| File name: | v1.ps1 |
| Full analysis: | https://app.any.run/tasks/3ec65ccb-7aa7-4b97-93b8-07fde6ba5ed1 |
| Verdict: | Malicious activity |
| Threats: | Cobalt Strike is a legitimate penetration software toolkit developed by Forta. But its cracked versions are widely adopted by bad actors, who use it as a C2 system of choice for targeted attacks. |
| Analysis date: | April 05, 2020, 11:05:26 |
| OS: | Windows 10 Professional (build: 16299, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | text/plain |
| File info: | UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators |
| MD5: | D0B0FF24E90FC65FCCFF95B68A9A528C |
| SHA1: | E23C66BEBE2546A20974CA0A99FD617969E75128 |
| SHA256: | E3DD626CD9A4D72197B0F318B72F29DE7C25073DD854951C6FA7F47EF3F03F9B |
| SSDEEP: | 48:laMxosAMg20Sp1oxae6HmUNnxEv7VPvHvCYtRE7QpM1LmwLeTLyUnUyq4PJCF:Vo1Ta1oce6PvwzEEEPyTs4hI |
| .txt | | | Text - UTF-8 encoded (100) |
|---|
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 772 | "C:\WINDOWS\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppXy7vb4pc2dr3kc93kfc509b1d0arkfb2x.mca | C:\WINDOWS\system32\backgroundTaskHost.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Background Task Host Exit code: 1 Version: 10.0.16299.15 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1076 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "-Command" "if((Get-ExecutionPolicy ) -ne 'AllSigned') { Set-ExecutionPolicy -Scope Process Bypass }; & 'C:\Users\admin\Desktop\v1.ps1'" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.16299.15 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4620 | "C:\Windows\ImmersiveControlPanel\SystemSettings.exe" -ServerName:microsoft.windows.immersivecontrolpanel | C:\Windows\ImmersiveControlPanel\SystemSettings.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Settings Exit code: 0 Version: 10.0.16299.15 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4716 | C:\Windows\System32\Speech_OneCore\Common\SpeechRuntime.exe -Embedding | C:\Windows\System32\Speech_OneCore\Common\SpeechRuntime.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Speech Runtime Executable Exit code: 0 Version: 10.0.16299.15 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5524 | "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile | c:\windows\syswow64\windowspowershell\v1.0\powershell.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.16299.15 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5812 | C:\WINDOWS\system32\ApplicationFrameHost.exe -Embedding | C:\WINDOWS\system32\ApplicationFrameHost.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Application Frame Host Exit code: 0 Version: 10.0.16299.15 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5840 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\WINDOWS\system32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.16299.15 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6068 | C:\Windows\System32\RuntimeBroker.exe -Embedding | C:\Windows\System32\RuntimeBroker.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Runtime Broker Exit code: 0 Version: 10.0.16299.15 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (1076) powershell.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\192\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (5524) powershell.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\192\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (5524) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (5524) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (5524) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (5524) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (5812) ApplicationFrameHost.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MrtCache\C:%5CWindows%5CImmersiveControlPanel%5Cresources.pri\1d33928e47e02c6\a01460c8 |
| Operation: | write | Name: | LanguageList |
Value: _en-US;en_standard_100_US_LTR_dark_Desktop | |||
| (PID) Process: | (772) backgroundTaskHost.exe | Key: | \REGISTRY\A\{fc8c7757-40df-ebc1-df95-18445c85433a}\LocalState\Configuration |
| Operation: | write | Name: | DisabledReason |
Value: 010000003D0ECBBA3A0BD601 | |||
