F49140B702 |
| SHA256: | BBC4F49BD024CE23F952A1644451D68F80445E52E24E90FF448E5B9D2C1D7C0D |
| SSDEEP: | 98304:B8WUp3P3b13Ob0EPGkxaqxGEA3Pu2N2qI81u/POuLr+Erc7IFYn/DLw/DBW0616b:STXJpOCQX6 |
| .exe | | | Generic Win/DOS Executable (50) |
|---|---|---|
| .exe | | | DOS Executable Generic (49.9) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2025:04:27 16:05:58+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.41 |
| CodeSize: | 2279424 |
| InitializedDataSize: | 22918656 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x212828 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 0.1.0.0 |
| ProductVersionNumber: | 0.1.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| LegalCopyright: | Copyright © 2023 |
| ProductVersion: | 0.1.0 |
| FileVersion: | 0.1.0 |
| ProductName: | Application Setup |
| FileDescription: | Application Setup |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 496 | "C:\Users\admin\Desktop\2025-04-29_fab6ad8ad8afd49199d3d5346f0cbd99_akira_cobalt-strike_satacom.exe" | C:\Users\admin\Desktop\2025-04-29_fab6ad8ad8afd49199d3d5346f0cbd99_akira_cobalt-strike_satacom.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Application Setup Exit code: 3221226540 Version: 0.1.0 Modules
| |||||||||||||||
| 496 | /Processid:{13B6B196-AD7B-4C7F-9BDC-B1CB2EE86552} | C:\Windows\SysWOW64\dllhost.exe | ReleaseDirect.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: COM Surrogate Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 680 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | MIdCXYueaYVjpwb.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 728 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | WMIC.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 928 | C:\WINDOWS\system32\DllHost.exe /Processid:{A6BFEA43-501F-456F-A845-983D3AD7B8F0} | C:\Windows\System32\dllhost.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: COM Surrogate Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1228 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1276 | "powershell" -NoLogo -NoProfile -ExecutionPolicy Bypass -Command "Start-Process -NoNewWindow -Wait -FilePath \"C:\Program Files (x86)\BrokerAdminister\MIdCXYueaYVjpwb.exe\" -ArgumentList @(\"x\",'\"C:\Program Files (x86)\BrokerAdminister\InspireInvestigatorJubilant\"', '\"-p9)=88wzYxSImproveProtectorCreative\"', '-o\"C:\Program Files (x86)\BrokerAdminister\"', \"-y\")" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | 2025-04-29_fab6ad8ad8afd49199d3d5346f0cbd99_akira_cobalt-strike_satacom.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1276 | /Processid:{13B6B196-AD7B-4C7F-9BDC-B1CB2EE86552} | C:\Windows\SysWOW64\dllhost.exe | — | ReleaseDirect.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: COM Surrogate Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1324 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | WMIC.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1348 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (2148) dllhost.exe | Key: | HKEY_CURRENT_USER\WEByte\Setup |
| Operation: | delete value | Name: | kpi |
Value: | |||
| (PID) Process: | (6576) ReleaseDirect.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Avast Software\Avast |
| Operation: | write | Name: | ProgramFolder |
Value: C:\Windows | |||
| (PID) Process: | (496) dllhost.exe | Key: | HKEY_CURRENT_USER\WEByte\Setup |
| Operation: | write | Name: | MarkTime |
Value: 2025-04-29 18:52 | |||
| (PID) Process: | (5400) wsc_proxy.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Avast Software\Avast\properties |
| Operation: | write | Name: | UseRegistry |
Value: 1 | |||
| (PID) Process: | (5400) wsc_proxy.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Avast Software\Avast\Wsc |
| Operation: | write | Name: | IWscASStatus |
Value: Windows °²È«ÖÐÐÄ | |||
| (PID) Process: | (5400) wsc_proxy.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Avast Software\Avast\Wsc |
| Operation: | write | Name: | IWscAVStatus4 |
Value: Windows °²È«ÖÐÐÄ | |||
| (PID) Process: | (2332) WerFault.exe | Key: | \REGISTRY\A\{283fd4da-e520-1ae2-47e6-12e835c77cc8}\Root\InventoryApplicationFile |
| Operation: | write | Name: | WritePermissionsCheck |
Value: 1 | |||
| (PID) Process: | (2332) WerFault.exe | Key: | \REGISTRY\A\{283fd4da-e520-1ae2-47e6-12e835c77cc8}\Root\InventoryApplicationFile\PermissionsCheckTestKey |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (2332) WerFault.exe | Key: | \REGISTRY\A\{283fd4da-e520-1ae2-47e6-12e835c77cc8}\Root\InventoryApplicationFile\wsc_proxy.exe|16071c0161cb698e |
| Operation: | write | Name: | ProgramId |
