Analysis

  • max time kernel
    49s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    10-11-2020 07:01

General

  • Target

    5907c9d5e74d38dee72c9ebb15553aed5b2ee3eaa13ea1efdcd0c50f96b1ebe3.exe

  • Size

    5.2MB

  • MD5

    6c199e054e4a2b45272a5eba366b95ed

  • SHA1

    bf03a5785e6de4ea813dc253426a46828a290f77

  • SHA256

    5907c9d5e74d38dee72c9ebb15553aed5b2ee3eaa13ea1efdcd0c50f96b1ebe3

  • SHA512

    69bcc4c47ab4e4d757d9e8a89613e28c62ce276c810d60c6e6cedaa1b76f833be94d4123d92dba9bd99b3376705c81cade4f9fec0685c67ad8e106ac7cc3ad6c

Malware Config

Signatures

  • Cobalt Strike reflective loader 21 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Executes dropped EXE 10 IoCs
  • UPX packed file 21 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 11 IoCs
  • JavaScript code in executable 21 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5907c9d5e74d38dee72c9ebb15553aed5b2ee3eaa13ea1efdcd0c50f96b1ebe3.exe
    "C:\Users\Admin\AppData\Local\Temp\5907c9d5e74d38dee72c9ebb15553aed5b2ee3eaa13ea1efdcd0c50f96b1ebe3.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1892
    • C:\Windows\System\JhqQKEq.exe
      C:\Windows\System\JhqQKEq.exe
      2⤵
      • Executes dropped EXE
      PID:904
    • C:\Windows\System\nOeQEYl.exe
      C:\Windows\System\nOeQEYl.exe
      2⤵
      • Executes dropped EXE
      PID:1200
    • C:\Windows\System\fktQkaY.exe
      C:\Windows\System\fktQkaY.exe
      2⤵
      • Executes dropped EXE
      PID:1992
    • C:\Windows\System\HoZHKHz.exe
      C:\Windows\System\HoZHKHz.exe
      2⤵
      • Executes dropped EXE
      PID:316
    • C:\Windows\System\XNAOAdx.exe
      C:\Windows\System\XNAOAdx.exe
      2⤵
      • Executes dropped EXE
      PID:1536
    • C:\Windows\System\RAuJqMu.exe
      C:\Windows\System\RAuJqMu.exe
      2⤵
      • Executes dropped EXE
      PID:1804
    • C:\Windows\System\cMjUmkU.exe
      C:\Windows\System\cMjUmkU.exe
      2⤵
      • Executes dropped EXE
      PID:1864
    • C:\Windows\System\sSakIgf.exe
      C:\Windows\System\sSakIgf.exe
      2⤵
      • Executes dropped EXE
      PID:1768
    • C:\Windows\System\eDapsQC.exe
      C:\Windows\System\eDapsQC.exe
      2⤵
      • Executes dropped EXE
      PID:1684
    • C:\Windows\System\cWmSkqP.exe
      C:\Windows\System\cWmSkqP.exe
      2⤵
      • Executes dropped EXE
      PID:1376
    • C:\Windows\System\AHSxtoX.exe
      C:\Windows\System\AHSxtoX.exe
      2⤵
        PID:1544

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\system\HoZHKHz.exe

      MD5

      75e57871adbc77c39a5f8d1f17d5c9c1

      SHA1

      a7fb4b7a250e81e77dbd95c716d5f42428ea2402

      SHA256

      a470bc8f028989d91809d2747e2118a2f45fec62c2d29175d16f892751c3693e

      SHA512

      7fc66d5fd46d3623537c258556bfcdea55d98dd516cf6b0d08032595b3a0666e2ab47a7570494f23cf76df419f828fa1d0a0be39ab967929c9dacad259673f23

