Analysis

  • max time kernel
    168s
  • max time network
    198s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2022 14:22

General

  • Target

    dcadd432cfa78bda8bbc242b5f14fe2415f1e66453d5c45f02dc8974171a72d4.exe

  • Size

    281KB

  • MD5

    23b7efda1310c603863b9ccdcdc2ae60

  • SHA1

    6bdcb523ce08b46002279c136bc56f9682cf180b

  • SHA256

    dcadd432cfa78bda8bbc242b5f14fe2415f1e66453d5c45f02dc8974171a72d4

  • SHA512

    c17735659f6f344e2b810b1d0db65297c3671d4d664d0fa386ba2b7ec80cd477139d4c3beee0ee15ea466e5ccc958824cb5e501bc5b54ceb42e9753381043ce3

  • SSDEEP

    3072:sv5hm7VmBP7PtReQJUhMLgE35RXzdNKi6sYpdHfeC:i5wAJyQJKMLgEHOs0HfeC

Malware Config

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcadd432cfa78bda8bbc242b5f14fe2415f1e66453d5c45f02dc8974171a72d4.exe
    "C:\Users\Admin\AppData\Local\Temp\dcadd432cfa78bda8bbc242b5f14fe2415f1e66453d5c45f02dc8974171a72d4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3128
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\dcadd432cfa78bda8bbc242b5f14fe2415f1e66453d5c45f02dc8974171a72d4.exe" "C:\ProgramData\CacheMgr.exe"
      2⤵
        PID:2288
      • C:\ProgramData\CacheMgr.exe
        "C:\ProgramData\CacheMgr.exe" -as
        2⤵
        • Executes dropped EXE
        PID:1660

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\CacheMgr.exe
      Filesize

      281KB

      MD5

      23b7efda1310c603863b9ccdcdc2ae60

      SHA1

      6bdcb523ce08b46002279c136bc56f9682cf180b

      SHA256

      dcadd432cfa78bda8bbc242b5f14fe2415f1e66453d5c45f02dc8974171a72d4

      SHA512

      c17735659f6f344e2b810b1d0db65297c3671d4d664d0fa386ba2b7ec80cd477139d4c3beee0ee15ea466e5ccc958824cb5e501bc5b54ceb42e9753381043ce3

    • C:\ProgramData\CacheMgr.exe
      Filesize

      281KB

      MD5

      23b7efda1310c603863b9ccdcdc2ae60

      SHA1

      6bdcb523ce08b46002279c136bc56f9682cf180b

      SHA256

      dcadd432cfa78bda8bbc242b5f14fe2415f1e66453d5c45f02dc8974171a72d4

      SHA512

      c17735659f6f344e2b810b1d0db65297c3671d4d664d0fa386ba2b7ec80cd477139d4c3beee0ee15ea466e5ccc958824cb5e501bc5b54ceb42e9753381043ce3

    • memory/1660-144-0x00000000001D0000-0x00000000001E6000-memory.dmp
      Filesize

      88KB

    • memory/1660-148-0x0000000000930000-0x0000000000A30000-memory.dmp
      Filesize

      1024KB

    • memory/1660-147-0x00000000001D0000-0x00000000001E6000-memory.dmp
      Filesize

      88KB

    • memory/1660-146-0x0000000000930000-0x0000000000A30000-memory.dmp
      Filesize

      1024KB

    • memory/1660-138-0x0000000000000000-mapping.dmp
    • memory/1660-145-0x0000000000400000-0x0000000000451000-memory.dmp
      Filesize

      324KB

    • memory/2288-135-0x0000000000000000-mapping.dmp
    • memory/3128-136-0x00000000001D0000-0x00000000001E6000-memory.dmp
      Filesize

      88KB

    • memory/3128-143-0x00000000001D0000-0x00000000001E6000-memory.dmp
      Filesize

      88KB

    • memory/3128-142-0x0000000000400000-0x0000000000451000-memory.dmp
      Filesize

      324KB

    • memory/3128-137-0x00000000009F0000-0x0000000000AF0000-memory.dmp
      Filesize

      1024KB

    • memory/3128-132-0x0000000000400000-0x0000000000451000-memory.dmp
      Filesize

      324KB

    • memory/3128-134-0x00000000009F0000-0x0000000000AF0000-memory.dmp
      Filesize

      1024KB