Resubmissions

28/01/2023, 20:13

230128-yzjr1shf2x 10

12/01/2023, 16:07

230112-tk5zgsgf39 10

Analysis

  • max time kernel
    180s
  • max time network
    181s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/01/2023, 16:07

General

  • Target

    windows-kb890830-x64-v5.98_b56cfec6692828d2b240b0978e09fa22ddf23994.exe

  • Size

    42.2MB

  • MD5

    e4b46649d3a062a562e5c8ce5729bdd7

  • SHA1

    b56cfec6692828d2b240b0978e09fa22ddf23994

  • SHA256

    bc1462975dc1047acace72d40dc87b3baca7c2a3bf71d5f54ecaafb1bf924161

  • SHA512

    ffd062af7bab46dcee293f1fe20bff9d677f9593595e34a3e3cf5b2b79bef0283b775adea7fbddefdb020a73e68b7a143df871328231af0600fe0bc1bde6d68c

  • SSDEEP

    786432:IMXrrRLIxJpnkivyTFHltPOTT2WFbK3xXTHqFnnOOFd:IgXIpkPHltPOTTNUxXuFnf

Malware Config

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Registers COM server for autorun 1 TTPs 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\windows-kb890830-x64-v5.98_b56cfec6692828d2b240b0978e09fa22ddf23994.exe
    "C:\Users\Admin\AppData\Local\Temp\windows-kb890830-x64-v5.98_b56cfec6692828d2b240b0978e09fa22ddf23994.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4420
    • C:\Windows\system32\MRT.exe
      "C:\Windows\system32\MRT.exe"
      2⤵
      • Executes dropped EXE
      • Registers COM server for autorun
      • Loads dropped DLL
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:420

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\System32\MRT.exe

    Filesize

    142.7MB

    MD5

    01bb6618647c7afc1742fe82c1072b30

    SHA1

    a04811aa6ffb5a317d240ea7b60fa5f0373b64e5

    SHA256

    a57cc270a953c7a04c7a5a8efa38166cbe0b8616378f8e807c41839add44fe19

    SHA512

    00203b6f8544595d07c8945e288b37538ca7ababf191d73a46c1b3d55b42c16f1795cb390ee48c5f80b0955d83cb6fd8c598d5445f3434964faad62d801f597e

  • C:\Windows\Temp\F322244C-E00D-6B49-FB39-1D209C8D8655\MPENGINE.DLL

    Filesize

    15.7MB

    MD5

    517246e597c5cb542cb3ad9c2f601201

    SHA1

    490da9f8c066ecccfa437b51badbc1bc85bd34e8

    SHA256

    e406d8809e6b3e7dd2a41131a2de92f36a4391f539657994c7a0f76385244be4

    SHA512

    a392f733bdebd241e613361223cdd7768fb5327d31e4e8fce2a822e5b4703d2a8ae6ba6932241cd41f077d4ad3a3cf23c92b69ae58bd3a40db9aacec592aac3f

  • C:\Windows\Temp\F322244C-E00D-6B49-FB39-1D209C8D8655\MPGEAR.DLL

    Filesize

    607KB

    MD5

    a0c4ac6378ce0313955dccfd2d9208a6

    SHA1

    7ee2f0f3bf4504f4f7bbc63cb5fa883711c13801

    SHA256

    abbe3285c58c830314f9f0ad2ddc769139c0d808e27893290adc69a535b996b1

    SHA512

    72ea9f0d7399fa5d6865f3f887ffa07098b883b1428b33dcb552a40bb22ca6a461a546736667ca1aa97e5f06dffd10dab765c7f6e3e827dd0335b562b27d2fb5

