Analysis

  • max time kernel
    54s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    10-11-2020 07:01

General

  • Target

    88c8a166073bb31c9fef3109819b5ff0b62cdd298790eef5f2d5b9d8c2d47fd6.exe

  • Size

    5.9MB

  • MD5

    6b6f1bf842a1e54a33a820dd52fcb9d4

  • SHA1

    f5c7a783d775c5dd6cc120f19d73d1b9bf86c0d0

  • SHA256

    88c8a166073bb31c9fef3109819b5ff0b62cdd298790eef5f2d5b9d8c2d47fd6

  • SHA512

    b7afc0d0b232c525ac61194972ef671fd07193a630ccb61cc8f29624662c7b369600340cd7e99149ffb6e79c827cbb3a0e137e82cf5f7e930b64e1908ca168db

Malware Config

Signatures

  • Cobalt Strike reflective loader 27 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Executes dropped EXE 13 IoCs
  • UPX packed file 27 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 14 IoCs
  • JavaScript code in executable 27 IoCs
  • Drops file in Windows directory 14 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88c8a166073bb31c9fef3109819b5ff0b62cdd298790eef5f2d5b9d8c2d47fd6.exe
    "C:\Users\Admin\AppData\Local\Temp\88c8a166073bb31c9fef3109819b5ff0b62cdd298790eef5f2d5b9d8c2d47fd6.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Windows\System\EaexpYj.exe
      C:\Windows\System\EaexpYj.exe
      2⤵
      • Executes dropped EXE
      PID:1996
    • C:\Windows\System\TBkDtMR.exe
      C:\Windows\System\TBkDtMR.exe
      2⤵
      • Executes dropped EXE
      PID:2000
    • C:\Windows\System\phIrRAH.exe
      C:\Windows\System\phIrRAH.exe
      2⤵
      • Executes dropped EXE
      PID:2028
    • C:\Windows\System\cFzppYD.exe
      C:\Windows\System\cFzppYD.exe
      2⤵
      • Executes dropped EXE
      PID:1484
    • C:\Windows\System\jrxCpuv.exe
      C:\Windows\System\jrxCpuv.exe
      2⤵
      • Executes dropped EXE
      PID:1412
    • C:\Windows\System\dQxxmHr.exe
      C:\Windows\System\dQxxmHr.exe
      2⤵
      • Executes dropped EXE
      PID:1964
    • C:\Windows\System\djrIzST.exe
      C:\Windows\System\djrIzST.exe
      2⤵
      • Executes dropped EXE
      PID:1200
    • C:\Windows\System\LkoVvLf.exe
      C:\Windows\System\LkoVvLf.exe
      2⤵
      • Executes dropped EXE
      PID:1844
    • C:\Windows\System\ZKXPlkr.exe
      C:\Windows\System\ZKXPlkr.exe
      2⤵
      • Executes dropped EXE
      PID:1812
    • C:\Windows\System\RrfVhAe.exe
      C:\Windows\System\RrfVhAe.exe
      2⤵
      • Executes dropped EXE
      PID:1704
    • C:\Windows\System\tdWrbOk.exe
      C:\Windows\System\tdWrbOk.exe
      2⤵
      • Executes dropped EXE
      PID:1652
    • C:\Windows\System\MSdQxtp.exe
      C:\Windows\System\MSdQxtp.exe
      2⤵
      • Executes dropped EXE
      PID:1336
    • C:\Windows\System\XraOuOx.exe
      C:\Windows\System\XraOuOx.exe
      2⤵
      • Executes dropped EXE
      PID:832
    • C:\Windows\System\ttOLQnt.exe
      C:\Windows\System\ttOLQnt.exe
      2⤵
        PID:1236

