Analysis

  • max time kernel
    46s
  • max time network
    10s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    10-11-2020 07:02

General

  • Target

    67c1860ab0687ed7b4322ee99961b210db603f76e75df19f7c68ae63a0f98808.exe

  • Size

    5.9MB

  • MD5

    445f6172aac5ca5b5045e68758aa3a73

  • SHA1

    2a4b3e4c4e164078ff42ff7c69afa650c435d739

  • SHA256

    67c1860ab0687ed7b4322ee99961b210db603f76e75df19f7c68ae63a0f98808

  • SHA512

    8ed831b0783cf02e6397ecbd15affd1aea0ae85c784d8fb5da314bbf6e7350a6b431221a35e9fcda6e67c450499a5e7756636bb831d811cc27f06bb26bb38db9

Malware Config

Signatures

  • Cobalt Strike reflective loader 29 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Executes dropped EXE 14 IoCs
  • UPX packed file 29 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 15 IoCs
  • JavaScript code in executable 29 IoCs
  • Drops file in Windows directory 15 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67c1860ab0687ed7b4322ee99961b210db603f76e75df19f7c68ae63a0f98808.exe
    "C:\Users\Admin\AppData\Local\Temp\67c1860ab0687ed7b4322ee99961b210db603f76e75df19f7c68ae63a0f98808.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\System\TlHLrTg.exe
      C:\Windows\System\TlHLrTg.exe
      2⤵
      • Executes dropped EXE
      PID:2040
    • C:\Windows\System\BpdQtFP.exe
      C:\Windows\System\BpdQtFP.exe
      2⤵
      • Executes dropped EXE
      PID:1972
    • C:\Windows\System\ByUTbBS.exe
      C:\Windows\System\ByUTbBS.exe
      2⤵
      • Executes dropped EXE
      PID:1904
    • C:\Windows\System\JtXvwAS.exe
      C:\Windows\System\JtXvwAS.exe
      2⤵
      • Executes dropped EXE
      PID:1140
    • C:\Windows\System\lvtQFwC.exe
      C:\Windows\System\lvtQFwC.exe
      2⤵
      • Executes dropped EXE
      PID:1764
    • C:\Windows\System\iYKtCWQ.exe
      C:\Windows\System\iYKtCWQ.exe
      2⤵
      • Executes dropped EXE
      PID:1848
    • C:\Windows\System\KiHuJDI.exe
      C:\Windows\System\KiHuJDI.exe
      2⤵
      • Executes dropped EXE
      PID:1360
    • C:\Windows\System\GKbRXLT.exe
      C:\Windows\System\GKbRXLT.exe
      2⤵
      • Executes dropped EXE
      PID:1212
    • C:\Windows\System\RzkjrRt.exe
      C:\Windows\System\RzkjrRt.exe
      2⤵
      • Executes dropped EXE
      PID:1496
    • C:\Windows\System\cOIeuvW.exe
      C:\Windows\System\cOIeuvW.exe
      2⤵
      • Executes dropped EXE
      PID:1428
    • C:\Windows\System\uDewghU.exe
      C:\Windows\System\uDewghU.exe
      2⤵
      • Executes dropped EXE
      PID:1648
    • C:\Windows\System\BOLXfdS.exe
      C:\Windows\System\BOLXfdS.exe
      2⤵
      • Executes dropped EXE
      PID:1700
    • C:\Windows\System\NffktAj.exe
      C:\Windows\System\NffktAj.exe
      2⤵
      • Executes dropped EXE
      PID:864
    • C:\Windows\System\mHBrdFH.exe
      C:\Windows\System\mHBrdFH.exe
      2⤵
      • Executes dropped EXE
      PID:1348
    • C:\Windows\System\LTpkgYv.exe
      C:\Windows\System\LTpkgYv.exe
      2⤵
        PID:772

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\system\BOLXfdS.exe
      MD5

      8b5d015a8453103fd8af3fc5e330c787

      SHA1

      ff6c8bc94c3cb5c07a505cf2edc633ec5836216b

      SHA256

      87b099bfd12c23b29204b136fe3d6557b8f821d30cc9c859c8f55b6611ccc83f

      SHA512

      80eca036112e74101ec2b7370f491f94dbcec6b75697ff04d82989ebb524de7c0c0ab56f49b1627a5d794eca614778d70b2cb82dfdbebba594f87c1866439f2f

