Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 03:35
Static task
static1
Behavioral task
behavioral1
Sample
c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2.exe
Resource
win10v2004-20220812-en
General
-
Target
c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2.exe
-
Size
207KB
-
MD5
ce1b9487d9979fa105a6e89e9e367ec1
-
SHA1
35b44e1870f22e30732592551281b895495d0f40
-
SHA256
c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2
-
SHA512
f78b4817669a6565b8056598693ec2b32535b0ac8423415bb259e43e6c44de6c76b0bb2d0cd2f498a5efae1c09a82e7516d9c1fe9cadc9c4f9e065c38778195e
-
SSDEEP
3072:DI/gLTIYyRy7LfS2glhRXJehyBJUEoJAcdehEFYw8o:UYLTI+Pi9JehNAcxso
Malware Config
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Executes dropped EXE 1 IoCs
Processes:
CacheMgr.exepid process 1608 CacheMgr.exe -
Loads dropped DLL 1 IoCs
Processes:
c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2.exepid process 1036 c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\StubPath = "\"C:\\Setup\\CacheMgr.exe\" -as" c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2.exedescription pid process target process PID 1036 wrote to memory of 968 1036 c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2.exe cmd.exe PID 1036 wrote to memory of 968 1036 c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2.exe cmd.exe PID 1036 wrote to memory of 968 1036 c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2.exe cmd.exe PID 1036 wrote to memory of 968 1036 c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2.exe cmd.exe PID 1036 wrote to memory of 892 1036 c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2.exe cmd.exe PID 1036 wrote to memory of 892 1036 c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2.exe cmd.exe PID 1036 wrote to memory of 892 1036 c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2.exe cmd.exe PID 1036 wrote to memory of 892 1036 c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2.exe cmd.exe PID 1036 wrote to memory of 1608 1036 c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2.exe CacheMgr.exe PID 1036 wrote to memory of 1608 1036 c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2.exe CacheMgr.exe PID 1036 wrote to memory of 1608 1036 c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2.exe CacheMgr.exe PID 1036 wrote to memory of 1608 1036 c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2.exe CacheMgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2.exe"C:\Users\Admin\AppData\Local\Temp\c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\cmd.execmd.exe /q /c md "C:\Setup"2⤵PID:968
-
C:\Windows\SysWOW64\cmd.execmd.exe /q /c copy "C:\Users\Admin\AppData\Local\Temp\c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2.exe" "C:\Setup\CacheMgr.exe"2⤵PID:892
-
C:\Setup\CacheMgr.exe"C:\Setup\CacheMgr.exe" -as2⤵
- Executes dropped EXE
PID:1608
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Setup\CacheMgr.exeFilesize
207KB
MD5ce1b9487d9979fa105a6e89e9e367ec1
SHA135b44e1870f22e30732592551281b895495d0f40
SHA256c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2
SHA512f78b4817669a6565b8056598693ec2b32535b0ac8423415bb259e43e6c44de6c76b0bb2d0cd2f498a5efae1c09a82e7516d9c1fe9cadc9c4f9e065c38778195e
-
C:\Setup\CacheMgr.exeFilesize
207KB
MD5ce1b9487d9979fa105a6e89e9e367ec1
SHA135b44e1870f22e30732592551281b895495d0f40
SHA256c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2
SHA512f78b4817669a6565b8056598693ec2b32535b0ac8423415bb259e43e6c44de6c76b0bb2d0cd2f498a5efae1c09a82e7516d9c1fe9cadc9c4f9e065c38778195e
-
\Setup\CacheMgr.exeFilesize
207KB
MD5ce1b9487d9979fa105a6e89e9e367ec1
SHA135b44e1870f22e30732592551281b895495d0f40
SHA256c3881e0343e920ec7f8eeb86edaace066d20491353e55d77ea35dec327d54ec2
SHA512f78b4817669a6565b8056598693ec2b32535b0ac8423415bb259e43e6c44de6c76b0bb2d0cd2f498a5efae1c09a82e7516d9c1fe9cadc9c4f9e065c38778195e
-
memory/892-56-0x0000000000000000-mapping.dmp
-
memory/968-55-0x0000000000000000-mapping.dmp
-
memory/1036-54-0x0000000075BB1000-0x0000000075BB3000-memory.dmpFilesize
8KB
-
memory/1036-62-0x0000000000020000-0x0000000000036000-memory.dmpFilesize
88KB
-
memory/1036-60-0x0000000000400000-0x0000000000448000-memory.dmpFilesize
288KB
-
memory/1608-59-0x0000000000000000-mapping.dmp
-
memory/1608-64-0x0000000000400000-0x0000000000448000-memory.dmpFilesize
288KB
-
memory/1608-65-0x0000000000020000-0x0000000000036000-memory.dmpFilesize
88KB
-
memory/1608-66-0x0000000000020000-0x0000000000036000-memory.dmpFilesize
88KB