Analysis
-
max time kernel
104s -
max time network
110s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
07-01-2022 10:08
Static task
static1
Behavioral task
behavioral1
Sample
16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.exe
Resource
win10-en-20211208
General
-
Target
16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.exe
-
Size
56.8MB
-
MD5
bc6684c0ea7c60d44ae6ff4434810e09
-
SHA1
cbdc8ae37e94d69261b1985e1d3f2183f6174e01
-
SHA256
16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7
-
SHA512
17d2e6c593318ebb0aa867dd973a2004350cf0330be8c5a2807f90720adf4fc870a5504cb3035eb427e15847ffac4f6a2052bddb47bad55754f0150ee149600d
Malware Config
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
exploer.exedescription pid process target process PID 3532 created 2388 3532 exploer.exe svchost.exe -
Executes dropped EXE 2 IoCs
Processes:
exploer.exeSetup5.exepid process 3532 exploer.exe 3624 Setup5.exe -
Loads dropped DLL 1 IoCs
Processes:
Setup5.exepid process 3624 Setup5.exe -
Drops file in System32 directory 5 IoCs
Processes:
exploer.exeattrib.exeattrib.exedescription ioc process File created C:\Windows\System32\qwave.exe exploer.exe File opened for modification C:\Windows\System32\qwave.exe exploer.exe File opened for modification C:\Windows\System32\qwave.exe attrib.exe File created C:\Windows\System32\qcap.exe exploer.exe File opened for modification C:\Windows\System32\qcap.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Setup5.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\Setup5.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\Setup5.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\Setup5.exe nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
exploer.exepid process 3532 exploer.exe 3532 exploer.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.exepid process 2496 16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.execmd.exeexploer.execmd.execmd.execmd.exedescription pid process target process PID 2496 wrote to memory of 2892 2496 16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.exe cmd.exe PID 2496 wrote to memory of 2892 2496 16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.exe cmd.exe PID 2496 wrote to memory of 3532 2496 16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.exe exploer.exe PID 2496 wrote to memory of 3532 2496 16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.exe exploer.exe PID 2892 wrote to memory of 3624 2892 cmd.exe Setup5.exe PID 2892 wrote to memory of 3624 2892 cmd.exe Setup5.exe PID 2892 wrote to memory of 3624 2892 cmd.exe Setup5.exe PID 3532 wrote to memory of 2324 3532 exploer.exe cmd.exe PID 3532 wrote to memory of 2324 3532 exploer.exe cmd.exe PID 2324 wrote to memory of 3144 2324 cmd.exe attrib.exe PID 2324 wrote to memory of 3144 2324 cmd.exe attrib.exe PID 3532 wrote to memory of 3748 3532 exploer.exe cmd.exe PID 3532 wrote to memory of 3748 3532 exploer.exe cmd.exe PID 3748 wrote to memory of 3048 3748 cmd.exe attrib.exe PID 3748 wrote to memory of 3048 3748 cmd.exe attrib.exe PID 3532 wrote to memory of 488 3532 exploer.exe WerFault.exe PID 3532 wrote to memory of 488 3532 exploer.exe WerFault.exe PID 3532 wrote to memory of 488 3532 exploer.exe WerFault.exe PID 