    • C:\Windows\system\BpdQtFP.exe
      MD5

      33974139ff673125d36ffffaf183bddc

      SHA1

      7a0df1616fc2ead1c2411cc167dbf641443f4b86

      SHA256

      d8c483cb2242ec54669f0e3f684577beae103cd24ebfd2db92b48171329fb4f7

      SHA512

      4e6bfd2bf5d6a4771bdd72da9c2073910b0304c1e64286b84c8eaea8b8e4a14b33407c23b8c14b7a3d0633927f834039c72680a537d72fdccc3f279606244719

    • C:\Windows\system\ByUTbBS.exe
      MD5

      d91b9ef832fd4147dbbe90de29730be5

      SHA1

      18726662f85f903e30654e3fd90104f3d4976e23

      SHA256

      bcfbee199190e97fb71494148ebc6b65d2fbc694e5899bb76127a164013e71ac

      SHA512

      6fb2726e94fa6e7eb3d7bd2471130eff987e75db9fcce53124b361a04addfd4d4da1aeef7d26a49236caded4a3cdec427db878afe434d789e044b3eb2417ece6

    • C:\Windows\system\GKbRXLT.exe
      MD5

      822227c26157c4bb8ac57bc7cc9d3d81

      SHA1

      925cf6610384e77d343804baa8ecab904fd555be

      SHA256

      0859e3c866a0c3ec5deb2b00519bab428070be863eb493482e7f2ee02f8c746c

      SHA512

      930d4c129a4bfee08f37d599987a98ae88f6cdfad61b05c395298e49bc872f3ee5b64e711cdd4b35cb2ecdebc9b5fd5447943276c8a5310306a462e963dd6036

    • C:\Windows\system\JtXvwAS.exe
      MD5

      437b26900d83bc641847bf2bf10082b3

      SHA1

      343a1c72ea6622f0cf1423e13eed8509d0904997

      SHA256

      ec35b178bcb1c3b092a1a68957e777497133dc5e6133b92dd8afeaf05e420cb6

      SHA512

      d779d391e9baabf68c84cddcba661fe65d478403e0c99f2741cde85dff663e3b94570805a8daabbbe6209e2d994a965eb85ea387811f64f38f73e1a3c4e4eb5a

    • C:\Windows\system\KiHuJDI.exe
      MD5

      bd4d72058694d6344ec7dca3957a0427

      SHA1

      569c0ed05904c918f0834d6a84e6d08b4cf4bc0b

      SHA256

      04773b7c28ac143b3e383f6c9de71f8dada74c967164c35c8e062af137154dd0

      SHA512

      fbfc6f9669b4bd4656e27149225b39d939797f6352aae622064db3e20de7aa37964363b52e00536dfc0a0d9aae102071ffa981f7d1d35768cb31e4b5e080dcbf

    • C:\Windows\system\NffktAj.exe
      MD5

      fc23c0527e88f70df823137adaa0cee2

      SHA1

      4a43c361e4799b6c2c42f1f5ac0d33c6598ad4d5

      SHA256

      6a97e0a4e8335a4f367cffd071b6198fe7b75e5f259a4413ff4d24306366f928

      SHA512

      38e89b686df36b9aafe4dd9d661cd3fb2e0e05ea24dbb419c3609b0c45286997503f33c071191e7231d623b8d50698c414a1493fb073dd0e44ba7b07bd78e8fa

    • C:\Windows\system\RzkjrRt.exe
      MD5

      c18eb4c47b3131bf17c2de26943abb81

      SHA1

      b32e221a883e299c9205dd39fc6f3f616c5511da

      SHA256

      4d7f5d4a48083eed34e8787ebd9f25329c8c89246c5834e04de300f3b7463867

      SHA512

      262dd618478e3237a3c629edf9066ae9170eea1e8a01770a2afedab7f7519e3492dfd2851d8e390c671e37d2328762cf06e903cba5b9f227b9357c8475ef94f9