    • C:\Windows\system\JhqQKEq.exe

      MD5

      a77ddbfce93551aeb22d65c55052ea62

      SHA1

      00d5c3bef19c67053be377a055d88b6afe8fb025

      SHA256

      e2afaaef84380e508070d7a4ee4d102a66aed9ed0ba7cdd0949d78ee01c8b8fa

      SHA512

      4ec4c559a6e02b8bf19310bfbaaee784ac3a9e03cbd2a32a3249e19c2bef2eccefc001957a0c3c301cabc00b4130969f1b4df7980702bf1ea38975a2dd9315b8

    • C:\Windows\system\RAuJqMu.exe

      MD5

      4dcb6ddd33d08a135990bf811845a5e2

      SHA1

      140ec97048afd807920a4d15edc697f0af938308

      SHA256

      c679da71fe16028b2d91669d137b3d25fed7bb52df00c76c04f25f08c828a39d

      SHA512

      e23c711ee4a59c3e4bc13073a475b6462ba08d04590ddea850f165f2e1eaf73d8750dfdfd37f6589d4ef9ec288ae13217a35c7dadfe686e0c452e963be505887

    • C:\Windows\system\XNAOAdx.exe

      MD5

      e6be701e26196f59a3919438b4ff05d8

      SHA1

      5a3de3e9af944fa6325e67afa79afc7fccd73d9e

      SHA256

      070d24b3f0de34ee9a8f12ae775dd3e8ce049485dba4cb808dc4a0238569c760

      SHA512

      ca173a7f2be632a53f23c42b9ea24560e64ae31d36329355d6aa74713d75e79b49e24ea4de8dc2763396d6966c402950fb3c34878f3dc4c1757ed300a272365a

    • C:\Windows\system\cMjUmkU.exe

      MD5

      b2a5a762097fc9cdbcb541b5316a2dcd

      SHA1

      3f7ea42f96985fc176340e94306ea142a259e837

      SHA256

      42aad9e2d2d73db5a0d20f2673e9d0828d28cfe107860594ba7759bf9387797b

      SHA512

      68900bbd5ff5a22ccd9e8f414689aad826cb0b6dee3cb93f5978c4c9f9346a0b5bdb9bbda9f3b2eae43bf1a66a5644bfa63e24307623a414d0f83677b793ebfe

    • C:\Windows\system\cWmSkqP.exe

      MD5

      0edba93aa329d102a5e76aa150ac9d99

      SHA1

      52ee31011d965cd8bc2c3676152ae94268e4e794

      SHA256

      afd17c42dabe8cc1be6e6baad77105367f5bf6af613282850feaec14f50fc358

      SHA512

      6ede7373639236f719cee3caed99ffe7fcb4128c1c0b8c65d3d78646227d49edf6d59bef6ef333996d76cd680b4790312e2e925eeef90ddb27596b4c43290417

    • C:\Windows\system\eDapsQC.exe

      MD5

      5d312a1f9e547be379bb03c7cc58c49d

      SHA1

      a77323ac3953e77d182bac126de2e92e37f21486

      SHA256

      d52ffa861ebb97eb43dbd5a1b4bcd03d1fce06198200e8e1f6ab0b7c14bf6c13

      SHA512

      dc8516a1123fb962d9ae0a66097d93dd0aa20f42469c1e65a26d1f8503b898a45bfd11aa3275cf8c922a5af319229c973886f07fcc6fdff7d7668bbbe0b4027a

    • C:\Windows\system\fktQkaY.exe

      MD5

      c02e714cd3d967d29a0b056058b82e40

      SHA1

      c2dccbadf89f319c46d74dd9784971105d588a62

      SHA256

      b5dabc0f4027744ad40e6dbb5e3ff5266c86667e5871e7bb9d6eae44a5bdc5d6

      SHA512

      ebd791f0c7ac24184c5127672372668ddf6af324428a33c7923243ce8f9f52f053b693c9eacefb4a3cc5f47f8c5d30f60c20c64c0bd901fb4642bc7b039f7f50