3532 wrote to memory of 488 3532 exploer.exe WerFault.exe PID 3532 wrote to memory of 3408 3532 exploer.exe cmd.exe PID 3532 wrote to memory of 3408 3532 exploer.exe cmd.exe PID 3408 wrote to memory of 3732 3408 cmd.exe attrib.exe PID 3408 wrote to memory of 3732 3408 cmd.exe attrib.exe PID 3532 wrote to memory of 3104 3532 exploer.exe WerFault.exe PID 3532 wrote to memory of 3104 3532 exploer.exe WerFault.exe PID 3532 wrote to memory of 3104 3532 exploer.exe WerFault.exe PID 3532 wrote to memory of 3104 3532 exploer.exe WerFault.exe PID 3532 wrote to memory of 2436 3532 exploer.exe WerFault.exe PID 3532 wrote to memory of 2436 3532 exploer.exe WerFault.exe PID 3532 wrote to memory of 2436 3532 exploer.exe WerFault.exe PID 3532 wrote to memory of 2436 3532 exploer.exe WerFault.exe PID 3532 wrote to memory of 2692 3532 exploer.exe WerFault.exe PID 3532 wrote to memory of 2692 3532 exploer.exe WerFault.exe PID 3532 wrote to memory of 2692 3532 exploer.exe WerFault.exe -
Views/modifies file attributes 1 TTPs 3 IoCs
Processes:
attrib.exeattrib.exeattrib.exepid process 3144 attrib.exe 3048 attrib.exe 3732 attrib.exe
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.exe"C:\Users\Admin\AppData\Local\Temp\16c7bda207cb29e36c50337ced9239ff09c6089a84132e5ee1f2366a644dc9f7.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd " /c " C:\Users\Admin\AppData\Local\Temp\Setup5.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Setup5.exeC:\Users\Admin\AppData\Local\Temp\Setup5.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Public\exploer.exeC:\Users\Public\exploer.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C attrib +s +h C:\Windows\temp\svchost.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\attrib.exeattrib +s +h C:\Windows\temp\svchost.exe4⤵
- Views/modifies file attributes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C attrib +s +h C:\Windows\System32\qwave.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\attrib.exeattrib +s +h C:\Windows\System32\qwave.exe4⤵
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C attrib +s +h C:\Windows\System32\qcap.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\attrib.exeattrib +s +h C:\Windows\System32\qcap.exe4⤵
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe3⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\WerFault.exe.logMD5
91956ff35074949b1b46ba17a2fbfa2b
SHA1de40118e583776ed948431fa0af9cc89d6b12c8b
SHA256842737052b8f428220890a78b60b4df441b0fbe324b1d7e6a892c7e03f4aa9ae
SHA512935bee27d0b1e198bbe6b2446afe0d755041dd3ac0b003736143b4df1551a39bf735827b3f352e90c67929dcef89fdbc03563fc0a9a954ef5c07e797fdc6a562
-
C:\Users\Admin\AppData\Local\Temp\Setup5.exeMD5
f5b875d37f61f584b06773be32348d99
SHA13d1d83b0ec0637d8e787e2a9360ff94e6cd65db7
SHA2562594946449cff84eec6cd8f715a294eea17f31edf67d344b4340312429500f49
SHA51291622dbe4ae1956ff14d3cc364635facc366bf0e7f7aab02ecafbc55b0970e196d1ad20f4695fdbf805f76a170e39c6776f3e5da05112f036fca4d79eebe600a
-
C:\Users\Admin\AppData\Local\Temp\Setup5.exeMD5
f5b875d37f61f584b06773be32348d99
SHA13d1d83b0ec0637d8e787e2a9360ff94e6cd65db7
SHA2562594946449cff84eec6cd8f715a294eea17f31edf67d344b4340312429500f49
SHA51291622dbe4ae1956ff14d3cc364635facc366bf0e7f7aab02ecafbc55b0970e196d1ad20f4695fdbf805f76a170e39c6776f3e5da05112f036fca4d79eebe600a
