Analysis

  • max time kernel
    268s
  • max time network
    341s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 04:37

General

  • Target

    9bc0c00f316b510dfe73a9436630929ebaa219004afe4187af92d61db218226c.exe

  • Size

    121KB

  • MD5

    09205aac44ae94d3c381c7e3c05fd160

  • SHA1

    2246f360d0ce9d918c6bd7e61dc5a5efd2b85545

  • SHA256

    9bc0c00f316b510dfe73a9436630929ebaa219004afe4187af92d61db218226c

  • SHA512

    8eac8f7fdbb293fdf17d7c1f8ca74aa76a329e81a559d30365408a636229989ab9c9d99e48c4db7b5863e36479ac3b9e10492d8bf0524aa1ccef2ac67a859839

  • SSDEEP

    1536:ZX2tAh15hxrmf7VlBSBzD7TbNau3doRzEg0H86Lx8CAcf+SuqGMLefNe6WE5RXQY:5v5hm7VmBP7PtReQJUhMLgEE5RXP

Malware Config

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9bc0c00f316b510dfe73a9436630929ebaa219004afe4187af92d61db218226c.exe
    "C:\Users\Admin\AppData\Local\Temp\9bc0c00f316b510dfe73a9436630929ebaa219004afe4187af92d61db218226c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4996
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\9bc0c00f316b510dfe73a9436630929ebaa219004afe4187af92d61db218226c.exe" "C:\ProgramData\CacheMgr.exe"
      2⤵
        PID:2300
      • C:\ProgramData\CacheMgr.exe
        "C:\ProgramData\CacheMgr.exe" -as
        2⤵
        • Executes dropped EXE
        PID:868

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\CacheMgr.exe
      Filesize

      121KB

      MD5

      09205aac44ae94d3c381c7e3c05fd160

      SHA1

      2246f360d0ce9d918c6bd7e61dc5a5efd2b85545

      SHA256

      9bc0c00f316b510dfe73a9436630929ebaa219004afe4187af92d61db218226c

      SHA512

      8eac8f7fdbb293fdf17d7c1f8ca74aa76a329e81a559d30365408a636229989ab9c9d99e48c4db7b5863e36479ac3b9e10492d8bf0524aa1ccef2ac67a859839

    • C:\ProgramData\CacheMgr.exe
      Filesize

      121KB

      MD5

      09205aac44ae94d3c381c7e3c05fd160

      SHA1

      2246f360d0ce9d918c6bd7e61dc5a5efd2b85545

      SHA256

      9bc0c00f316b510dfe73a9436630929ebaa219004afe4187af92d61db218226c

      SHA512

      8eac8f7fdbb293fdf17d7c1f8ca74aa76a329e81a559d30365408a636229989ab9c9d99e48c4db7b5863e36479ac3b9e10492d8bf0524aa1ccef2ac67a859839

    • memory/868-143-0x00000000001D0000-0x00000000001E6000-memory.dmp
      Filesize

      88KB

    • memory/868-137-0x0000000000000000-mapping.dmp
    • memory/868-141-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/868-142-0x00000000008C0000-0x00000000009C0000-memory.dmp
      Filesize

      1024KB

    • memory/868-147-0x00000000008C0000-0x00000000009C0000-memory.dmp
      Filesize

      1024KB

    • memory/2300-134-0x0000000000000000-mapping.dmp
    • memory/4996-136-0x00000000001D0000-0x00000000001E6000-memory.dmp
      Filesize

      88KB

    • memory/4996-135-0x0000000000A00000-0x0000000000B00000-memory.dmp
      Filesize

      1024KB

    • memory/4996-132-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/4996-144-0x0000000000A00000-0x0000000000B00000-memory.dmp
      Filesize

      1024KB

    • memory/4996-145-0x00000000001D0000-0x00000000001E6000-memory.dmp
      Filesize

      88KB

    • memory/4996-146-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB