Analysis

  • max time kernel
    54s
  • max time network
    59s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    10-11-2020 06:47

General

  • Target

    c109d3ebfeb7a2c5ecafb076d140ce69972cf16045b36c20595396f51ead419b.exe

  • Size

    5.9MB

  • MD5

    786423bc3b56acffd532f20724e081bb

  • SHA1

    e5477d458923d955798a0c80d5c49477ff7d6612

  • SHA256

    c109d3ebfeb7a2c5ecafb076d140ce69972cf16045b36c20595396f51ead419b

  • SHA512

    c1aea328f68c965c1d48f5a1ab76a009991b19429f64d16a359fb6b28a966d6945c586da3b39d4632f6470d001c1c87df868f92d5d15c56e21af3521a86d0892

Malware Config

Signatures

  • Cobalt Strike reflective loader 27 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Executes dropped EXE 13 IoCs
  • UPX packed file 27 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 14 IoCs
  • JavaScript code in executable 27 IoCs
  • Drops file in Windows directory 14 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c109d3ebfeb7a2c5ecafb076d140ce69972cf16045b36c20595396f51ead419b.exe
    "C:\Users\Admin\AppData\Local\Temp\c109d3ebfeb7a2c5ecafb076d140ce69972cf16045b36c20595396f51ead419b.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Windows\System\jLeBZdQ.exe
      C:\Windows\System\jLeBZdQ.exe
      2⤵
      • Executes dropped EXE
      PID:1100
    • C:\Windows\System\uxoIFUP.exe
      C:\Windows\System\uxoIFUP.exe
      2⤵
      • Executes dropped EXE
      PID:1528
    • C:\Windows\System\teCoCtU.exe
      C:\Windows\System\teCoCtU.exe
      2⤵
      • Executes dropped EXE
      PID:1352
    • C:\Windows\System\DaUonST.exe
      C:\Windows\System\DaUonST.exe
      2⤵
      • Executes dropped EXE
      PID:1164
    • C:\Windows\System\pxYCuRZ.exe
      C:\Windows\System\pxYCuRZ.exe
      2⤵
      • Executes dropped EXE
      PID:1984
    • C:\Windows\System\OqWzgca.exe
      C:\Windows\System\OqWzgca.exe
      2⤵
      • Executes dropped EXE
      PID:1976
    • C:\Windows\System\ijJKoyv.exe
      C:\Windows\System\ijJKoyv.exe
      2⤵
      • Executes dropped EXE
      PID:1208
    • C:\Windows\System\EqEqGDF.exe
      C:\Windows\System\EqEqGDF.exe
      2⤵
      • Executes dropped EXE
      PID:1744
    • C:\Windows\System\gMkMIGF.exe
      C:\Windows\System\gMkMIGF.exe
      2⤵
      • Executes dropped EXE
      PID:1748
    • C:\Windows\System\oRUbbUX.exe
      C:\Windows\System\oRUbbUX.exe
      2⤵
      • Executes dropped EXE
      PID:1732
    • C:\Windows\System\VHRUFBS.exe
      C:\Windows\System\VHRUFBS.exe
      2⤵
      • Executes dropped EXE
      PID:1412
    • C:\Windows\System\lyAsNbC.exe
      C:\Windows\System\lyAsNbC.exe
      2⤵
      • Executes dropped EXE
      PID:916
    • C:\Windows\System\KBYZOSc.exe
      C:\Windows\System\KBYZOSc.exe
      2⤵
      • Executes dropped EXE
      PID:1824
    • C:\Windows\System\tMhBdkG.exe
      C:\Windows\System\tMhBdkG.exe
      2⤵
        PID:1628

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\system\DaUonST.exe

      MD5

      27a2ddc1dfcdd07b62892445cdd9d01b

      SHA1

      2755878678737638f3a372f0765a5d5547277522

      SHA256

      c641133a66a6702144af6430ee3c4bfb7fb67a76f785ce58717fbc8c026dd39d

      SHA512

      4ad1f9ae050333c31135fe33538be5bda239f7872a6853ec8883f63bb6689b1720ec19e056965e72ef00edf031ee886bb6d5c4b49eb111ae682887c0fb3391ec