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\system\EaexpYj.exe

      MD5

      1960f11e8e09469abd376739548e9bcb

      SHA1

      4ba752d50c046110bd0771d5c4d2d94da16e1686

      SHA256

      5cdaf893da8aee0dd0342ac9b0c3e88414ecab2a4dfbdf6b1a592b89ff344d64

      SHA512

      cdf2582a59c19eb80238aac6ff8cdf10d50b369ebbfe9f9c11c508eadd9b058157e5d2658984716de51bff3c4d251d5f16c216201d9f49c7ccce20b092a64999

    • C:\Windows\system\LkoVvLf.exe

      MD5

      90fb9d3c5f7cea338f4b6e4ef33ce288

      SHA1

      e68e80758ad0fdef40bfb163571d85d5c05c7a09

      SHA256

      865319c273cc2de9ab60b2224f606bb78e2a52d22668488110fda473ef4a368b

      SHA512

      bc849135fb477a454eaf619b807ff7c34cb074a0a26b8e58ffad4411fe6e28792bcb59ce3b67a7122f84ae01f6a8907eab77887e880cc20132ca0d6214861fdf

    • C:\Windows\system\MSdQxtp.exe

      MD5

      58b736c79c3330bd378dfe0d0660037f

      SHA1

      f7b79aa7ab02922c83099f91166ba1ed0a200f42

      SHA256

      46a8d75992560b79555d36c41d4e86969802b55e8fc72343fa679120a1e6a8b2

      SHA512

      14da0fe6b765a68de44990dc01b6c169d71cd2cb6dbb10511c3d4fda2490906517b7c5400fe14ee0e95909f245444737b63a38ed96b4582afb95aed4f63b677a

    • C:\Windows\system\RrfVhAe.exe

      MD5

      ab108b622f807ce536d4866a009318e0

      SHA1

      349be661e6e7111af728b77eecddc819eee97b10

      SHA256

      d73a2acb988d923435f94fd05de95b34e0f93be19faae7c9b15968dc40599dcd

      SHA512

      74b09e3d17e606270d4ae2b1599fa0d39e8ad1238e19031c08553e293736e26f55003bbea0d3ac3df6ad0b5339dff59e46f93164e7c18727534cca96d278cc2d

    • C:\Windows\system\TBkDtMR.exe

      MD5

      5712197dd07472ba84a7c9feacd821f0

      SHA1

      a715125cdb39fa014e41a420e0753ff72e1c0568

      SHA256

      04d67693c551d31e056d89e3788d78b3707c5ca25c4c96f69a01c314969ec0d4

      SHA512

      83a6661099d550723a17e1832ea9cce56706db41501d450a5c489adb765f7e689ec65feef761eb026b9f35b43118336092d772b37fedd39ba8a8dd8928ec9be2

    • C:\Windows\system\XraOuOx.exe

      MD5

      5faa005a3dfbad33396071829e41cffb

      SHA1

      74a94d4743695912c7bf9b34d2c2c706191772d4

      SHA256

      6be474ea3061e876e6270658303d89b6b7bba348ba0122b2da3e944d80de7a89

      SHA512

      b504c7100aba80edce133b60690e70e45d1208618b95370e017ecd92eb5b67ec939c9f71800d0cb967ee338cabb0ce7b7ddedfd79e2e4ed4c6718e6e936b1c59

    • C:\Windows\system\ZKXPlkr.exe

      MD5

      3761e18e8e2077679984464caa871ceb

      SHA1

      057a84068865f0e480429890b8f0930b38391645

      SHA256

      0bee1cadd37ce7da60f46f7e75dc70612009a643ae7bbfa9bb9ec261a6a1aee3

      SHA512

      8ea5e27ead0dde7816e7cbdd96ffd633d9c645abdc7e497d69224f51cd29bedd189c90bf039d5c7b4f689a0c61d46107e56371724f18bf7155b01ffb608dcdad

    • C:\Windows\system\cFzppYD.exe

      MD5

      803d5e15870e56388c0abcedbeadc781

      SHA1

      0680cdbca682ef3aa0f35b8f7dba55e76c0e6200

      SHA256

      1f5b54fd9494f83cd444c8eb4c947aac4eac2aeff4538607e620d860b1b5bb15

      SHA512

      bb50541292d0cfb1a790087994c950bb79f93f6a0dfb05bbc68b7e02a6fe9b63e7d42d6cb912764a2c4e565deebe1dd7e5b0dabdf95ad94dcc2feace4f5e305c

