Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 01:36
Static task
static1
Behavioral task
behavioral1
Sample
a1bc525f00e7884a003fb73b72939af5895aa48dc83270ea5eb8bbf53b0de44e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a1bc525f00e7884a003fb73b72939af5895aa48dc83270ea5eb8bbf53b0de44e.exe
Resource
win10v2004-20220812-en
General
-
Target
a1bc525f00e7884a003fb73b72939af5895aa48dc83270ea5eb8bbf53b0de44e.exe
-
Size
325KB
-
MD5
079521dc3fdb077435b56aa494de8cea
-
SHA1
558ad08678c53a065445d46e25514cffc6198ae4
-
SHA256
a1bc525f00e7884a003fb73b72939af5895aa48dc83270ea5eb8bbf53b0de44e
-
SHA512
8f72880023260ee07ecc4488551e57a0271aac5ae261c525639ac19917e796b845f1938044beb88a2507b358ecd0fc3622a4de4680707554709b1ba452afbf17
-
SSDEEP
3072:cv5hm7VmBP7PtReQJUhMLgEE5RXE54RA1V5aSPne+W5:y5wAJyQJKMLgEX4q1V5a4ne+W5
Malware Config
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Executes dropped EXE 1 IoCs
pid Process 1252 CacheMgr.exe -
Loads dropped DLL 1 IoCs
pid Process 1424 a1bc525f00e7884a003fb73b72939af5895aa48dc83270ea5eb8bbf53b0de44e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run a1bc525f00e7884a003fb73b72939af5895aa48dc83270ea5eb8bbf53b0de44e.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\StubPath = "\"C:\\ProgramData\\CacheMgr.exe\" -as" a1bc525f00e7884a003fb73b72939af5895aa48dc83270ea5eb8bbf53b0de44e.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1424 wrote to memory of 1052 1424 a1bc525f00e7884a003fb73b72939af5895aa48dc83270ea5eb8bbf53b0de44e.exe 26 PID 1424 wrote to memory of 1052 1424 a1bc525f00e7884a003fb73b72939af5895aa48dc83270ea5eb8bbf53b0de44e.exe 26 PID 1424 wrote to memory of 1052 1424 a1bc525f00e7884a003fb73b72939af5895aa48dc83270ea5eb8bbf53b0de44e.exe 26 PID 1424 wrote to memory of 1052 1424 a1bc525f00e7884a003fb73b72939af5895aa48dc83270ea5eb8bbf53b0de44e.exe 26 PID 1424 wrote to memory of 1252 1424 a1bc525f00e7884a003fb73b72939af5895aa48dc83270ea5eb8bbf53b0de44e.exe 28 PID 1424 wrote to memory of 1252 1424 a1bc525f00e7884a003fb73b72939af5895aa48dc83270ea5eb8bbf53b0de44e.exe 28 PID 1424 wrote to memory of 1252 1424 a1bc525f00e7884a003fb73b72939af5895aa48dc83270ea5eb8bbf53b0de44e.exe 28 PID 1424 wrote to memory of 1252 1424 a1bc525f00e7884a003fb73b72939af5895aa48dc83270ea5eb8bbf53b0de44e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1bc525f00e7884a003fb73b72939af5895aa48dc83270ea5eb8bbf53b0de44e.exe"C:\Users\Admin\AppData\Local\Temp\a1bc525f00e7884a003fb73b72939af5895aa48dc83270ea5eb8bbf53b0de44e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\a1bc525f00e7884a003fb73b72939af5895aa48dc83270ea5eb8bbf53b0de44e.exe" "C:\ProgramData\CacheMgr.exe"2⤵PID:1052
-
-
C:\ProgramData\CacheMgr.exe"C:\ProgramData\CacheMgr.exe" -as2⤵
- Executes dropped EXE
PID:1252
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
325KB
MD5079521dc3fdb077435b56aa494de8cea
SHA1558ad08678c53a065445d46e25514cffc6198ae4
SHA256a1bc525f00e7884a003fb73b72939af5895aa48dc83270ea5eb8bbf53b0de44e
SHA5128f72880023260ee07ecc4488551e57a0271aac5ae261c525639ac19917e796b845f1938044beb88a2507b358ecd0fc3622a4de4680707554709b1ba452afbf17
-
Filesize
325KB
MD5079521dc3fdb077435b56aa494de8cea
SHA1558ad08678c53a065445d46e25514cffc6198ae4
SHA256a1bc525f00e7884a003fb73b72939af5895aa48dc83270ea5eb8bbf53b0de44e
SHA5128f72880023260ee07ecc4488551e57a0271aac5ae261c525639ac19917e796b845f1938044beb88a2507b358ecd0fc3622a4de4680707554709b1ba452afbf17
-
Filesize
325KB
MD5079521dc3fdb077435b56aa494de8cea
SHA1558ad08678c53a065445d46e25514cffc6198ae4
SHA256a1bc525f00e7884a003fb73b72939af5895aa48dc83270ea5eb8bbf53b0de44e
SHA5128f72880023260ee07ecc4488551e57a0271aac5ae261c525639ac19917e796b845f1938044beb88a2507b358ecd0fc3622a4de4680707554709b1ba452afbf17