Analysis

  • max time kernel
    168s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/11/2022, 23:46

General

  • Target

    a7c598f10afed1442a46767ea27b7d139228dff34f0aea08ed2115cde6deff82.exe

  • Size

    120KB

  • MD5

    c4a4f8fd82dae7b88f23ec2a8cc5f011

  • SHA1

    b21f539c469bd6c078cec2f68ccd57d482910ee4

  • SHA256

    a7c598f10afed1442a46767ea27b7d139228dff34f0aea08ed2115cde6deff82

  • SHA512

    6d96817be9189e3dfb7a28ce538dcf34fb9ce18988e39789a9bf12373b8c5e0f440dc83b147d31d4b8c9dc699017e3f62bed4e86049bbbc19cd1bab0043c94f8

  • SSDEEP

    1536:pX2tAh15hxrmf7VlBSBzD7TbNau3doRzEg0H86Lx8CAcf+SuqGMLefNe6WE5RXQ:pv5hm7VmBP7PtReQJUhMLgEE5RX

Malware Config

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7c598f10afed1442a46767ea27b7d139228dff34f0aea08ed2115cde6deff82.exe
    "C:\Users\Admin\AppData\Local\Temp\a7c598f10afed1442a46767ea27b7d139228dff34f0aea08ed2115cde6deff82.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\a7c598f10afed1442a46767ea27b7d139228dff34f0aea08ed2115cde6deff82.exe" "C:\ProgramData\CacheMgr.exe"
      2⤵
        PID:4108
      • C:\ProgramData\CacheMgr.exe
        "C:\ProgramData\CacheMgr.exe" -as
        2⤵
        • Executes dropped EXE
        PID:3372

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\CacheMgr.exe

            Filesize

            120KB

            MD5

            c4a4f8fd82dae7b88f23ec2a8cc5f011

            SHA1

            b21f539c469bd6c078cec2f68ccd57d482910ee4

            SHA256

            a7c598f10afed1442a46767ea27b7d139228dff34f0aea08ed2115cde6deff82

            SHA512

            6d96817be9189e3dfb7a28ce538dcf34fb9ce18988e39789a9bf12373b8c5e0f440dc83b147d31d4b8c9dc699017e3f62bed4e86049bbbc19cd1bab0043c94f8

          • C:\ProgramData\CacheMgr.exe

            Filesize

            120KB

            MD5

            c4a4f8fd82dae7b88f23ec2a8cc5f011

            SHA1

            b21f539c469bd6c078cec2f68ccd57d482910ee4

            SHA256

            a7c598f10afed1442a46767ea27b7d139228dff34f0aea08ed2115cde6deff82

            SHA512

            6d96817be9189e3dfb7a28ce538dcf34fb9ce18988e39789a9bf12373b8c5e0f440dc83b147d31d4b8c9dc699017e3f62bed4e86049bbbc19cd1bab0043c94f8

          • memory/2764-136-0x0000000000590000-0x00000000005A6000-memory.dmp

            Filesize

            88KB

          • memory/2764-132-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2764-137-0x00000000008E0000-0x00000000009E0000-memory.dmp

            Filesize

            1024KB

          • memory/2764-134-0x00000000008E0000-0x00000000009E0000-memory.dmp

            Filesize

            1024KB

          • memory/2764-145-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2764-146-0x0000000000590000-0x00000000005A6000-memory.dmp

            Filesize

            88KB

          • memory/3372-142-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/3372-143-0x0000000000830000-0x0000000000930000-memory.dmp

            Filesize

            1024KB

          • memory/3372-144-0x00000000001D0000-0x00000000001E6000-memory.dmp

            Filesize

            88KB

          • memory/3372-147-0x0000000000830000-0x0000000000930000-memory.dmp

            Filesize

            1024KB

          • memory/3372-148-0x00000000001D0000-0x00000000001E6000-memory.dmp

            Filesize

            88KB