    • C:\Windows\system\EqEqGDF.exe

      MD5

      57978f07674946b808953027abbd09ce

      SHA1

      f3e701c3ceab8bcb2403a2e9f5901127292cf313

      SHA256

      ae425416739b5a61f75572676dca98123a80ee6f3c8e6a9db2a1d35f6858ff36

      SHA512

      3fece96342916a03a102728e4b2c8b279b675a403e2a4923b11029407fd690f51e20a1f302a0f5faf48ec037f79b1a61793054ebceab61cbdb4b74cae2bd98d1

    • C:\Windows\system\KBYZOSc.exe

      MD5

      0ee18f534627730cbda66b4ea6342428

      SHA1

      831269cc1db83cc41d1220a55782895823bc131b

      SHA256

      486d6019dc4b065af5d88e6f7789177d51d2bcb2e4734c58fd0829c97d6a8ca2

      SHA512

      bc8ea2fd17f39562262f46f4c48856212c72ffa91907af191debaa75bb156f2f85bb3e546f4e706ecdec49c3d07ca92ba502020aeed1e16bd312e56de1017b6d

    • C:\Windows\system\OqWzgca.exe

      MD5

      a7e42947be8b69fdb148e2a1ea31b113

      SHA1

      41a86708a9dc514da917ffcdf4733f91815b4856

      SHA256

      f44dbbeb9203157167bc7db4f23a6aa5d63b5a184956574e35519d74de8afdb0

      SHA512

      2883bed5d0c0f93d28f965a201837fb9b0367a1d51146e000436c5c75d27ce905da8ce380ee8c10e8822a277bdd0ee6019f1727f705f69ca3e8b415524e272cd

    • C:\Windows\system\VHRUFBS.exe

      MD5

      b4ecc42de22322929ea0d18fc617fbac

      SHA1

      ca762ce4d495ae5f0f7a8375a08c856706309be1

      SHA256

      1956190c44da2fdeff169f6f26fcb604d6c3ef64c5459ebb0726f640f96d2954

      SHA512

      e264b9b6ff66411858d6aa715dcd1134dca468f2a101ba0ed619556e0c47298b2fd373ff827bab4a65e7404bc8ecd2e45c3660b86ab613fecdf21a2c217c8c3c

    • C:\Windows\system\gMkMIGF.exe

      MD5

      e84c1a693d2b4e2ef8bf64f80fc9dfba

      SHA1

      d749fcd01819f94e25cfff6a504878fe364f566d

      SHA256

      e99dc70d4c557dcc2d1ca22c5924de1c197686db10af16eaeb375587bc2e1951

      SHA512

      81aba57b4fcaf21d6645ae04983a4acbd358efffd277030296c49aab18d9355d8383838c34276c885563d591298ceb61a972d240ece9d961338611c3bc250c95

    • C:\Windows\system\ijJKoyv.exe

      MD5

      f40195b5fe43a5eb6a08403c3006896b

      SHA1

      7c9e8d6a6a6df18355b4057d70be741123d5edbc

      SHA256

      245da44996e69f5649da0108931036939788a7923452ced447a5a2d48a591c4b

      SHA512

      984292729d04dded244b1fdb3de1e8afdd26aae6b514e869533e48ede7d26da064345dacecbd1606314fc581eea1df5d292a10db54095b77b3a81bedca87233d

    • C:\Windows\system\jLeBZdQ.exe

      MD5

      03ded9f1751300d439bbb4270d91dda3

      SHA1

      89ae2c874da4433a533d819d9a36892f7ce306d3

      SHA256

      58bb8d4474d642b6644b494c4d1d26a530e13143bfeb3d2061a81262e0ac9792

      SHA512

      3b10a3cb7c8c80d00c3c6e160d57e693f23eb7c4e496c4b20f0aaacb876c935e66f58f11a2f0c2dd0229dfa98bb4ac4d47dc9a59dc43321d3a9ae9b06d01a704