    • C:\Windows\system\TlHLrTg.exe
      MD5

      38cb0f0fedddc4ffe950214a89489b32

      SHA1

      f1d0f0176890f3eec8395e3d7cd8243bb5480ff0

      SHA256

      a8ccea5d690e8b6c63d2ebb781ae7a59b0e2867f9d5adca12cec30d0d667853e

      SHA512

      ffd222f333946b5f047f9fddc1063b1e6ddc52662662545a3e9fb3d3b6ff9fd71e1beb418c374cf20cd217f4ae2d3cdb8b3147acd18d26970108cfe4d8c964d0

    • C:\Windows\system\cOIeuvW.exe
      MD5

      138245b4c47200a317cf03fdbae245b0

      SHA1

      5ae18d7298aed68c861116862994060dbbee553d

      SHA256

      e5116876bc99a0697b442d506a6b111fca0f06aa51adc4a08c6c187aacbb7cdf

      SHA512

      048d120c6eac9f00b9df7bebd811d947e516af38bcf79f1943b1b1efb56c3ed15e04fc42f30b08f20501ba771feddba92b782d5700f9204c8c8e1f82b7aec86f

    • C:\Windows\system\iYKtCWQ.exe
      MD5

      be745ca443e6914fcfe70a86a56ccfcb

      SHA1

      11c9cc57c8fbb8a0a6ea0c433427fbbe03f8ce42

      SHA256

      cd6a1ea8747ca4228ca65fc379e254b90c9a4f1eb813f96263127d6c56daaac2

      SHA512

      cfd4258268370451c9dcaa2c727d8b279a715897892e9479bbb294828e01cf8087ba2a430e278c3e2ffc0c224617e0535b73d4a976d6f59daede01ad2305ee2f

    • C:\Windows\system\lvtQFwC.exe
      MD5

      8082282d0abf8cbb1369eef1ffefd619

      SHA1

      f1f5789f207482cd9bc62bbf6f04c3c35c45bb01

      SHA256

      ee47dd57474a2a4c7fba9239478bd27bf48ce84c50ec89cd50d41cf791a8064e

      SHA512

      6bc311cb1b41b0e7f6c552363ca71ec7f52f61d340bbef5bea3abf06a0492cf8b065c4ed7556b00c61fbe6c0224c15764678f243d49c6f069be9518703b97be4

    • C:\Windows\system\mHBrdFH.exe
      MD5

      02d98f5426d51ac57761d878f8c6ebec

      SHA1

      0463c22efcbce6ce4ca0a0fce0fc9fe4e9febdd1

      SHA256

      1858d6538053286563bb3b5cea04ff308e882eb5ddee2856806519ddb312b953

      SHA512

      d394ddf30e0b3545f5149a95849ee70fef728052b9a47ed9600249c9d0eea0a87f3db7b47a2f1b0b5ed2b6564f5a78d1058a6b24a3ab793f5891379fdad069a4

    • C:\Windows\system\uDewghU.exe
      MD5

      9f8079cefddfa51ee711f9fa65076b6c

      SHA1

      6a3221f8f2158714bec2ded80ade0c668e3da71d

      SHA256

      a9785a82b47fd8c0314dd561b798b1740cc0c345220d4546ec8505bbce5b70a2

      SHA512

      60c23936477ede0cebbedf7f818d0608b55f0ba1228e5198d31338fa4b3f1d1367686b125babac2ef3d6af99d0281d01e70bf82bc055b1613adce547fb17547b

    • \Windows\system\BOLXfdS.exe
      MD5

      8b5d015a8453103fd8af3fc5e330c787

      SHA1

      ff6c8bc94c3cb5c07a505cf2edc633ec5836216b

      SHA256

      87b099bfd12c23b29204b136fe3d6557b8f821d30cc9c859c8f55b6611ccc83f

      SHA512

      80eca036112e74101ec2b7370f491f94dbcec6b75697ff04d82989ebb524de7c0c0ab56f49b1627a5d794eca614778d70b2cb82dfdbebba594f87c1866439f2f

    • \Windows\system\BpdQtFP.exe
      MD5

      33974139ff673125d36ffffaf183bddc

      SHA1

      7a0df1616fc2ead1c2411cc167dbf641443f4b86

      SHA256

      d8c483cb2242ec54669f0e3f684577beae103cd24ebfd2db92b48171329fb4f7

      SHA512

      4e6bfd2bf5d6a4771bdd72da9c2073910b0304c1e64286b84c8eaea8b8e4a14b33407c23b8c14b7a3d0633927f834039c72680a537d72fdccc3f279606244719

