Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
07-01-2022 10:08
Static task
static1
Behavioral task
behavioral1
Sample
16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.exe
Resource
win10-en-20211208
General
-
Target
16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.exe
-
Size
56.8MB
-
MD5
bc6684c0ea7c60d44ae6ff4434810e09
-
SHA1
cbdc8ae37e94d69261b1985e1d3f2183f6174e01
-
SHA256
16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7
-
SHA512
17d2e6c593318ebb0aa867dd973a2004350cf0330be8c5a2807f90720adf4fc870a5504cb3035eb427e15847ffac4f6a2052bddb47bad55754f0150ee149600d
Malware Config
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Executes dropped EXE 2 IoCs
Processes:
exploer.exeSetup5.exepid process 760 exploer.exe 568 Setup5.exe -
Loads dropped DLL 5 IoCs
Processes:
16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.exeSetup5.exepid process 1880 16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.exe 568 Setup5.exe 568 Setup5.exe 568 Setup5.exe 568 Setup5.exe -
Drops file in System32 directory 5 IoCs
Processes:
attrib.exeexploer.exeattrib.exedescription ioc process File opened for modification C:\Windows\System32\qwave.exe attrib.exe File created C:\Windows\System32\qcap.exe exploer.exe File opened for modification C:\Windows\System32\qcap.exe attrib.exe File created C:\Windows\System32\qwave.exe exploer.exe File opened for modification C:\Windows\System32\qwave.exe exploer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 10 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Setup5.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\Setup5.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\Setup5.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\Setup5.exe nsis_installer_2 \Users\Admin\AppData\Local\Temp\Setup5.exe nsis_installer_1 \Users\Admin\AppData\Local\Temp\Setup5.exe nsis_installer_2 \Users\Admin\AppData\Local\Temp\Setup5.exe nsis_installer_1 \Users\Admin\AppData\Local\Temp\Setup5.exe nsis_installer_2 \Users\Admin\AppData\Local\Temp\Setup5.exe nsis_installer_1 \Users\Admin\AppData\Local\Temp\Setup5.exe nsis_installer_2 -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
Setup5.exepid process 568 Setup5.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
exploer.exepid process 760 exploer.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.exepid process 1880 16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.execmd.exeexploer.execmd.execmd.execmd.exedescription pid process target process PID 1880 wrote to memory of 1156 1880 16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.exe cmd.exe PID 1880 wrote to memory of 1156 1880 16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.exe cmd.exe PID 1880 wrote to memory of 1156 1880 16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.exe cmd.exe PID 1880 wrote to memory of 760 1880 16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.exe exploer.exe PID 1880 wrote to memory of 760 1880 16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.exe exploer.exe PID 1880 wrote to memory of 760 1880 16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.exe exploer.exe PID 1156 wrote to memory of 568 1156 cmd.exe Setup5.exe PID 1156 wrote to memory of 568 1156 cmd.exe Setup5.exe PID 1156 wrote to memory of 568 1156 cmd.exe Setup5.exe PID 1156 wrote to memory of 568 1156 cmd.exe Setup5.exe PID 1156 wrote to memory of 568 1156 cmd.exe Setup5.exe PID 1156 wrote to memory of 568 