    • C:\Windows\system\lyAsNbC.exe

      MD5

      fbd15ec30f2258f831b4d4db2e825f71

      SHA1

      30c905ee336a8ca23f25ef83ed1b126090c9df00

      SHA256

      bc22f2de7bb9ea7187f2c9b455e977071a7eac1405f72145782b5d94d9859e74

      SHA512

      6d8d436414db693f02e376d8da742dcb725c1ce69b879708b9bd8287b8925f451e64c50a45dc65b079dd1331cc60039693be3fb082b3621be0840232fcfb8ffb

    • C:\Windows\system\oRUbbUX.exe

      MD5

      ec569c4b46c6e5a5218f5a8b2642d260

      SHA1

      435c0ff89f586275a174be4cbeb80387159d050c

      SHA256

      0ff5283902d26e9311b1874b61da439678d2cbcd4d407f80b39af9566ca89911

      SHA512

      7c5b4b372d874bcc782d55ee72ff054c6372158ed42cb740615be286fbd98087b56eb139241560d51c6911c321b9a008a36d1a7aea4f5495898a89dcec76cda9

    • C:\Windows\system\pxYCuRZ.exe

      MD5

      a95eff3df52269c1e0f37b2544f7686a

      SHA1

      f3ba926283684c5e0fb7cb4f4d401333818322c3

      SHA256

      1180cba4894c87c0b3c256f4639d121e18a36fc55843d8867f058d59c6837b9b

      SHA512

      d85fe459ae92dad4d31ab8f1344fea7ef0d10d634ce0727e5788b6fd916a6ec1ab1f4907c59b0f46317ee7b84b92021e95bc9ade0465a596b410dcee66c68a03

    • C:\Windows\system\teCoCtU.exe

      MD5

      8f29b00ab0e8b7dcf95e127765048d1a

      SHA1

      63055721c5d142a6b830a7cd0e9a7b8f2c032bea

      SHA256

      12ad052f70b87a7c152435c7dac842014943b7c4ff24f829b9cab43470070bd3

      SHA512

      eb85612c77484558789f52b69666e4542bf380f5d5623c1f71c5de527aae400ab0ef26e294690b582be5191492285ac5499e3e58de14a054466cc25593e0d9e7

    • C:\Windows\system\uxoIFUP.exe

      MD5

      e2e65e3efe31971f6494a2f93f74f4ba

      SHA1

      839f81760b988dca8ddfd45b8c8394a92cc41965

      SHA256

      30801a819ec1f759fefaf9f9eaf7ad496dafc1d36fb67b745b2dc3c1c7c06b29

      SHA512

      cb732edd399ea5754e162a791353749b7c0ffa79fc87c656a4fe6834ad566e7ffb8a8b93ef65502ac19900168eaf5151f2fa54699881c3ce69ccf65e78c20455

    • \Windows\system\DaUonST.exe

      MD5

      27a2ddc1dfcdd07b62892445cdd9d01b

      SHA1

      2755878678737638f3a372f0765a5d5547277522

      SHA256

      c641133a66a6702144af6430ee3c4bfb7fb67a76f785ce58717fbc8c026dd39d

      SHA512

      4ad1f9ae050333c31135fe33538be5bda239f7872a6853ec8883f63bb6689b1720ec19e056965e72ef00edf031ee886bb6d5c4b49eb111ae682887c0fb3391ec

    • \Windows\system\EqEqGDF.exe

      MD5

      57978f07674946b808953027abbd09ce

      SHA1

      f3e701c3ceab8bcb2403a2e9f5901127292cf313

      SHA256

      ae425416739b5a61f75572676dca98123a80ee6f3c8e6a9db2a1d35f6858ff36

      SHA512

      3fece96342916a03a102728e4b2c8b279b675a403e2a4923b11029407fd690f51e20a1f302a0f5faf48ec037f79b1a61793054ebceab61cbdb4b74cae2bd98d1

