Analysis

  • max time kernel
    141s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    18-05-2021 02:16

General

  • Target

    c74ff6eaaaa661c5afea550b36841717655101e65dd20363b691973231dd6f94.exe

  • Size

    732KB

  • MD5

    f1aa227dec8116e737d7f39f1cb96b56

  • SHA1

    f0feb036f9bc220a0131ae894ec04420eb341a23

  • SHA256

    c74ff6eaaaa661c5afea550b36841717655101e65dd20363b691973231dd6f94

  • SHA512

    c97bdd1ab93ef2777b2b7a1da1ce8fb105c44099459c13f342ff0972ff991a58671dc110f84c535ea1ea73aa79bd30af2dfa2f7355f7b2f7458586940f4fef3f

Malware Config

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 5 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c74ff6eaaaa661c5afea550b36841717655101e65dd20363b691973231dd6f94.exe
    "C:\Users\Admin\AppData\Local\Temp\c74ff6eaaaa661c5afea550b36841717655101e65dd20363b691973231dd6f94.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3980
    • C:\Users\Admin\AppData\Local\Temp\c74ff6eaaaa661c5afea550b36841717655101e65dd20363b691973231dd6f94Srv.exe
      C:\Users\Admin\AppData\Local\Temp\c74ff6eaaaa661c5afea550b36841717655101e65dd20363b691973231dd6f94Srv.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:4004
      • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
        "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1304
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1668
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1668 CREDAT:82945 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:3812
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1668 CREDAT:82947 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:3784
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\c74ff6eaaaa661c5afea550b36841717655101e65dd20363b691973231dd6f94.exe" "C:\ProgramData\CacheMgr.exe"
      2⤵
        PID:1216
      • C:\ProgramData\CacheMgr.exe
        "C:\ProgramData\CacheMgr.exe" -as
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3412
        • C:\ProgramData\CacheMgrSrv.exe
          C:\ProgramData\CacheMgrSrv.exe
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious use of WriteProcessMemory
          PID:2392
          • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
            "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2732
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              5⤵
              • Modifies Internet Explorer settings
              PID:3104

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • C:\ProgramData\CacheMgr.exe
      MD5

      f1aa227dec8116e737d7f39f1cb96b56

      SHA1

      f0feb036f9bc220a0131ae894ec04420eb341a23

      SHA256

      c74ff6eaaaa661c5afea550b36841717655101e65dd20363b691973231dd6f94

      SHA512

      c97bdd1ab93ef2777b2b7a1da1ce8fb105c44099459c13f342ff0972ff991a58671dc110f84c535ea1ea73aa79bd30af2dfa2f7355f7b2f7458586940f4fef3f

    • C:\ProgramData\CacheMgr.exe
      MD5

      f1aa227dec8116e737d7f39f1cb96b56

      SHA1

      f0feb036f9bc220a0131ae894ec04420eb341a23

      SHA256

      c74ff6eaaaa661c5afea550b36841717655101e65dd20363b691973231dd6f94

      SHA512

      c97bdd1ab93ef2777b2b7a1da1ce8fb105c44099459c13f342ff0972ff991a58671dc110f84c535ea1ea73aa79bd30af2dfa2f7355f7b2f7458586940f4fef3f

    • C:\ProgramData\CacheMgrSrv.exe
      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • C:\ProgramData\CacheMgrSrv.exe
      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
      MD5

      ed12f848675f60a8c6381e86757b45e4

      SHA1

      20074b94dec241fe3c0cdd73463fab219cb25e05

      SHA256

      89787196d17192621b9a1190777f880486495482fed4ac33bcf081597119ef4e

      SHA512

      fe7ba86adbdcdfc9128b6369c48a835bf2528b0fecde6361b77b57466b5c784d780ea37332b2e9815f363d008c02fa8cfb1032481b1b0f68229dbb2f254fda3a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
      MD5

      695b8a311e200d3393c5b46744862f38

      SHA1

      47b7f9e508020b2bd209a603b0fae724d2f42835

      SHA256

      321df841a25ee468a448b9ad1f0faf6b07813675db7dc5510ad28bf1b7bd8582

      SHA512

      246c8ebeccfb71d915665cc400316714ae102635451daf7787f57ed3fbbc8fa7e50cfde7d54cd1c95a18042581c6b6087e7545261b6b20ca671c266af3a64ce8

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\0LYOP00Y.cookie
      MD5

      381419cbad4cb503759f4dfec11a0959

      SHA1

      131030ecce95dd3aba1c72f3911e1fa718578036

      SHA256

      c77e9c3ed1d3499d04391e4e4a95cdd1257662564baf3a725b412515dcbf20ee

      SHA512

      1c3fe9066336fcddc141f4596734df770fbbc95af250b17490f9af307f9ac20876ffdde1be923198724b0984e294b2ad0e39b9f8dafa59b59206c6ff66c34947

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\O7QXL507.cookie
      MD5

      2e77aca52737500460cdb28a02f84d5b

      SHA1

      1246780065df12acd66c52cd82aabe206f732a60

      SHA256

      a39f813c87c959cb3ee3bd1b6dd747d335484dac8356ab6131e0ea53c3031819

      SHA512

      30f67d1fd76fd980ac7e6920227ba1e46053462af27d47af4ff488f903159efe7d6c72e1ba0def26f15838c335ed23fc8119c21b2b1ba54365cefa71c5758cc3

    • C:\Users\Admin\AppData\Local\Temp\c74ff6eaaaa661c5afea550b36841717655101e65dd20363b691973231dd6f94Srv.exe
      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • C:\Users\Admin\AppData\Local\Temp\c74ff6eaaaa661c5afea550b36841717655101e65dd20363b691973231dd6f94Srv.exe
      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1216-117-0x0000000000000000-mapping.dmp
    • memory/1304-118-0x0000000000000000-mapping.dmp
    • memory/1304-121-0x00000000001F0000-0x00000000001F1000-memory.dmp
      Filesize

      4KB

    • memory/1668-123-0x00007FFF41BD0000-0x00007FFF41C3B000-memory.dmp
      Filesize

      428KB

    • memory/1668-122-0x0000000000000000-mapping.dmp
    • memory/2392-133-0x0000000000000000-mapping.dmp
    • memory/2732-136-0x0000000000000000-mapping.dmp
    • memory/3104-140-0x0000000000000000-mapping.dmp
    • memory/3104-141-0x00007FFF41BD0000-0x00007FFF41C3B000-memory.dmp
      Filesize

      428KB

    • memory/3412-130-0x0000000000000000-mapping.dmp
    • memory/3784-142-0x0000000000000000-mapping.dmp
    • memory/3812-126-0x0000000000000000-mapping.dmp
    • memory/3980-127-0x00000000001D0000-0x00000000001E6000-memory.dmp
      Filesize

      88KB

    • memory/4004-114-0x0000000000000000-mapping.dmp
    • memory/4004-125-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/4004-124-0x00000000001E0000-0x00000000001EF000-memory.dmp
      Filesize

      60KB