Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    17-03-2022 14:45

General

  • Target

    https://daftar.site/bootstrap_bin/css__styles/tool.exe

Malware Config

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • CobaltStrike 4 IoCs
  • CryptOne packer 4 IoCs

    Detects CryptOne packer defined in NCC blogpost.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://daftar.site/bootstrap_bin/css__styles/tool.exe
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:220
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:220 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1944
    • C:\Users\Admin\Downloads\tool.exe
      "C:\Users\Admin\Downloads\tool.exe"
      2⤵
      • Executes dropped EXE
      PID:2996
    • C:\Users\Admin\Downloads\tool.exe
      "C:\Users\Admin\Downloads\tool.exe"
      2⤵
      • Executes dropped EXE
      PID:3348
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2324
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:456
    • C:\Users\Admin\Downloads\tool.exe
      "C:\Users\Admin\Downloads\tool.exe"
      1⤵
      • Executes dropped EXE
      PID:3020

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    2
    T1112

    Discovery

    Query Registry

    2
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Downloads\tool.exe
      MD5

      518d125bb64a8f8dc8b94054daf5e6df

      SHA1

      549735f585590452985451faf8ab1e6f22903abf

      SHA256

      950008035d225dd5f4c3a229082f1206eb9bce8c4aa4822b130db065da54e224

      SHA512

      59ba254d3f7a37a760d709807de28b1b99bb0f92304e2177e67c30ca24b7fc4428608d392513706e663a49449f065c3719e318ddc7752d414441fe2895b1cb89

    • C:\Users\Admin\Downloads\tool.exe
      MD5

      518d125bb64a8f8dc8b94054daf5e6df

      SHA1

      549735f585590452985451faf8ab1e6f22903abf

      SHA256

      950008035d225dd5f4c3a229082f1206eb9bce8c4aa4822b130db065da54e224

      SHA512

      59ba254d3f7a37a760d709807de28b1b99bb0f92304e2177e67c30ca24b7fc4428608d392513706e663a49449f065c3719e318ddc7752d414441fe2895b1cb89

    • C:\Users\Admin\Downloads\tool.exe
      MD5

      518d125bb64a8f8dc8b94054daf5e6df

      SHA1

      549735f585590452985451faf8ab1e6f22903abf

      SHA256

      950008035d225dd5f4c3a229082f1206eb9bce8c4aa4822b130db065da54e224

      SHA512

      59ba254d3f7a37a760d709807de28b1b99bb0f92304e2177e67c30ca24b7fc4428608d392513706e663a49449f065c3719e318ddc7752d414441fe2895b1cb89

    • C:\Users\Admin\Downloads\tool.exe.472r0h6.partial
      MD5

      518d125bb64a8f8dc8b94054daf5e6df

      SHA1

      549735f585590452985451faf8ab1e6f22903abf

      SHA256

      950008035d225dd5f4c3a229082f1206eb9bce8c4aa4822b130db065da54e224

      SHA512

      59ba254d3f7a37a760d709807de28b1b99bb0f92304e2177e67c30ca24b7fc4428608d392513706e663a49449f065c3719e318ddc7752d414441fe2895b1cb89

    • memory/2996-135-0x00000000005B0000-0x00000000005F7000-memory.dmp
      Filesize

      284KB

    • memory/2996-136-0x0000000000400000-0x000000000045E000-memory.dmp
      Filesize

      376KB

    • memory/2996-137-0x0000000000680000-0x00000000006B3000-memory.dmp
      Filesize

      204KB

    • memory/2996-138-0x00000000022A0000-0x00000000022DD000-memory.dmp
      Filesize

      244KB

    • memory/3020-144-0x0000000000400000-0x000000000045E000-memory.dmp
      Filesize

      376KB

    • memory/3020-146-0x00000000024E0000-0x000000000251D000-memory.dmp
      Filesize

      244KB

    • memory/3348-140-0x0000000000400000-0x000000000045E000-memory.dmp
      Filesize

      376KB

    • memory/3348-142-0x00000000024B0000-0x00000000024ED000-memory.dmp
      Filesize

      244KB