    • \Windows\system\KBYZOSc.exe

      MD5

      0ee18f534627730cbda66b4ea6342428

      SHA1

      831269cc1db83cc41d1220a55782895823bc131b

      SHA256

      486d6019dc4b065af5d88e6f7789177d51d2bcb2e4734c58fd0829c97d6a8ca2

      SHA512

      bc8ea2fd17f39562262f46f4c48856212c72ffa91907af191debaa75bb156f2f85bb3e546f4e706ecdec49c3d07ca92ba502020aeed1e16bd312e56de1017b6d

    • \Windows\system\OqWzgca.exe

      MD5

      a7e42947be8b69fdb148e2a1ea31b113

      SHA1

      41a86708a9dc514da917ffcdf4733f91815b4856

      SHA256

      f44dbbeb9203157167bc7db4f23a6aa5d63b5a184956574e35519d74de8afdb0

      SHA512

      2883bed5d0c0f93d28f965a201837fb9b0367a1d51146e000436c5c75d27ce905da8ce380ee8c10e8822a277bdd0ee6019f1727f705f69ca3e8b415524e272cd

    • \Windows\system\VHRUFBS.exe

      MD5

      b4ecc42de22322929ea0d18fc617fbac

      SHA1

      ca762ce4d495ae5f0f7a8375a08c856706309be1

      SHA256

      1956190c44da2fdeff169f6f26fcb604d6c3ef64c5459ebb0726f640f96d2954

      SHA512

      e264b9b6ff66411858d6aa715dcd1134dca468f2a101ba0ed619556e0c47298b2fd373ff827bab4a65e7404bc8ecd2e45c3660b86ab613fecdf21a2c217c8c3c

    • \Windows\system\gMkMIGF.exe

      MD5

      e84c1a693d2b4e2ef8bf64f80fc9dfba

      SHA1

      d749fcd01819f94e25cfff6a504878fe364f566d

      SHA256

      e99dc70d4c557dcc2d1ca22c5924de1c197686db10af16eaeb375587bc2e1951

      SHA512

      81aba57b4fcaf21d6645ae04983a4acbd358efffd277030296c49aab18d9355d8383838c34276c885563d591298ceb61a972d240ece9d961338611c3bc250c95

    • \Windows\system\ijJKoyv.exe

      MD5

      f40195b5fe43a5eb6a08403c3006896b

      SHA1

      7c9e8d6a6a6df18355b4057d70be741123d5edbc

      SHA256

      245da44996e69f5649da0108931036939788a7923452ced447a5a2d48a591c4b

      SHA512

      984292729d04dded244b1fdb3de1e8afdd26aae6b514e869533e48ede7d26da064345dacecbd1606314fc581eea1df5d292a10db54095b77b3a81bedca87233d

    • \Windows\system\jLeBZdQ.exe

      MD5

      03ded9f1751300d439bbb4270d91dda3

      SHA1

      89ae2c874da4433a533d819d9a36892f7ce306d3

      SHA256

      58bb8d4474d642b6644b494c4d1d26a530e13143bfeb3d2061a81262e0ac9792

      SHA512

      3b10a3cb7c8c80d00c3c6e160d57e693f23eb7c4e496c4b20f0aaacb876c935e66f58f11a2f0c2dd0229dfa98bb4ac4d47dc9a59dc43321d3a9ae9b06d01a704

    • \Windows\system\lyAsNbC.exe

      MD5

      fbd15ec30f2258f831b4d4db2e825f71

      SHA1

      30c905ee336a8ca23f25ef83ed1b126090c9df00

      SHA256

      bc22f2de7bb9ea7187f2c9b455e977071a7eac1405f72145782b5d94d9859e74

      SHA512

      6d8d436414db693f02e376d8da742dcb725c1ce69b879708b9bd8287b8925f451e64c50a45dc65b079dd1331cc60039693be3fb082b3621be0840232fcfb8ffb