    • \Windows\system\ByUTbBS.exe
      MD5

      d91b9ef832fd4147dbbe90de29730be5

      SHA1

      18726662f85f903e30654e3fd90104f3d4976e23

      SHA256

      bcfbee199190e97fb71494148ebc6b65d2fbc694e5899bb76127a164013e71ac

      SHA512

      6fb2726e94fa6e7eb3d7bd2471130eff987e75db9fcce53124b361a04addfd4d4da1aeef7d26a49236caded4a3cdec427db878afe434d789e044b3eb2417ece6

    • \Windows\system\GKbRXLT.exe
      MD5

      822227c26157c4bb8ac57bc7cc9d3d81

      SHA1

      925cf6610384e77d343804baa8ecab904fd555be

      SHA256

      0859e3c866a0c3ec5deb2b00519bab428070be863eb493482e7f2ee02f8c746c

      SHA512

      930d4c129a4bfee08f37d599987a98ae88f6cdfad61b05c395298e49bc872f3ee5b64e711cdd4b35cb2ecdebc9b5fd5447943276c8a5310306a462e963dd6036

    • \Windows\system\JtXvwAS.exe
      MD5

      437b26900d83bc641847bf2bf10082b3

      SHA1

      343a1c72ea6622f0cf1423e13eed8509d0904997

      SHA256

      ec35b178bcb1c3b092a1a68957e777497133dc5e6133b92dd8afeaf05e420cb6

      SHA512

      d779d391e9baabf68c84cddcba661fe65d478403e0c99f2741cde85dff663e3b94570805a8daabbbe6209e2d994a965eb85ea387811f64f38f73e1a3c4e4eb5a

    • \Windows\system\KiHuJDI.exe
      MD5

      bd4d72058694d6344ec7dca3957a0427

      SHA1

      569c0ed05904c918f0834d6a84e6d08b4cf4bc0b

      SHA256

      04773b7c28ac143b3e383f6c9de71f8dada74c967164c35c8e062af137154dd0

      SHA512

      fbfc6f9669b4bd4656e27149225b39d939797f6352aae622064db3e20de7aa37964363b52e00536dfc0a0d9aae102071ffa981f7d1d35768cb31e4b5e080dcbf

    • \Windows\system\LTpkgYv.exe
      MD5

      95e6d92dbc5fa84409f72f660ee6a95b

      SHA1

      f4d5075a0402f3cc403f642f22324d16952a4d6e

      SHA256

      80428bc88e93424435870a2c140d56928ed0b699dabb905d622252b83a24dcfa

      SHA512

      533c7bd2ce2ed6f85c1fd4eb9c06e8ea4bafb563ddac0b994302391e87e6e5ca0e6c8b2b5581141850f1d42f2e3750d001acbde7c7fc93133bdbbd0480f3329a

    • \Windows\system\NffktAj.exe
      MD5

      fc23c0527e88f70df823137adaa0cee2

      SHA1

      4a43c361e4799b6c2c42f1f5ac0d33c6598ad4d5

      SHA256

      6a97e0a4e8335a4f367cffd071b6198fe7b75e5f259a4413ff4d24306366f928

      SHA512

      38e89b686df36b9aafe4dd9d661cd3fb2e0e05ea24dbb419c3609b0c45286997503f33c071191e7231d623b8d50698c414a1493fb073dd0e44ba7b07bd78e8fa

    • \Windows\system\RzkjrRt.exe
      MD5

      c18eb4c47b3131bf17c2de26943abb81

      SHA1

      b32e221a883e299c9205dd39fc6f3f616c5511da

      SHA256

      4d7f5d4a48083eed34e8787ebd9f25329c8c89246c5834e04de300f3b7463867

      SHA512

      262dd618478e3237a3c629edf9066ae9170eea1e8a01770a2afedab7f7519e3492dfd2851d8e390c671e37d2328762cf06e903cba5b9f227b9357c8475ef94f9