-
C:\Users\Public\exploer.exeMD5
41613750aa14b52bd1be35b0df84b2ab
SHA161b3b7a964fbb32440231db533921bd22b5b1c6c
SHA256104d560b8b5e5aa995de035598c171ea0e4905c94d148077c8d87c9ce44c4fce
SHA5123e4faab7e760c49c3d8e0f35626e293478aa0ea80e147a884e61e7ced9dace0cc100883e58f9ac932d6cc3f9f4adb91a31fa90f9aec7418202d939dceda3f7cc
-
C:\Users\Public\exploer.exeMD5
41613750aa14b52bd1be35b0df84b2ab
SHA161b3b7a964fbb32440231db533921bd22b5b1c6c
SHA256104d560b8b5e5aa995de035598c171ea0e4905c94d148077c8d87c9ce44c4fce
SHA5123e4faab7e760c49c3d8e0f35626e293478aa0ea80e147a884e61e7ced9dace0cc100883e58f9ac932d6cc3f9f4adb91a31fa90f9aec7418202d939dceda3f7cc
-
C:\Windows\System32\qcap.exeMD5
41613750aa14b52bd1be35b0df84b2ab
SHA161b3b7a964fbb32440231db533921bd22b5b1c6c
SHA256104d560b8b5e5aa995de035598c171ea0e4905c94d148077c8d87c9ce44c4fce
SHA5123e4faab7e760c49c3d8e0f35626e293478aa0ea80e147a884e61e7ced9dace0cc100883e58f9ac932d6cc3f9f4adb91a31fa90f9aec7418202d939dceda3f7cc
-
C:\Windows\System32\qwave.exeMD5
41613750aa14b52bd1be35b0df84b2ab
SHA161b3b7a964fbb32440231db533921bd22b5b1c6c
SHA256104d560b8b5e5aa995de035598c171ea0e4905c94d148077c8d87c9ce44c4fce
SHA5123e4faab7e760c49c3d8e0f35626e293478aa0ea80e147a884e61e7ced9dace0cc100883e58f9ac932d6cc3f9f4adb91a31fa90f9aec7418202d939dceda3f7cc
-
C:\Windows\temp\svchost.exeMD5
41613750aa14b52bd1be35b0df84b2ab
SHA161b3b7a964fbb32440231db533921bd22b5b1c6c
SHA256104d560b8b5e5aa995de035598c171ea0e4905c94d148077c8d87c9ce44c4fce
SHA5123e4faab7e760c49c3d8e0f35626e293478aa0ea80e147a884e61e7ced9dace0cc100883e58f9ac932d6cc3f9f4adb91a31fa90f9aec7418202d939dceda3f7cc
-
\Users\Admin\AppData\Local\Temp\nsuDC39.tmp\InstallOptions.dllMD5
325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf
-
memory/488-133-0x0000022025C20000-0x0000022025C5A000-memory.dmpFilesize
232KB
-
memory/488-141-0x00000220276F0000-0x0000022027730000-memory.dmpFilesize
256KB
-
memory/488-147-0x0000022027743000-0x0000022027745000-memory.dmpFilesize
8KB
-
memory/488-139-0x0000022025F20000-0x0000022025F22000-memory.dmpFilesize
8KB
-
memory/488-148-0x0000022027746000-0x0000022027747000-memory.dmpFilesize
4KB
-
memory/488-194-0x0000022025F20000-0x0000022025F22000-memory.dmpFilesize
8KB
-
memory/488-142-0x00000220276F0000-0x0000022027730000-memory.dmpFilesize
256KB
-
memory/488-146-0x0000022027740000-0x0000022027742000-memory.dmpFilesize
8KB
-
memory/488-195-0x0000022025F20000-0x0000022025F22000-memory.dmpFilesize
8KB
-
memory/488-140-0x0000022025F20000-0x0000022025F22000-memory.dmpFilesize
8KB
-
memory/488-134-0x0000022025C60000-0x0000022025C7A000-memory.dmpFilesize
104KB
-
memory/488-135-0x0000000000000000-mapping.dmp
-
memory/488-136-0x0000022025D60000-0x0000022025D7E000-memory.dmpFilesize
120KB
-
memory/488-137-0x0000022025F20000-0x0000022025F22000-memory.dmpFilesize
8KB
-
memory/488-138-0x0000022025F20000-0x0000022025F22000-memory.dmpFilesize
8KB
-
memory/2324-127-0x0000000000000000-mapping.dmp
-
memory/2436-174-0x0000024A34F80000-0x0000024A34F82000-memory.dmpFilesize
8KB
-
memory/2436-185-0x0000024A350B0000-0x0000024A35102000-memory.dmpFilesize
328KB
-
memory/2436-193-0x0000024A34F80000-0x0000024A34F82000-memory.dmpFilesize
8KB
-