    • \Windows\system\oRUbbUX.exe

      MD5

      ec569c4b46c6e5a5218f5a8b2642d260

      SHA1

      435c0ff89f586275a174be4cbeb80387159d050c

      SHA256

      0ff5283902d26e9311b1874b61da439678d2cbcd4d407f80b39af9566ca89911

      SHA512

      7c5b4b372d874bcc782d55ee72ff054c6372158ed42cb740615be286fbd98087b56eb139241560d51c6911c321b9a008a36d1a7aea4f5495898a89dcec76cda9

    • \Windows\system\pxYCuRZ.exe

      MD5

      a95eff3df52269c1e0f37b2544f7686a

      SHA1

      f3ba926283684c5e0fb7cb4f4d401333818322c3

      SHA256

      1180cba4894c87c0b3c256f4639d121e18a36fc55843d8867f058d59c6837b9b

      SHA512

      d85fe459ae92dad4d31ab8f1344fea7ef0d10d634ce0727e5788b6fd916a6ec1ab1f4907c59b0f46317ee7b84b92021e95bc9ade0465a596b410dcee66c68a03

    • \Windows\system\tMhBdkG.exe

      MD5

      7e0de65f070a2650763a2839f6eebbfa

      SHA1

      3f7e9a86171d325ff23966a83ca16474350c6f22

      SHA256

      9f2965c23c611d228929ca55e923901dc61a0aa208c1e1bc100fa0973caaa58e

      SHA512

      9acfe0d0b234f3311b3b16ec635c045793424d901655fc209dd90c79d296b421fea8a16b9e5d6461568a20db253d15ecfeff25093e46191cdf6b369bcd584185

    • \Windows\system\teCoCtU.exe

      MD5

      8f29b00ab0e8b7dcf95e127765048d1a

      SHA1

      63055721c5d142a6b830a7cd0e9a7b8f2c032bea

      SHA256

      12ad052f70b87a7c152435c7dac842014943b7c4ff24f829b9cab43470070bd3

      SHA512

      eb85612c77484558789f52b69666e4542bf380f5d5623c1f71c5de527aae400ab0ef26e294690b582be5191492285ac5499e3e58de14a054466cc25593e0d9e7

    • \Windows\system\uxoIFUP.exe

      MD5

      e2e65e3efe31971f6494a2f93f74f4ba

      SHA1

      839f81760b988dca8ddfd45b8c8394a92cc41965

      SHA256

      30801a819ec1f759fefaf9f9eaf7ad496dafc1d36fb67b745b2dc3c1c7c06b29

      SHA512

      cb732edd399ea5754e162a791353749b7c0ffa79fc87c656a4fe6834ad566e7ffb8a8b93ef65502ac19900168eaf5151f2fa54699881c3ce69ccf65e78c20455

    • memory/916-33-0x0000000000000000-mapping.dmp

    • memory/1100-1-0x0000000000000000-mapping.dmp

    • memory/1164-10-0x0000000000000000-mapping.dmp

    • memory/1208-19-0x0000000000000000-mapping.dmp

    • memory/1352-7-0x0000000000000000-mapping.dmp

    • memory/1412-30-0x0000000000000000-mapping.dmp

    • memory/1528-4-0x0000000000000000-mapping.dmp

    • memory/1628-40-0x0000000000000000-mapping.dmp

    • memory/1732-28-0x0000000000000000-mapping.dmp

    • memory/1744-22-0x0000000000000000-mapping.dmp

    • memory/1748-25-0x0000000000000000-mapping.dmp

    • memory/1824-37-0x0000000000000000-mapping.dmp

    • memory/1976-16-0x0000000000000000-mapping.dmp

    • memory/1984-13-0x0000000000000000-mapping.dmp