| (PID) Process: | (772) backgroundTaskHost.exe | Key: | \REGISTRY\A\{fc8c7757-40df-ebc1-df95-18445c85433a}\LocalState\Configuration |
| Operation: | write | Name: | HasDefaultMSA |
Value: 000000007082FFBA3A0BD601 | |||
| (PID) Process: | (772) backgroundTaskHost.exe | Key: | \REGISTRY\A\{fc8c7757-40df-ebc1-df95-18445c85433a}\LocalState\Configuration |
| Operation: | write | Name: | ConnectedToMSA |
Value: 00000000E04704BB3A0BD601 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1076 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\JF3K7IWB4HVMRZMA80JF.temp | — | |
MD5:— | SHA256:— | |||
| 1076 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_vodoucmy.3z4.ps1 | — | |
MD5:— | SHA256:— | |||
| 1076 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_3rxqzq2x.qva.psm1 | — | |
MD5:— | SHA256:— | |||
| 4620 | SystemSettings.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\NARW3AF3YAUDFIQQRGSV.temp | — | |
MD5:— | SHA256:— | |||
| 5524 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_xjdlj053.prv.psm1 | text | |
MD5:— | SHA256:— | |||
| 5524 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_jo1qe1r2.2zj.ps1 | text | |
MD5:— | SHA256:— | |||
| 5524 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache | binary | |
MD5:— | SHA256:— | |||
| 1076 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache | binary | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5524 | powershell.exe | GET | 200 | 91.232.105.248:1337 | http://91.232.105.248:1337/pixel.gif | NL | — | — | malicious |
5524 | powershell.exe | GET | 200 | 91.232.105.248:1337 | http://91.232.105.248:1337/pixel.gif | NL | — | — | malicious |
5524 | powershell.exe | GET | 200 | 91.232.105.248:1337 | http://91.232.105.248:1337/pixel.gif | NL | — | — | malicious |
5524 | powershell.exe | GET | 200 | 91.232.105.248:1337 | http://91.232.105.248:1337/pixel.gif | NL | — | — | malicious |
5524 | powershell.exe | GET | 200 | 91.232.105.248:1337 | http://91.232.105.248:1337/pixel.gif | NL | — | — | malicious |
5524 | powershell.exe | GET | 200 | 91.232.105.248:1337 | http://91.232.105.248:1337/pixel.gif | NL | — | — | malicious |
5524 | powershell.exe | GET | 200 | 91.232.105.248:1337 | http://91.232.105.248:1337/pixel.gif | NL | — | — | malicious |
1924 | svchost.exe | GET | 304 | 20.191.48.196:443 | https://settings-win-ppe.data.microsoft.com/settings/v2.0/Storage/StorageHealthEvaluation?os=Windows&deviceClass=Windows.Desktop&appVer=1.0.0.0 | US | — | — | whitelisted |
5524 | powershell.exe | GET | 200 | 91.232.105.248:1337 | http://91.232.105.248:1337/pixel.gif | NL | — | — | malicious |
5524 | powershell.exe | GET | 200 | 91.232.105.248:1337 | http://91.232.105.248:1337/pixel.gif | NL | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
5524 | powershell.exe | 91.232.105.248:1337 | — | WorldStream B.V. | NL | malicious |
1520 | svchost.exe | 20.191.48.196:443 | settings-win-ppe.data.microsoft.com | Microsoft Corporation | US | unknown |
Domain | IP | Reputation |
|---|---|---|
self.events.data.microsoft.com |
| whitelisted |
settings-win-ppe.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
5524 | powershell.exe | A Network Trojan was detected | MALWARE [PTsecurity] Cobalt Strike Beacon Observed |
5524 | powershell.exe | A Network Trojan was detected | MALWARE [PTsecurity] Cobalt Strike Beacon Observed |
5524 | powershell.exe | A Network Trojan was detected | MALWARE [PTsecurity] Cobalt Strike Beacon Observed |
5524 | powershell.exe | A Network Trojan was detected | MALWARE [PTsecurity] Cobalt Strike Beacon Observed |
5524 | powershell.exe | A Network Trojan was detected | MALWARE [PTsecurity] Cobalt Strike Beacon Observed |
5524 | powershell.exe | A Network Trojan was detected | MALWARE [PTsecurity] Cobalt Strike Beacon Observed |
5524 | powershell.exe | A Network Trojan was detected | MALWARE [PTsecurity] Cobalt Strike Beacon Observed |
5524 | powershell.exe | A Network Trojan was detected | MALWARE [PTsecurity] Cobalt Strike Beacon Observed |
5524 | powershell.exe | A Network Trojan was detected | MALWARE [PTsecurity] Cobalt Strike Beacon Observed |
5524 | powershell.exe | A Network Trojan was detected | MALWARE [PTsecurity] Cobalt Strike Beacon Observed |