    • C:\Windows\system\dQxxmHr.exe

      MD5

      cb3d8a195f1fdfc5df182a468a794b11

      SHA1

      bc094f6ac165e40cbb5da7630ef45dc0b6d7516e

      SHA256

      4eb5e4b86f561c41dc26263e463d016646614fe6c8ac3cf623db16dde8333c61

      SHA512

      f7f707464a633014e1203013e5af32d84dde1181c77a219feaa64e840a01302282aa19538aab08fca903c840df7ccc157eaa0500160f2f1e1b0c3772edf40748

    • C:\Windows\system\djrIzST.exe

      MD5

      e7f74271ed40c3036da2459910f908d9

      SHA1

      e8ecbebdfd38f6f3c472be2fb4b1f5e69db90928

      SHA256

      300c047de9c774d674e96ebc0c41ed56c37ab27a81d4810cae855a642c181e0f

      SHA512

      945dc671b8c8ec13ff89cf9228d4d798c1988595501bbaa57c3e3558955c7576e169d224b95ae0c7c45a5761515e717f76cee0f7cf4f1c9113f83be363b27e5f

    • C:\Windows\system\jrxCpuv.exe

      MD5

      786de16d76b7db006d5ae650001741cc

      SHA1

      abd2fba91a6e5e59961664d2baef7b1eac476990

      SHA256

      8bedb8ae5d495d755563be36e1e75b4abaea1513fa1dcfd3931e4d3b595c6d7b

      SHA512

      f3df0d4012e3e5925cd76500ebaaed8baa09c928815cb89f988bc5bc08ab0a5334a44315e4a57f27885aaf26ca0f80c26c907c6a958c42a8f772fb751edc4463

    • C:\Windows\system\phIrRAH.exe

      MD5

      52644c0a3cc54fdc6cab8c3ae76ebad1

      SHA1

      2b5ec8cce637bae9cb7fccec16d825d6cf8b17f8

      SHA256

      acc9901122cb79d156812b7ff1b62c9863d4cb4226fbdef345207e99b46b4481

      SHA512

      1292003c8b0849085bf186b4f2eb7472a63e6a1964509556274f43b654e2b37b97b84254e1f9e338a4860e77ad9d89ee0a7b0a4ee6955a21415d39294f76feef

    • C:\Windows\system\tdWrbOk.exe

      MD5

      8ee1bf46074a14a8764a5f95dfc7cc4f

      SHA1

      c859f4d048bda6c221364b97770b30cde20f5fb9

      SHA256

      7bfe16a018e51e39cbb57583962ed0e2df651ee118af95201896bb86c74031f1

      SHA512

      cbc7ea5b11371331ea70faffb5e5a798b8d0fbc18d87f2d37d96429940a09a9cc6bd6f9f3e4bf1cc9b98e94412459dc2bf513761f460b319cd9667f67d7c3526

    • \Windows\system\EaexpYj.exe

      MD5

      1960f11e8e09469abd376739548e9bcb

      SHA1

      4ba752d50c046110bd0771d5c4d2d94da16e1686

      SHA256

      5cdaf893da8aee0dd0342ac9b0c3e88414ecab2a4dfbdf6b1a592b89ff344d64

      SHA512

      cdf2582a59c19eb80238aac6ff8cdf10d50b369ebbfe9f9c11c508eadd9b058157e5d2658984716de51bff3c4d251d5f16c216201d9f49c7ccce20b092a64999

    • \Windows\system\LkoVvLf.exe

      MD5

      90fb9d3c5f7cea338f4b6e4ef33ce288

      SHA1

      e68e80758ad0fdef40bfb163571d85d5c05c7a09

      SHA256

      865319c273cc2de9ab60b2224f606bb78e2a52d22668488110fda473ef4a368b

      SHA512

      bc849135fb477a454eaf619b807ff7c34cb074a0a26b8e58ffad4411fe6e28792bcb59ce3b67a7122f84ae01f6a8907eab77887e880cc20132ca0d6214861fdf