1156 cmd.exe Setup5.exe PID 1156 wrote to memory of 568 1156 cmd.exe Setup5.exe PID 760 wrote to memory of 1068 760 exploer.exe cmd.exe PID 760 wrote to memory of 1068 760 exploer.exe cmd.exe PID 760 wrote to memory of 1068 760 exploer.exe cmd.exe PID 1068 wrote to memory of 1580 1068 cmd.exe attrib.exe PID 1068 wrote to memory of 1580 1068 cmd.exe attrib.exe PID 1068 wrote to memory of 1580 1068 cmd.exe attrib.exe PID 760 wrote to memory of 1536 760 exploer.exe cmd.exe PID 760 wrote to memory of 1536 760 exploer.exe cmd.exe PID 760 wrote to memory of 1536 760 exploer.exe cmd.exe PID 1536 wrote to memory of 364 1536 cmd.exe attrib.exe PID 1536 wrote to memory of 364 1536 cmd.exe attrib.exe PID 1536 wrote to memory of 364 1536 cmd.exe attrib.exe PID 760 wrote to memory of 1060 760 exploer.exe WerFault.exe PID 760 wrote to memory of 1060 760 exploer.exe WerFault.exe PID 760 wrote to memory of 1060 760 exploer.exe WerFault.exe PID 760 wrote to memory of 1060 760 exploer.exe WerFault.exe PID 760 wrote to memory of 1060 760 exploer.exe WerFault.exe PID 760 wrote to memory of 1760 760 exploer.exe cmd.exe PID 760 wrote to memory of 1760 760 exploer.exe cmd.exe PID 760 wrote to memory of 1760 760 exploer.exe cmd.exe PID 1760 wrote to memory of 888 1760 cmd.exe attrib.exe PID 1760 wrote to memory of 888 1760 cmd.exe attrib.exe PID 1760 wrote to memory of 888 1760 cmd.exe attrib.exe PID 760 wrote to memory of 904 760 exploer.exe WerFault.exe PID 760 wrote to memory of 904 760 exploer.exe WerFault.exe PID 760 wrote to memory of 904 760 exploer.exe WerFault.exe PID 760 wrote to memory of 904 760 exploer.exe WerFault.exe PID 760 wrote to memory of 904 760 exploer.exe WerFault.exe PID 760 wrote to memory of 668 760 exploer.exe WerFault.exe PID 760 wrote to memory of 668 760 exploer.exe WerFault.exe PID 760 wrote to memory of 668 760 exploer.exe WerFault.exe PID 760 wrote to memory of 668 760 exploer.exe WerFault.exe PID 760 wrote to memory of 668 760 exploer.exe WerFault.exe -
Views/modifies file attributes 1 TTPs 3 IoCs
Processes:
attrib.exeattrib.exeattrib.exepid process 1580 attrib.exe 364 attrib.exe 888 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.exe"C:\Users\Admin\AppData\Local\Temp\16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd " /c " C:\Users\Admin\AppData\Local\Temp\Setup5.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Setup5.exeC:\Users\Admin\AppData\Local\Temp\Setup5.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: CmdExeWriteProcessMemorySpam
-
C:\Users\Public\exploer.exeC:\Users\Public\exploer.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C attrib +s +h C:\Windows\temp\svchost.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\attrib.exeattrib +s +h C:\Windows\temp\svchost.exe4⤵
- Views/modifies file attributes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C attrib +s +h C:\Windows\System32\qwave.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\attrib.exeattrib +s +h C:\Windows\System32\qwave.exe4⤵
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C attrib +s +h C:\Windows\System32\qcap.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\attrib.exeattrib +s +h C:\Windows\System32\qcap.exe4⤵
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe3⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Setup5.exeMD5
f5b875d37f61f584b06773be32348d99
SHA13d1d83b0ec0637d8e787e2a9360ff94e6cd65db7
SHA2562594946449cff84eec6cd8f715a294eea17f31edf67d344b4340312429500f49