  • C:\Windows\system32\MRT.exe

    Filesize

    142.7MB

    MD5

    01bb6618647c7afc1742fe82c1072b30

    SHA1

    a04811aa6ffb5a317d240ea7b60fa5f0373b64e5

    SHA256

    a57cc270a953c7a04c7a5a8efa38166cbe0b8616378f8e807c41839add44fe19

    SHA512

    00203b6f8544595d07c8945e288b37538ca7ababf191d73a46c1b3d55b42c16f1795cb390ee48c5f80b0955d83cb6fd8c598d5445f3434964faad62d801f597e

  • memory/420-137-0x000001D12D920000-0x000001D12D924000-memory.dmp

    Filesize

    16KB

  • memory/420-138-0x000001D12BCA0000-0x000001D12BCE0000-memory.dmp

    Filesize

    256KB

  • memory/420-140-0x000001D12D990000-0x000001D12D9D0000-memory.dmp

    Filesize

    256KB

  • memory/420-141-0x000001D12D9D0000-0x000001D12DA10000-memory.dmp

    Filesize

    256KB

  • memory/420-144-0x000001D12DA90000-0x000001D12DAD0000-memory.dmp

    Filesize

    256KB

  • memory/420-143-0x000001D12DA50000-0x000001D12DA90000-memory.dmp

    Filesize

    256KB

  • memory/420-145-0x000001D12E2D0000-0x000001D12E310000-memory.dmp

    Filesize

    256KB

  • memory/420-146-0x000001D12E310000-0x000001D12E350000-memory.dmp

    Filesize

    256KB

  • memory/420-147-0x000001D12E350000-0x000001D12E390000-memory.dmp

    Filesize

    256KB

  • memory/420-148-0x000001D12E390000-0x000001D12E3D0000-memory.dmp

    Filesize

    256KB

  • memory/420-149-0x000001D12E500000-0x000001D12E540000-memory.dmp

    Filesize

    256KB

  • memory/420-142-0x000001D12DA10000-0x000001D12DA50000-memory.dmp

    Filesize

    256KB

  • memory/420-139-0x000001D12D940000-0x000001D12D980000-memory.dmp

    Filesize

    256KB

  • memory/420-150-0x000001D12E540000-0x000001D12E580000-memory.dmp

    Filesize

    256KB

  • memory/420-151-0x000001D12E580000-0x000001D12E5C0000-memory.dmp

    Filesize

    256KB

  • memory/420-152-0x000001D12E5C0000-0x000001D12E600000-memory.dmp

    Filesize

    256KB

  • memory/420-153-0x000001D12E610000-0x000001D12E650000-memory.dmp

    Filesize

    256KB

  • memory/420-155-0x000001D12E6A0000-0x000001D12E6E0000-memory.dmp

    Filesize

    256KB

  • memory/420-154-0x000001D12E660000-0x000001D12E6A0000-memory.dmp

    Filesize

    256KB

  • memory/420-157-0x000001D12E730000-0x000001D12E770000-memory.dmp

    Filesize

    256KB

  • memory/420-156-0x000001D12E6F0000-0x000001D12E730000-memory.dmp

    Filesize

    256KB

  • memory/420-158-0x000001D12E770000-0x000001D12E7B0000-memory.dmp

    Filesize

    256KB

  • memory/420-159-0x000001D12E7D0000-0x000001D12E810000-memory.dmp

    Filesize

    256KB

  • memory/420-160-0x000001D12E3D0000-0x000001D12E410000-memory.dmp

    Filesize

    256KB

  • memory/420-161-0x000001D12E410000-0x000001D12E450000-memory.dmp

    Filesize

    256KB

  • memory/420-162-0x000001D12E450000-0x000001D12E490000-memory.dmp

    Filesize

    256KB

  • memory/420-163-0x000001D12E490000-0x000001D12E4D0000-memory.dmp

    Filesize

    256KB

  • memory/420-166-0x000001D12EA60000-0x000001D12EAA0000-memory.dmp

    Filesize

    256KB

  • memory/420-165-0x000001D12EA20000-0x000001D12EA60000-memory.dmp