    • \Windows\system\MSdQxtp.exe

      MD5

      58b736c79c3330bd378dfe0d0660037f

      SHA1

      f7b79aa7ab02922c83099f91166ba1ed0a200f42

      SHA256

      46a8d75992560b79555d36c41d4e86969802b55e8fc72343fa679120a1e6a8b2

      SHA512

      14da0fe6b765a68de44990dc01b6c169d71cd2cb6dbb10511c3d4fda2490906517b7c5400fe14ee0e95909f245444737b63a38ed96b4582afb95aed4f63b677a

    • \Windows\system\RrfVhAe.exe

      MD5

      ab108b622f807ce536d4866a009318e0

      SHA1

      349be661e6e7111af728b77eecddc819eee97b10

      SHA256

      d73a2acb988d923435f94fd05de95b34e0f93be19faae7c9b15968dc40599dcd

      SHA512

      74b09e3d17e606270d4ae2b1599fa0d39e8ad1238e19031c08553e293736e26f55003bbea0d3ac3df6ad0b5339dff59e46f93164e7c18727534cca96d278cc2d

    • \Windows\system\TBkDtMR.exe

      MD5

      5712197dd07472ba84a7c9feacd821f0

      SHA1

      a715125cdb39fa014e41a420e0753ff72e1c0568

      SHA256

      04d67693c551d31e056d89e3788d78b3707c5ca25c4c96f69a01c314969ec0d4

      SHA512

      83a6661099d550723a17e1832ea9cce56706db41501d450a5c489adb765f7e689ec65feef761eb026b9f35b43118336092d772b37fedd39ba8a8dd8928ec9be2

    • \Windows\system\XraOuOx.exe

      MD5

      5faa005a3dfbad33396071829e41cffb

      SHA1

      74a94d4743695912c7bf9b34d2c2c706191772d4

      SHA256

      6be474ea3061e876e6270658303d89b6b7bba348ba0122b2da3e944d80de7a89

      SHA512

      b504c7100aba80edce133b60690e70e45d1208618b95370e017ecd92eb5b67ec939c9f71800d0cb967ee338cabb0ce7b7ddedfd79e2e4ed4c6718e6e936b1c59

    • \Windows\system\ZKXPlkr.exe

      MD5

      3761e18e8e2077679984464caa871ceb

      SHA1

      057a84068865f0e480429890b8f0930b38391645

      SHA256

      0bee1cadd37ce7da60f46f7e75dc70612009a643ae7bbfa9bb9ec261a6a1aee3

      SHA512

      8ea5e27ead0dde7816e7cbdd96ffd633d9c645abdc7e497d69224f51cd29bedd189c90bf039d5c7b4f689a0c61d46107e56371724f18bf7155b01ffb608dcdad

    • \Windows\system\cFzppYD.exe

      MD5

      803d5e15870e56388c0abcedbeadc781

      SHA1

      0680cdbca682ef3aa0f35b8f7dba55e76c0e6200

      SHA256

      1f5b54fd9494f83cd444c8eb4c947aac4eac2aeff4538607e620d860b1b5bb15

      SHA512

      bb50541292d0cfb1a790087994c950bb79f93f6a0dfb05bbc68b7e02a6fe9b63e7d42d6cb912764a2c4e565deebe1dd7e5b0dabdf95ad94dcc2feace4f5e305c

    • \Windows\system\dQxxmHr.exe

      MD5

      cb3d8a195f1fdfc5df182a468a794b11

      SHA1

      bc094f6ac165e40cbb5da7630ef45dc0b6d7516e

      SHA256

      4eb5e4b86f561c41dc26263e463d016646614fe6c8ac3cf623db16dde8333c61

      SHA512

      f7f707464a633014e1203013e5af32d84dde1181c77a219feaa64e840a01302282aa19538aab08fca903c840df7ccc157eaa0500160f2f1e1b0c3772edf40748

