Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
3CobaltStri...nal.7z
windows7-x64
3CobaltStri...nal.7z
windows10-2004-x64
3CobaltStri...nt.cmd
windows7-x64
1CobaltStri...nt.cmd
windows10-2004-x64
1CobaltStri...nt.jar
windows7-x64
1CobaltStri...nt.jar
windows10-2004-x64
1CobaltStri...ok.jar
windows7-x64
1CobaltStri...ok.jar
windows10-2004-x64
1CobaltStri...mon.sh
windows7-x64
3CobaltStri...mon.sh
windows10-2004-x64
3Analysis
-
max time kernel
1200s -
max time network
903s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
16/05/2023, 10:58
Static task
static1
Behavioral task
behavioral1
Sample
CobaltStrike48-pwn3rzs-cyberarsenal.7z
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
CobaltStrike48-pwn3rzs-cyberarsenal.7z
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
CobaltStrike48-pwn3rzs-cyberarsenal_ucare/Client/cobaltstrike-client.cmd
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
CobaltStrike48-pwn3rzs-cyberarsenal_ucare/Client/cobaltstrike-client.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
CobaltStrike48-pwn3rzs-cyberarsenal_ucare/Client/cobaltstrike-client.jar
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
CobaltStrike48-pwn3rzs-cyberarsenal_ucare/Client/cobaltstrike-client.jar
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
CobaltStrike48-pwn3rzs-cyberarsenal_ucare/Client/uHook.jar
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
CobaltStrike48-pwn3rzs-cyberarsenal_ucare/Client/uHook.jar
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
CobaltStrike48-pwn3rzs-cyberarsenal_ucare/Server/source-common.sh
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
CobaltStrike48-pwn3rzs-cyberarsenal_ucare/Server/source-common.sh
Resource
win10v2004-20230220-en
General
-
Target
CobaltStrike48-pwn3rzs-cyberarsenal.7z
-
Size
61.6MB
-
MD5
f7434aea00ed4fdb58801bf1431bbab8
-
SHA1
29dbd82961f6b7ff13b2becd59ab24ded72add4a
-
SHA256
08b6af118b07cddd18958ea427ef26f87c39771ccdad3ed7e6b8f0c4641f53f6
-
SHA512
53c552390c8fbb59782cfafe86cb75b6c868207c2b3995b6e5be442cccbff92b16513befc876eed49f12bac3695a60444ffb91996a9018e2fa507fc96a45f396
-
SSDEEP
1572864:EaO6PJhFnkNodXV9GXiNMdjl5bUMIis7+42y:PFPJhFnYwGXiNMdx5bZIVR7
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\.7z\ = "7z_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\7z_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\7z_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\7z_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\7z_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\.7z rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\7z_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\7z_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1472 AcroRd32.exe 1472 AcroRd32.exe 1472 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1220 wrote to memory of 1336 1220 cmd.exe 28 PID 1220 wrote to memory of 1336 1220 cmd.exe 28 PID 1220 wrote to memory of 1336 1220 cmd.exe 28 PID 1336 wrote to memory of 1472 1336 rundll32.exe 29 PID 1336 wrote to memory of 1472 1336 rundll32.exe 29 PID 1336 wrote to memory of 1472 1336 rundll32.exe 29 PID 1336 wrote to memory of 1472 1336 rundll32.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\CobaltStrike48-pwn3rzs-cyberarsenal.7z1⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\CobaltStrike48-pwn3rzs-cyberarsenal.7z2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\CobaltStrike48-pwn3rzs-cyberarsenal.7z"3⤵
- Suspicious use of SetWindowsHookEx
PID:1472
-
-