    • C:\Windows\system\nOeQEYl.exe

      MD5

      be0bfd4b4189f5517a1a8686855e6a45

      SHA1

      a22459c003d05c79301a9e356b20fb3502d7e340

      SHA256

      004d8b0945483eb5728a0289a3e050e6ea0e579726ba239dc94f1584e5e52c28

      SHA512

      c87de2fa0c8e449bd70fa061dad6fba5bc2a193c51582a001a53c97846ad1f7402f6afb7f80c43a65e84cec0590e65c5f437054f9fe34651151b81b2455f7173

    • C:\Windows\system\sSakIgf.exe

      MD5

      1eb517e6321d6a288d6b92110b74d804

      SHA1

      dc63542a57f5eb92b6d6b7f6f0aa6c15db8cb696

      SHA256

      dea689d7a52f6b0db043ffe5e0e084276864379ea2c5d5d1008f8f1f061c5dbc

      SHA512

      034f00fe8a3203c93387161509de78d9b2c894e2eb923d59479a53f013ccb5862cc1efe9eb7277355eb99d34a3941a39ea2474ae6ed80d4b5e68a351ef119c51

    • \Windows\system\AHSxtoX.exe

      MD5

      3cca2884d45aa2d31d522f151def73b4

      SHA1

      fc0ea766faa2ce500a86d7d180a68c9173aff169

      SHA256

      806adee4bb56f9258fea7f5d6e17788d9386502545b50b41ebd5cd09687cdaea

      SHA512

      716162ac9584cf879e7c97990959a8fb839151c8423ab5f6924bbc83ffdeac7a34d80976f110701525c3f5b0da1046df13301ce507522d31faa8b478b539603d

    • \Windows\system\HoZHKHz.exe

      MD5

      75e57871adbc77c39a5f8d1f17d5c9c1

      SHA1

      a7fb4b7a250e81e77dbd95c716d5f42428ea2402

      SHA256

      a470bc8f028989d91809d2747e2118a2f45fec62c2d29175d16f892751c3693e

      SHA512

      7fc66d5fd46d3623537c258556bfcdea55d98dd516cf6b0d08032595b3a0666e2ab47a7570494f23cf76df419f828fa1d0a0be39ab967929c9dacad259673f23

    • \Windows\system\JhqQKEq.exe

      MD5

      a77ddbfce93551aeb22d65c55052ea62

      SHA1

      00d5c3bef19c67053be377a055d88b6afe8fb025

      SHA256

      e2afaaef84380e508070d7a4ee4d102a66aed9ed0ba7cdd0949d78ee01c8b8fa

      SHA512

      4ec4c559a6e02b8bf19310bfbaaee784ac3a9e03cbd2a32a3249e19c2bef2eccefc001957a0c3c301cabc00b4130969f1b4df7980702bf1ea38975a2dd9315b8

    • \Windows\system\RAuJqMu.exe

      MD5

      4dcb6ddd33d08a135990bf811845a5e2

      SHA1

      140ec97048afd807920a4d15edc697f0af938308

      SHA256

      c679da71fe16028b2d91669d137b3d25fed7bb52df00c76c04f25f08c828a39d

      SHA512

      e23c711ee4a59c3e4bc13073a475b6462ba08d04590ddea850f165f2e1eaf73d8750dfdfd37f6589d4ef9ec288ae13217a35c7dadfe686e0c452e963be505887

    • \Windows\system\XNAOAdx.exe

      MD5

      e6be701e26196f59a3919438b4ff05d8

      SHA1

      5a3de3e9af944fa6325e67afa79afc7fccd73d9e

      SHA256

      070d24b3f0de34ee9a8f12ae775dd3e8ce049485dba4cb808dc4a0238569c760

      SHA512

      ca173a7f2be632a53f23c42b9ea24560e64ae31d36329355d6aa74713d75e79b49e24ea4de8dc2763396d6966c402950fb3c34878f3dc4c1757ed300a272365a