SHA51291622dbe4ae1956ff14d3cc364635facc366bf0e7f7aab02ecafbc55b0970e196d1ad20f4695fdbf805f76a170e39c6776f3e5da05112f036fca4d79eebe600a
-
C:\Users\Admin\AppData\Local\Temp\Setup5.exeMD5
f5b875d37f61f584b06773be32348d99
SHA13d1d83b0ec0637d8e787e2a9360ff94e6cd65db7
SHA2562594946449cff84eec6cd8f715a294eea17f31edf67d344b4340312429500f49
SHA51291622dbe4ae1956ff14d3cc364635facc366bf0e7f7aab02ecafbc55b0970e196d1ad20f4695fdbf805f76a170e39c6776f3e5da05112f036fca4d79eebe600a
-
C:\Users\Public\exploer.exeMD5
41613750aa14b52bd1be35b0df84b2ab
SHA161b3b7a964fbb32440231db533921bd22b5b1c6c
SHA256104d560b8b5e5aa995de035598c171ea0e4905c94d148077c8d87c9ce44c4fce
SHA5123e4faab7e760c49c3d8e0f35626e293478aa0ea80e147a884e61e7ced9dace0cc100883e58f9ac932d6cc3f9f4adb91a31fa90f9aec7418202d939dceda3f7cc
-
C:\Users\Public\exploer.exeMD5
41613750aa14b52bd1be35b0df84b2ab
SHA161b3b7a964fbb32440231db533921bd22b5b1c6c
SHA256104d560b8b5e5aa995de035598c171ea0e4905c94d148077c8d87c9ce44c4fce
SHA5123e4faab7e760c49c3d8e0f35626e293478aa0ea80e147a884e61e7ced9dace0cc100883e58f9ac932d6cc3f9f4adb91a31fa90f9aec7418202d939dceda3f7cc
-
C:\Windows\System32\qcap.exeMD5
41613750aa14b52bd1be35b0df84b2ab
SHA161b3b7a964fbb32440231db533921bd22b5b1c6c
SHA256104d560b8b5e5aa995de035598c171ea0e4905c94d148077c8d87c9ce44c4fce
SHA5123e4faab7e760c49c3d8e0f35626e293478aa0ea80e147a884e61e7ced9dace0cc100883e58f9ac932d6cc3f9f4adb91a31fa90f9aec7418202d939dceda3f7cc
-
C:\Windows\System32\qwave.exeMD5
41613750aa14b52bd1be35b0df84b2ab
SHA161b3b7a964fbb32440231db533921bd22b5b1c6c
SHA256104d560b8b5e5aa995de035598c171ea0e4905c94d148077c8d87c9ce44c4fce
SHA5123e4faab7e760c49c3d8e0f35626e293478aa0ea80e147a884e61e7ced9dace0cc100883e58f9ac932d6cc3f9f4adb91a31fa90f9aec7418202d939dceda3f7cc
-
C:\Windows\temp\svchost.exeMD5
41613750aa14b52bd1be35b0df84b2ab
SHA161b3b7a964fbb32440231db533921bd22b5b1c6c
SHA256104d560b8b5e5aa995de035598c171ea0e4905c94d148077c8d87c9ce44c4fce
SHA5123e4faab7e760c49c3d8e0f35626e293478aa0ea80e147a884e61e7ced9dace0cc100883e58f9ac932d6cc3f9f4adb91a31fa90f9aec7418202d939dceda3f7cc
-
\Users\Admin\AppData\Local\Temp\Setup5.exeMD5
f5b875d37f61f584b06773be32348d99
SHA13d1d83b0ec0637d8e787e2a9360ff94e6cd65db7
SHA2562594946449cff84eec6cd8f715a294eea17f31edf67d344b4340312429500f49
SHA51291622dbe4ae1956ff14d3cc364635facc366bf0e7f7aab02ecafbc55b0970e196d1ad20f4695fdbf805f76a170e39c6776f3e5da05112f036fca4d79eebe600a
-
\Users\Admin\AppData\Local\Temp\Setup5.exeMD5
f5b875d37f61f584b06773be32348d99
SHA13d1d83b0ec0637d8e787e2a9360ff94e6cd65db7
SHA2562594946449cff84eec6cd8f715a294eea17f31edf67d344b4340312429500f49
SHA51291622dbe4ae1956ff14d3cc364635facc366bf0e7f7aab02ecafbc55b0970e196d1ad20f4695fdbf805f76a170e39c6776f3e5da05112f036fca4d79eebe600a
-
\Users\Admin\AppData\Local\Temp\Setup5.exeMD5
f5b875d37f61f584b06773be32348d99
SHA13d1d83b0ec0637d8e787e2a9360ff94e6cd65db7
SHA2562594946449cff84eec6cd8f715a294eea17f31edf67d344b4340312429500f49
SHA51291622dbe4ae1956ff14d3cc364635facc366bf0e7f7aab02ecafbc55b0970e196d1ad20f4695fdbf805f76a170e39c6776f3e5da05112f036fca4d79eebe600a
-
\Users\Admin\AppData\Local\Temp\nsiE8E9.tmp\InstallOptions.dllMD5
325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf
-
\Users\Public\exploer.exeMD5
41613750aa14b52bd1be35b0df84b2ab
SHA161b3b7a964fbb32440231db533921bd22b5b1c6c
SHA256104d560b8b5e5aa995de035598c171ea0e4905c94d148077c8d87c9ce44c4fce
SHA5123e4faab7e760c49c3d8e0f35626e293478aa0ea80e147a884e61e7ced9dace0cc100883e58f9ac932d6cc3f9f4adb91a31fa90f9aec7418202d939dceda3f7cc