    • \Windows\system\djrIzST.exe

      MD5

      e7f74271ed40c3036da2459910f908d9

      SHA1

      e8ecbebdfd38f6f3c472be2fb4b1f5e69db90928

      SHA256

      300c047de9c774d674e96ebc0c41ed56c37ab27a81d4810cae855a642c181e0f

      SHA512

      945dc671b8c8ec13ff89cf9228d4d798c1988595501bbaa57c3e3558955c7576e169d224b95ae0c7c45a5761515e717f76cee0f7cf4f1c9113f83be363b27e5f

    • \Windows\system\jrxCpuv.exe

      MD5

      786de16d76b7db006d5ae650001741cc

      SHA1

      abd2fba91a6e5e59961664d2baef7b1eac476990

      SHA256

      8bedb8ae5d495d755563be36e1e75b4abaea1513fa1dcfd3931e4d3b595c6d7b

      SHA512

      f3df0d4012e3e5925cd76500ebaaed8baa09c928815cb89f988bc5bc08ab0a5334a44315e4a57f27885aaf26ca0f80c26c907c6a958c42a8f772fb751edc4463

    • \Windows\system\phIrRAH.exe

      MD5

      52644c0a3cc54fdc6cab8c3ae76ebad1

      SHA1

      2b5ec8cce637bae9cb7fccec16d825d6cf8b17f8

      SHA256

      acc9901122cb79d156812b7ff1b62c9863d4cb4226fbdef345207e99b46b4481

      SHA512

      1292003c8b0849085bf186b4f2eb7472a63e6a1964509556274f43b654e2b37b97b84254e1f9e338a4860e77ad9d89ee0a7b0a4ee6955a21415d39294f76feef

    • \Windows\system\tdWrbOk.exe

      MD5

      8ee1bf46074a14a8764a5f95dfc7cc4f

      SHA1

      c859f4d048bda6c221364b97770b30cde20f5fb9

      SHA256

      7bfe16a018e51e39cbb57583962ed0e2df651ee118af95201896bb86c74031f1

      SHA512

      cbc7ea5b11371331ea70faffb5e5a798b8d0fbc18d87f2d37d96429940a09a9cc6bd6f9f3e4bf1cc9b98e94412459dc2bf513761f460b319cd9667f67d7c3526

    • \Windows\system\ttOLQnt.exe

      MD5

      56da5fe27c62fd002d8e5f579c7850ea

      SHA1

      b1bfebd5845de42923112c74266a86acb09254c3

      SHA256

      2563308ba184bba223b952f5c10f08b6341cfbe7fc23d7fdb3267d2183b625c2

      SHA512

      3d25fc449847f36d88454b25f266654c5730ef3b165353387721d168a3d04274ce7da0f2d4d0f7f632312764f2f3c544cc1b9111606b4610fdaf63c003dc2c73

    • memory/832-37-0x0000000000000000-mapping.dmp

    • memory/1200-19-0x0000000000000000-mapping.dmp

    • memory/1236-40-0x0000000000000000-mapping.dmp

    • memory/1336-34-0x0000000000000000-mapping.dmp

    • memory/1412-13-0x0000000000000000-mapping.dmp

    • memory/1484-10-0x0000000000000000-mapping.dmp

    • memory/1652-31-0x0000000000000000-mapping.dmp

    • memory/1704-28-0x0000000000000000-mapping.dmp

    • memory/1812-25-0x0000000000000000-mapping.dmp

    • memory/1844-22-0x0000000000000000-mapping.dmp

    • memory/1964-16-0x0000000000000000-mapping.dmp

    • memory/1996-1-0x0000000000000000-mapping.dmp

    • memory/2000-4-0x0000000000000000-mapping.dmp

    • memory/2028-7-0x0000000000000000-mapping.dmp