memory/2436-190-0x0000024A4F276000-0x0000024A4F277000-memory.dmpFilesize
4KB
-
memory/2436-189-0x0000024A4F273000-0x0000024A4F275000-memory.dmpFilesize
8KB
-
memory/2436-188-0x0000024A4F270000-0x0000024A4F272000-memory.dmpFilesize
8KB
-
memory/2436-183-0x0000024A34F80000-0x0000024A34F82000-memory.dmpFilesize
8KB
-
memory/2436-177-0x0000024A34F80000-0x0000024A34F82000-memory.dmpFilesize
8KB
-
memory/2436-176-0x0000024A34FB0000-0x0000024A34FF0000-memory.dmpFilesize
256KB
-
memory/2436-175-0x0000024A34FB0000-0x0000024A34FF0000-memory.dmpFilesize
256KB
-
memory/2436-173-0x0000024A34F80000-0x0000024A34F82000-memory.dmpFilesize
8KB
-
memory/2436-172-0x0000024A34F80000-0x0000024A34F82000-memory.dmpFilesize
8KB
-
memory/2436-171-0x0000024A34F80000-0x0000024A34F82000-memory.dmpFilesize
8KB
-
memory/2436-170-0x0000024A34D00000-0x0000024A34D1E000-memory.dmpFilesize
120KB
-
memory/2436-169-0x0000000000000000-mapping.dmp
-
memory/2436-168-0x0000024A34CD0000-0x0000024A34CEA000-memory.dmpFilesize
104KB
-
memory/2436-167-0x0000024A34C90000-0x0000024A34CCA000-memory.dmpFilesize
232KB
-
memory/2692-196-0x0000022766E80000-0x0000022766EB1000-memory.dmpFilesize
196KB
-
memory/2692-197-0x0000000000000000-mapping.dmp
-
memory/2892-115-0x0000000000000000-mapping.dmp
-
memory/3048-131-0x0000000000000000-mapping.dmp
-
memory/3104-156-0x00000274A9500000-0x00000274A9502000-memory.dmpFilesize
8KB
-
memory/3104-149-0x00000274A9210000-0x00000274A924A000-memory.dmpFilesize
232KB
-
memory/3104-155-0x00000274A9500000-0x00000274A9502000-memory.dmpFilesize
8KB
-
memory/3104-154-0x00000274A9500000-0x00000274A9502000-memory.dmpFilesize
8KB
-
memory/3104-152-0x00000274A9350000-0x00000274A936E000-memory.dmpFilesize
120KB
-
memory/3104-153-0x00000274A9500000-0x00000274A9502000-memory.dmpFilesize
8KB
-
memory/3104-151-0x0000000000000000-mapping.dmp
-
memory/3104-150-0x00000274A9250000-0x00000274A926A000-memory.dmpFilesize
104KB
-
memory/3104-166-0x00000274C3610000-0x00000274C3662000-memory.dmpFilesize
328KB
-
memory/3104-157-0x00000274A95B0000-0x00000274A95F0000-memory.dmpFilesize
256KB
-
memory/3104-165-0x00000274A9500000-0x00000274A9502000-memory.dmpFilesize
8KB
-
memory/3104-159-0x00000274A9500000-0x00000274A9502000-memory.dmpFilesize
8KB
-
memory/3104-191-0x00000274A9500000-0x00000274A9502000-memory.dmpFilesize
8KB
-
memory/3104-158-0x00000274A95B0000-0x00000274A95F0000-memory.dmpFilesize
256KB
-
memory/3104-186-0x00000274C3603000-0x00000274C3605000-memory.dmpFilesize
8KB
-
memory/3104-184-0x00000274C3600000-0x00000274C3602000-memory.dmpFilesize
8KB
-
memory/3104-187-0x00000274C3606000-0x00000274C3607000-memory.dmpFilesize
4KB
-
memory/3144-128-0x0000000000000000-mapping.dmp
-
memory/3408-143-0x0000000000000000-mapping.dmp
-
memory/3532-125-0x0000000001580000-0x00000000015C1000-memory.dmpFilesize
260KB
-
memory/3532-120-0x00000000004C0000-0x0000000000574000-memory.dmpFilesize
720KB
-
memory/3532-119-0x00000000004C0000-0x0000000000574000-memory.dmpFilesize
720KB
-
memory/3532-116-0x0000000000000000-mapping.dmp
-
memory/3532-124-0x0000000003120000-0x0000000003122000-memory.dmpFilesize
8KB
-
memory/3624-121-0x0000000000000000-mapping.dmp
-
memory/3732-144-0x0000000000000000-mapping.dmp
-
memory/3748-130-0x0000000000000000-mapping.dmp