-
memory/364-75-0x0000000000000000-mapping.dmp
-
memory/568-62-0x0000000075AB1000-0x0000000075AB3000-memory.dmpFilesize
8KB
-
memory/568-60-0x0000000000000000-mapping.dmp
-
memory/668-115-0x0000000001E20000-0x0000000001E72000-memory.dmpFilesize
328KB
-
memory/668-105-0x00000000000A0000-0x00000000000BA000-memory.dmpFilesize
104KB
-
memory/668-119-0x0000000001E77000-0x0000000001E78000-memory.dmpFilesize
4KB
-
memory/668-118-0x0000000001E76000-0x0000000001E77000-memory.dmpFilesize
4KB
-
memory/668-103-0x0000000000060000-0x000000000009A000-memory.dmpFilesize
232KB
-
memory/668-116-0x0000000001E72000-0x0000000001E74000-memory.dmpFilesize
8KB
-
memory/668-106-0x0000000000000000-mapping.dmp
-
memory/668-111-0x00000000001F0000-0x000000000020E000-memory.dmpFilesize
120KB
-
memory/668-117-0x0000000001E74000-0x0000000001E76000-memory.dmpFilesize
8KB
-
memory/668-113-0x0000000001CB0000-0x0000000001CF0000-memory.dmpFilesize
256KB
-
memory/668-114-0x0000000001CB0000-0x0000000001CF0000-memory.dmpFilesize
256KB
-
memory/760-66-0x000000013F2D0000-0x000000013F384000-memory.dmpFilesize
720KB
-
memory/760-70-0x00000000007B0000-0x00000000007F1000-memory.dmpFilesize
260KB
-
memory/760-67-0x000000013F2D0000-0x000000013F384000-memory.dmpFilesize
720KB
-
memory/760-69-0x000000001AC60000-0x000000001AC62000-memory.dmpFilesize
8KB
-
memory/760-56-0x0000000000000000-mapping.dmp
-
memory/888-90-0x0000000000000000-mapping.dmp
-
memory/904-101-0x0000000001FA0000-0x0000000001FF2000-memory.dmpFilesize
328KB
-
memory/904-108-0x000000001AD54000-0x000000001AD56000-memory.dmpFilesize
8KB
-
memory/904-112-0x000000001AD57000-0x000000001AD58000-memory.dmpFilesize
4KB
-
memory/904-110-0x000000001AD56000-0x000000001AD57000-memory.dmpFilesize
4KB
-
memory/904-107-0x000000001AD52000-0x000000001AD54000-memory.dmpFilesize
8KB
-
memory/904-100-0x0000000001C10000-0x0000000001C50000-memory.dmpFilesize
256KB
-
memory/904-93-0x0000000000060000-0x000000000009A000-memory.dmpFilesize
232KB
-
memory/904-95-0x00000000000A0000-0x00000000000BA000-memory.dmpFilesize
104KB
-
memory/904-96-0x0000000000000000-mapping.dmp
-
memory/904-98-0x0000000001BB0000-0x0000000001BCE000-memory.dmpFilesize
120KB
-
memory/904-99-0x0000000001C10000-0x0000000001C50000-memory.dmpFilesize
256KB
-
memory/1060-86-0x0000000002072000-0x0000000002074000-memory.dmpFilesize
8KB
-
memory/1060-83-0x0000000001B20000-0x0000000001B3E000-memory.dmpFilesize
120KB
-
memory/1060-85-0x0000000001FE0000-0x0000000002020000-memory.dmpFilesize
256KB
-
memory/1060-87-0x0000000002074000-0x0000000002076000-memory.dmpFilesize
8KB
-
memory/1060-88-0x0000000002076000-0x0000000002077000-memory.dmpFilesize
4KB
-
memory/1060-82-0x000007FEFC3C1000-0x000007FEFC3C3000-memory.dmpFilesize
8KB
-
memory/1060-81-0x0000000000000000-mapping.dmp
-
memory/1060-80-0x0000000000060000-0x000000000007A000-memory.dmpFilesize
104KB
-
memory/1060-84-0x0000000001FE0000-0x0000000002020000-memory.dmpFilesize
256KB
-
memory/1060-77-0x0000000000110000-0x000000000014A000-memory.dmpFilesize
232KB
-
memory/1060-78-0x0000000000110000-0x000000000014A000-memory.dmpFilesize
232KB
-
memory/1060-79-0x0000000000060000-0x000000000007A000-memory.dmpFilesize
104KB
-
memory/1068-71-0x0000000000000000-mapping.dmp
-
memory/1156-54-0x0000000000000000-mapping.dmp
-
memory/1536-74-0x0000000000000000-mapping.dmp
-
memory/1580-72-0x0000000000000000-mapping.dmp
-
memory/1760-89-0x0000000000000000-mapping.dmp