Analysis
-
max time kernel
180s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2023, 16:07
Static task
static1
Behavioral task
behavioral1
Sample
windows-kb890830-x64-v5.98_b56cfec6692828d2b240b0978e09fa22ddf23994.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
windows-kb890830-x64-v5.98_b56cfec6692828d2b240b0978e09fa22ddf23994.exe
Resource
win10v2004-20220812-en
General
-
Target
windows-kb890830-x64-v5.98_b56cfec6692828d2b240b0978e09fa22ddf23994.exe
-
Size
42.2MB
-
MD5
e4b46649d3a062a562e5c8ce5729bdd7
-
SHA1
b56cfec6692828d2b240b0978e09fa22ddf23994
-
SHA256
bc1462975dc1047acace72d40dc87b3baca7c2a3bf71d5f54ecaafb1bf924161
-
SHA512
ffd062af7bab46dcee293f1fe20bff9d677f9593595e34a3e3cf5b2b79bef0283b775adea7fbddefdb020a73e68b7a143df871328231af0600fe0bc1bde6d68c
-
SSDEEP
786432:IMXrrRLIxJpnkivyTFHltPOTT2WFbK3xXTHqFnnOOFd:IgXIpkPHltPOTTNUxXuFnf
Malware Config
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 1 IoCs
resource yara_rule behavioral2/memory/420-155-0x000001D12E6A0000-0x000001D12E6E0000-memory.dmp xmrig -
Executes dropped EXE 1 IoCs
pid Process 420 MRT.exe -
Registers COM server for autorun 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{73E709EA-5D93-4B2E-BBB0-99B7938DA9E4}\LocalServer32 MRT.exe -
Loads dropped DLL 2 IoCs
pid Process 420 MRT.exe 420 MRT.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe windows-kb890830-x64-v5.98_b56cfec6692828d2b240b0978e09fa22ddf23994.exe File created C:\Windows\system32\MRT.exe windows-kb890830-x64-v5.98_b56cfec6692828d2b240b0978e09fa22ddf23994.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\mrt.log MRT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{73E709EA-5D93-4B2E-BBB0-99B7938DA9E4}\LocalServer32 MRT.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 4420 windows-kb890830-x64-v5.98_b56cfec6692828d2b240b0978e09fa22ddf23994.exe 4420 windows-kb890830-x64-v5.98_b56cfec6692828d2b240b0978e09fa22ddf23994.exe 420 MRT.exe 420 MRT.exe 420 MRT.exe 420 MRT.exe 420 MRT.exe 420 MRT.exe 420 MRT.exe 420 MRT.exe 420 MRT.exe 420 MRT.exe 420 MRT.exe 420 MRT.exe 420 MRT.exe 420 MRT.exe 420 MRT.exe 420 MRT.exe 420 MRT.exe 420 MRT.exe 420 MRT.exe 420 MRT.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 420 MRT.exe Token: SeBackupPrivilege 420 MRT.exe Token: SeRestorePrivilege 420 MRT.exe Token: SeTcbPrivilege 420 MRT.exe Token: SeTcbPrivilege 420 MRT.exe Token: SeSystemEnvironmentPrivilege 420 MRT.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4420 wrote to memory of 420 4420 windows-kb890830-x64-v5.98_b56cfec6692828d2b240b0978e09fa22ddf23994.exe 84 PID 4420 wrote to memory of 420 4420 windows-kb890830-x64-v5.98_b56cfec6692828d2b240b0978e09fa22ddf23994.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\windows-kb890830-x64-v5.98_b56cfec6692828d2b240b0978e09fa22ddf23994.exe"C:\Users\Admin\AppData\Local\Temp\windows-kb890830-x64-v5.98_b56cfec6692828d2b240b0978e09fa22ddf23994.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\system32\MRT.exe"C:\Windows\system32\MRT.exe"2⤵
- Executes dropped EXE
- Registers COM server for autorun
- Loads dropped DLL
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:420
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142.7MB
MD501bb6618647c7afc1742fe82c1072b30
SHA1a04811aa6ffb5a317d240ea7b60fa5f0373b64e5
SHA256a57cc270a953c7a04c7a5a8efa38166cbe0b8616378f8e807c41839add44fe19
SHA51200203b6f8544595d07c8945e288b37538ca7ababf191d73a46c1b3d55b42c16f1795cb390ee48c5f80b0955d83cb6fd8c598d5445f3434964faad62d801f597e
-
Filesize
15.7MB
MD5517246e597c5cb542cb3ad9c2f601201
SHA1490da9f8c066ecccfa437b51badbc1bc85bd34e8
SHA256e406d8809e6b3e7dd2a41131a2de92f36a4391f539657994c7a0f76385244be4
SHA512a392f733bdebd241e613361223cdd7768fb5327d31e4e8fce2a822e5b4703d2a8ae6ba6932241cd41f077d4ad3a3cf23c92b69ae58bd3a40db9aacec592aac3f
-
Filesize
607KB
MD5a0c4ac6378ce0313955dccfd2d9208a6
SHA17ee2f0f3bf4504f4f7bbc63cb5fa883711c13801
SHA256abbe3285c58c830314f9f0ad2ddc769139c0d808e27893290adc69a535b996b1
SHA51272ea9f0d7399fa5d6865f3f887ffa07098b883b1428b33dcb552a40bb22ca6a461a546736667ca1aa97e5f06dffd10dab765c7f6e3e827dd0335b562b27d2fb5
-
Filesize
142.7MB
MD501bb6618647c7afc1742fe82c1072b30
SHA1a04811aa6ffb5a317d240ea7b60fa5f0373b64e5
SHA256a57cc270a953c7a04c7a5a8efa38166cbe0b8616378f8e807c41839add44fe19
SHA51200203b6f8544595d07c8945e288b37538ca7ababf191d73a46c1b3d55b42c16f1795cb390ee48c5f80b0955d83cb6fd8c598d5445f3434964faad62d801f597e