Value: 0006b6aa4fee73eab365f3bda034d8ea1e0e00000904 | |||
| (PID) Process: | (2332) WerFault.exe | Key: | \REGISTRY\A\{283fd4da-e520-1ae2-47e6-12e835c77cc8}\Root\InventoryApplicationFile\wsc_proxy.exe|16071c0161cb698e |
| Operation: | write | Name: | FileId |
Value: 0000ff2d55a844c1fd37b3841cefa7e2d21de5fa8bac | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6744 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_kf4nepno.tjd.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 1276 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | binary | |
MD5:DEDC4C6EF77BA56159C7A83BFB6101F8 | SHA256:6B61488130BDBD7C54A74531B72592B810966DFBB87C279CF0D5BDBE27151CBA | |||
| 1276 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_rprrt1cf.bwq.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 1616 | MIdCXYueaYVjpwb.exe | C:\Program Files (x86)\BrokerAdminister\InfluenceBackerAstute | compressed | |
MD5:622C52C222A5835FC8653C85CA5439DF | SHA256:E94BF30D4A9982C84365D979DCCF844DB22524BE822C26E3AA1F58AABE0744B5 | |||
| 1276 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_gjfqbmei.r1r.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 2852 | 2025-04-29_fab6ad8ad8afd49199d3d5346f0cbd99_akira_cobalt-strike_satacom.exe | C:\Program Files (x86)\BrokerAdminister\InspireInvestigatorJubilant | compressed | |
MD5:A47FC9FF96285807EBAFB754D8F47DCD | SHA256:91161956EDF08F76352D77582416FF4940DA5FBA212563E05D8CFC97BD195199 | |||
| 2852 | 2025-04-29_fab6ad8ad8afd49199d3d5346f0cbd99_akira_cobalt-strike_satacom.exe | C:\Program Files (x86)\BrokerAdminister\MIdCXYueaYVjpwb.exe | executable | |
MD5:E877ED2D9463E6729DB5768F23640AA4 | SHA256:2E2E69B6E3DA6D3BB46207D1393D6253E96ECB7DD1C4D6A41EC41A55F1516549 | |||
| 4208 | MIdCXYueaYVjpwb.exe | C:\Program Files (x86)\BrokerAdminister\2_WipeHumble.xml | text | |
MD5:66C2F2B7C82C90ED649CA54ACA141773 | SHA256:894977B93AB4FDEB9179329672ACA2860D57A70F52B90CF7E69D1513D4D8CAC7 | |||
| 4208 | MIdCXYueaYVjpwb.exe | C:\Program Files (x86)\BrokerAdminister\2_LearnLead.exe | executable | |
MD5:D6F14C7A678C49C841C3C3D805FD6573 | SHA256:0BFD82D554A7A8A32BE3D9A0914071B375E1F827DEF85410E36690BADDF867CC | |||
| 4208 | MIdCXYueaYVjpwb.exe | C:\Program Files (x86)\BrokerAdminister\wsc_proxy.exe | executable | |
MD5:06807D8D7282959CE062F92A708D382F | SHA256:BD4635D582413F84AC83ADBB4B449B18BAC4FC87CA000D0C7BE84AD0F9CAF68E | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2104 | svchost.exe | GET | 200 | 23.48.23.156:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1616 | RUXIMICS.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2984 | SIHClient.exe | GET | 200 | 23.48.23.194:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl | unknown | — | — | whitelisted |
2984 | SIHClient.exe | GET | 200 | 23.48.23.194:80 | http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl | unknown | — | — | whitelisted |
2104 | svchost.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2852 | 2025-04-29_fab6ad8ad8afd49199d3d5346f0cbd99_akira_cobalt-strike_satacom.exe | GET | — | 110.242.69.67:80 | http://110.242.69.67:80/gift | unknown | — | — | unknown |
— | — | GET | 200 | 20.12.23.50:443 | https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL | unknown | — | — | — |
2984 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 52.165.164.15:443 | https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping | unknown | — | — | — |
— | — | GET | 200 | 20.12.23.50:443 | https://slscr.update.microsoft.com/sls/ping | unknown | — | — | — |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1616 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
2104 | svchost.exe | 23.48.23.156:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
2104 | svchost.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
1616 | RUXIMICS.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
— | — | 40.126.29.7:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
6544 | svchost.exe | 40.126.29.7:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
wan.baidu.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
2.100.168.192.in-addr.arpa |
| whitelisted |
jiankang.baidu.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2196 | svchost.exe | Potentially Bad Traffic | ET INFO DNS Query for Suspicious .icu Domain |
2196 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
Process | Message |
|---|---|
wsc_proxy.exe | [2025-04-29 18:52:02.303] [error ] [crashguard ] [ 5400: 5436] [E9669F: 103] Dump path 'C:\ProgramData\Avast Software\Avast\log' does not exist. Directory should be already created.
|