    • \Windows\system\TlHLrTg.exe
      MD5

      38cb0f0fedddc4ffe950214a89489b32

      SHA1

      f1d0f0176890f3eec8395e3d7cd8243bb5480ff0

      SHA256

      a8ccea5d690e8b6c63d2ebb781ae7a59b0e2867f9d5adca12cec30d0d667853e

      SHA512

      ffd222f333946b5f047f9fddc1063b1e6ddc52662662545a3e9fb3d3b6ff9fd71e1beb418c374cf20cd217f4ae2d3cdb8b3147acd18d26970108cfe4d8c964d0

    • \Windows\system\cOIeuvW.exe
      MD5

      138245b4c47200a317cf03fdbae245b0

      SHA1

      5ae18d7298aed68c861116862994060dbbee553d

      SHA256

      e5116876bc99a0697b442d506a6b111fca0f06aa51adc4a08c6c187aacbb7cdf

      SHA512

      048d120c6eac9f00b9df7bebd811d947e516af38bcf79f1943b1b1efb56c3ed15e04fc42f30b08f20501ba771feddba92b782d5700f9204c8c8e1f82b7aec86f

    • \Windows\system\iYKtCWQ.exe
      MD5

      be745ca443e6914fcfe70a86a56ccfcb

      SHA1

      11c9cc57c8fbb8a0a6ea0c433427fbbe03f8ce42

      SHA256

      cd6a1ea8747ca4228ca65fc379e254b90c9a4f1eb813f96263127d6c56daaac2

      SHA512

      cfd4258268370451c9dcaa2c727d8b279a715897892e9479bbb294828e01cf8087ba2a430e278c3e2ffc0c224617e0535b73d4a976d6f59daede01ad2305ee2f

    • \Windows\system\lvtQFwC.exe
      MD5

      8082282d0abf8cbb1369eef1ffefd619

      SHA1

      f1f5789f207482cd9bc62bbf6f04c3c35c45bb01

      SHA256

      ee47dd57474a2a4c7fba9239478bd27bf48ce84c50ec89cd50d41cf791a8064e

      SHA512

      6bc311cb1b41b0e7f6c552363ca71ec7f52f61d340bbef5bea3abf06a0492cf8b065c4ed7556b00c61fbe6c0224c15764678f243d49c6f069be9518703b97be4

    • \Windows\system\mHBrdFH.exe
      MD5

      02d98f5426d51ac57761d878f8c6ebec

      SHA1

      0463c22efcbce6ce4ca0a0fce0fc9fe4e9febdd1

      SHA256

      1858d6538053286563bb3b5cea04ff308e882eb5ddee2856806519ddb312b953

      SHA512

      d394ddf30e0b3545f5149a95849ee70fef728052b9a47ed9600249c9d0eea0a87f3db7b47a2f1b0b5ed2b6564f5a78d1058a6b24a3ab793f5891379fdad069a4

    • \Windows\system\uDewghU.exe
      MD5

      9f8079cefddfa51ee711f9fa65076b6c

      SHA1

      6a3221f8f2158714bec2ded80ade0c668e3da71d

      SHA256

      a9785a82b47fd8c0314dd561b798b1740cc0c345220d4546ec8505bbce5b70a2

      SHA512

      60c23936477ede0cebbedf7f818d0608b55f0ba1228e5198d31338fa4b3f1d1367686b125babac2ef3d6af99d0281d01e70bf82bc055b1613adce547fb17547b

    • memory/772-43-0x0000000000000000-mapping.dmp
    • memory/864-37-0x0000000000000000-mapping.dmp
    • memory/1140-10-0x0000000000000000-mapping.dmp
    • memory/1212-22-0x0000000000000000-mapping.dmp
    • memory/1348-40-0x0000000000000000-mapping.dmp
    • memory/1360-19-0x0000000000000000-mapping.dmp
    • memory/1428-28-0x0000000000000000-mapping.dmp
    • memory/1496-25-0x0000000000000000-mapping.dmp
    • memory/1648-31-0x0000000000000000-mapping.dmp
    • memory/1700-34-0x0000000000000000-mapping.dmp
    • memory/1764-13-0x0000000000000000-mapping.dmp
    • memory/1848-16-0x0000000000000000-mapping.dmp
    • memory/1904-7-0x0000000000000000-mapping.dmp
    • memory/1972-4-0x0000000000000000-mapping.dmp
    • memory/2040-1-0x0000000000000000-mapping.dmp