    • \Windows\system\cMjUmkU.exe

      MD5

      b2a5a762097fc9cdbcb541b5316a2dcd

      SHA1

      3f7ea42f96985fc176340e94306ea142a259e837

      SHA256

      42aad9e2d2d73db5a0d20f2673e9d0828d28cfe107860594ba7759bf9387797b

      SHA512

      68900bbd5ff5a22ccd9e8f414689aad826cb0b6dee3cb93f5978c4c9f9346a0b5bdb9bbda9f3b2eae43bf1a66a5644bfa63e24307623a414d0f83677b793ebfe

    • \Windows\system\cWmSkqP.exe

      MD5

      0edba93aa329d102a5e76aa150ac9d99

      SHA1

      52ee31011d965cd8bc2c3676152ae94268e4e794

      SHA256

      afd17c42dabe8cc1be6e6baad77105367f5bf6af613282850feaec14f50fc358

      SHA512

      6ede7373639236f719cee3caed99ffe7fcb4128c1c0b8c65d3d78646227d49edf6d59bef6ef333996d76cd680b4790312e2e925eeef90ddb27596b4c43290417

    • \Windows\system\eDapsQC.exe

      MD5

      5d312a1f9e547be379bb03c7cc58c49d

      SHA1

      a77323ac3953e77d182bac126de2e92e37f21486

      SHA256

      d52ffa861ebb97eb43dbd5a1b4bcd03d1fce06198200e8e1f6ab0b7c14bf6c13

      SHA512

      dc8516a1123fb962d9ae0a66097d93dd0aa20f42469c1e65a26d1f8503b898a45bfd11aa3275cf8c922a5af319229c973886f07fcc6fdff7d7668bbbe0b4027a

    • \Windows\system\fktQkaY.exe

      MD5

      c02e714cd3d967d29a0b056058b82e40

      SHA1

      c2dccbadf89f319c46d74dd9784971105d588a62

      SHA256

      b5dabc0f4027744ad40e6dbb5e3ff5266c86667e5871e7bb9d6eae44a5bdc5d6

      SHA512

      ebd791f0c7ac24184c5127672372668ddf6af324428a33c7923243ce8f9f52f053b693c9eacefb4a3cc5f47f8c5d30f60c20c64c0bd901fb4642bc7b039f7f50

    • \Windows\system\nOeQEYl.exe

      MD5

      be0bfd4b4189f5517a1a8686855e6a45

      SHA1

      a22459c003d05c79301a9e356b20fb3502d7e340

      SHA256

      004d8b0945483eb5728a0289a3e050e6ea0e579726ba239dc94f1584e5e52c28

      SHA512

      c87de2fa0c8e449bd70fa061dad6fba5bc2a193c51582a001a53c97846ad1f7402f6afb7f80c43a65e84cec0590e65c5f437054f9fe34651151b81b2455f7173

    • \Windows\system\sSakIgf.exe

      MD5

      1eb517e6321d6a288d6b92110b74d804

      SHA1

      dc63542a57f5eb92b6d6b7f6f0aa6c15db8cb696

      SHA256

      dea689d7a52f6b0db043ffe5e0e084276864379ea2c5d5d1008f8f1f061c5dbc

      SHA512

      034f00fe8a3203c93387161509de78d9b2c894e2eb923d59479a53f013ccb5862cc1efe9eb7277355eb99d34a3941a39ea2474ae6ed80d4b5e68a351ef119c51

    • memory/316-10-0x0000000000000000-mapping.dmp

    • memory/904-1-0x0000000000000000-mapping.dmp

    • memory/1200-4-0x0000000000000000-mapping.dmp

    • memory/1376-28-0x0000000000000000-mapping.dmp

    • memory/1536-13-0x0000000000000000-mapping.dmp

    • memory/1544-31-0x0000000000000000-mapping.dmp

    • memory/1684-25-0x0000000000000000-mapping.dmp

    • memory/1768-22-0x0000000000000000-mapping.dmp

    • memory/1804-15-0x0000000000000000-mapping.dmp

    • memory/1864-19-0x0000000000000000-mapping.dmp

    • memory/1992-7-0x0000000000000000-mapping.dmp