    Filesize

    256KB

  • memory/420-167-0x000001D12EAA0000-0x000001D12EAE0000-memory.dmp

    Filesize

    256KB

  • memory/420-168-0x000001D12EAE0000-0x000001D12EB20000-memory.dmp

    Filesize

    256KB

  • memory/420-169-0x000001D12EB20000-0x000001D12EB60000-memory.dmp

    Filesize

    256KB

  • memory/420-164-0x000001D12E9E0000-0x000001D12EA20000-memory.dmp

    Filesize

    256KB

  • memory/420-170-0x000001D12EB60000-0x000001D12EBA0000-memory.dmp

    Filesize

    256KB

  • memory/420-171-0x000001D12D570000-0x000001D12D669000-memory.dmp

    Filesize

    996KB

  • memory/420-172-0x000001D130EE0000-0x000001D130FE0000-memory.dmp

    Filesize

    1024KB

  • memory/420-173-0x000001D13A840000-0x000001D13A94D000-memory.dmp

    Filesize

    1.1MB

  • memory/420-174-0x000001D138690000-0x000001D138890000-memory.dmp

    Filesize

    2.0MB

  • memory/420-175-0x000001D130EE0000-0x000001D130FE0000-memory.dmp

    Filesize

    1024KB

  • memory/420-176-0x000001D13A840000-0x000001D13A94D000-memory.dmp

    Filesize

    1.1MB

  • memory/420-177-0x000001D138690000-0x000001D138890000-memory.dmp

    Filesize

    2.0MB

  • memory/420-178-0x000001D12B130000-0x000001D12B150000-memory.dmp

    Filesize

    128KB

  • memory/420-179-0x000001D12B130000-0x000001D12B150000-memory.dmp

    Filesize

    128KB

  • memory/420-180-0x000001D12B140000-0x000001D12B160000-memory.dmp

    Filesize

    128KB

  • memory/420-181-0x000001D12B160000-0x000001D12B180000-memory.dmp

    Filesize

    128KB

  • memory/420-182-0x000001D12B290000-0x000001D12B2B0000-memory.dmp

    Filesize

    128KB

  • memory/420-183-0x000001D12B160000-0x000001D12B180000-memory.dmp

    Filesize

    128KB

  • memory/420-184-0x000001D13B0B0000-0x000001D13B1BD000-memory.dmp

    Filesize

    1.1MB

  • memory/420-185-0x000001D13B0B0000-0x000001D13B1BD000-memory.dmp

    Filesize

    1.1MB

  • memory/420-186-0x000001D12B290000-0x000001D12B2B0000-memory.dmp

    Filesize

    128KB

  • memory/420-187-0x000001D12B2B0000-0x000001D12B2F0000-memory.dmp

    Filesize

    256KB

  • memory/420-188-0x000001D13B0B0000-0x000001D13B1BD000-memory.dmp

    Filesize

    1.1MB

  • memory/420-189-0x000001D13B0B0000-0x000001D13B1BD000-memory.dmp

    Filesize

    1.1MB

  • memory/420-190-0x000001D12B290000-0x000001D12B2B0000-memory.dmp

    Filesize

    128KB

  • memory/420-191-0x000001D12B2D0000-0x000001D12B2F0000-memory.dmp

    Filesize

    128KB

  • memory/420-192-0x000001D12B2D0000-0x000001D12B2F0000-memory.dmp

    Filesize

    128KB

  • memory/420-193-0x000001D12B2D0000-0x000001D12B2F0000-memory.dmp

    Filesize

    128KB

  • memory/420-194-0x000001D1379D0000-0x000001D1379F0000-memory.dmp

    Filesize

    128KB

  • memory/420-195-0x000001D12B290000-0x000001D12B2B0000-memory.dmp

    Filesize

    128KB

  • memory/420-196-0x000001D1379D0000-0x000001D1379F0000-memory.dmp

    Filesize

    128KB

  • memory/420-197-0x000001D1379D0000-0x000001D1379F0000-memory.dmp

    Filesize

    128KB