Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_2a69e7d4a3af9c397a65c86cfe2c0763_cobalt-strike_lockbit.exe
Resource
win7-20231215-en
General
-
Target
2024-01-25_2a69e7d4a3af9c397a65c86cfe2c0763_cobalt-strike_lockbit
-
Size
195KB
-
MD5
2a69e7d4a3af9c397a65c86cfe2c0763
-
SHA1
2291777c735f8ed547ac0fdca3bf9aaf5f243c04
-
SHA256
a1142d9137912297577ef14751eced999cf0e3b10d058f519e4a867e4c56d148
-
SHA512
6bad3490d55f8d3fd144dbea62c551b7c6f1a944ea89ff2022bf6198413f3ab5a34f467916fc2e297b1bb2053b297e3b41e72eb2e527b62c427bc3b9a1f468fc
-
SSDEEP
3072:eoiZjZKNB31SAMmtx1sW8M4R0cjf8g1Ko52D3h/VpYl7GwkAWiNMr:esB1SepKdRtjfv1K4IpOWxi
Malware Config
Signatures
-
Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-25_2a69e7d4a3af9c397a65c86cfe2c0763_cobalt-strike_lockbit
Files
-
2024-01-25_2a69e7d4a3af9c397a65c86cfe2c0763_cobalt-strike_lockbit.exe windows:6 windows x64 arch:x64
69580f524e6d1cb537453e6cddb90f94
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetTempPathA
CreateFileA
DeleteFileA
FileTimeToLocalFileTime
WideCharToMultiByte
GetTempFileNameA
FileTimeToDosDateTime
HeapCreate
HeapAlloc
HeapDestroy
CreateFileW
DeleteFileW
CreateDirectoryW
CompareFileTime
TerminateProcess
RemoveDirectoryW
SetEndOfFile
ResumeThread
MoveFileExW
CreateProcessW
GetFileTime
GetExitCodeProcess
CopyFileW
GetFileAttributesW
LoadLibraryW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetStartupInfoW
WaitForDebugEvent
InitializeProcThreadAttributeList
ContinueDebugEvent
UpdateProcThreadAttribute
DeleteProcThreadAttributeList
TerminateThread
CreateThread
SetThreadPriority
VirtualFree
GetCurrentProcess
LocalAlloc
GetCurrentThreadId
OpenProcess
SetEvent
LocalFree
GetConsoleMode
GetConsoleOutputCP
GetCommandLineW
SetStdHandle
SetFilePointerEx
LoadLibraryExW
FreeLibrary
FindClose
FindNextFileW
FindFirstFileW
SetFilePointer
GetTickCount
GetModuleHandleW
GetProcAddress
WriteConsoleW
Sleep
CloseHandle
GetLastError
CreateEventW
WaitForSingleObject
SetLastError
GetModuleFileNameW
RaiseException
EncodePointer
MultiByteToWideChar
GetStringTypeW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
LCMapStringW
FlsSetValue
FlsGetValue
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleExW
IsProcessorFeaturePresent
TlsSetValue
TlsGetValue
InitializeCriticalSectionAndSpinCount
GetFileInformationByHandle
WriteFile
ReadFile
ExitProcess
FlushFileBuffers
VirtualAlloc
user32
CharPrevW
GetThreadDesktop
GetShellWindow
SendMessageTimeoutW
GetWindowThreadProcessId
GetProcessWindowStation
GetUserObjectInformationW
advapi32
RegQueryInfoKeyW
RevertToSelf
RegSetKeyValueW
CreateWellKnownSid
RegFlushKey
RegEnumKeyExW
RegOpenKeyW
CreateProcessAsUserW
RegRenameKey
RegDeleteKeyW
RegCreateKeyW
RegCloseKey
ImpersonateLoggedOnUser
CloseServiceHandle
OpenSCManagerW
RegCreateKeyExW
RegSetValueExW
StartServiceW
RegOpenKeyExW
RegDeleteValueW
OpenServiceW
QueryServiceStatusEx
RegEnumValueW
shell32
SHCreateItemFromParsingName
SHAssocEnumHandlersForProtocolByApplication
SHGetKnownFolderPath
ShellExecuteExW
SHGetSpecialFolderPathW
ole32
CoCreateGuid
CoCreateInstance
CoUninitialize
CoInitializeSecurity
CoGetObject
CLSIDFromString
CoTaskMemFree
StringFromCLSID
CoInitializeEx
oleaut32
VariantInit
SysFreeString
SysAllocString
SysStringLen
rpcrt4
RpcStringFreeW
RpcBindingSetAuthInfoExW
RpcStringBindingComposeW
RpcRaiseException
RpcAsyncInitializeHandle
RpcAsyncCompleteCall
RpcBindingFree
NdrAsyncClientCall
UuidCreateNil
UuidCompare
UuidFromStringW
NdrClientCall2
RpcBindingFromStringBindingW
secur32
FreeCredentialsHandle
AcquireCredentialsHandleW
DeleteSecurityContext
AcceptSecurityContext
QuerySecurityContextToken
InitializeSecurityContextW
ntdll
NtAllocateVirtualMemory
LdrEnumerateLoadedModules
RtlPrefixUnicodeString
NtDeleteValueKey
RtlLengthRequiredSid
RtlAcquirePebLock
RtlImageNtHeader
RtlGetVersion
NtFsControlFile
RtlGetCurrentPeb
NtCreatePrivateNamespace
NtQueryInformationFile
NtDeletePrivateNamespace
NtOpenThreadToken
RtlFreeHeap
NtReadFile
NtTerminateProcess
RtlCreateHeap
LdrFindEntryForAddress
RtlAddSIDToBoundaryDescriptor
RtlReleasePebLock
RtlExpandEnvironmentStrings_U
NtQueryValueKey
LdrAccessResource
RtlUnwindEx
DbgUiSetThreadDebugObject
RtlAllocateHeap
RtlQueryElevationFlags
LdrGetDllHandleEx
NtCompressKey
RtlExitUserProcess
RtlImageDirectoryEntryToData
RtlDestroyHeap
LdrFindResource_U
NtQuerySystemInformation
NtQueryInformationToken
NtOpenProcess
RtlDeleteBoundaryDescriptor
NtQueryInformationProcess
LdrGetDllHandle
RtlCreateBoundaryDescriptor
RtlSubAuthoritySid
RtlRaiseStatus
RtlInitializeSid
NtFreeVirtualMemory
RtlNtStatusToDosErrorNoTeb
NtDeleteKey
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlPcToFileHeader
RtlPushFrame
RtlFreeSid
NtDuplicateObject
RtlLengthSid
RtlAllocateAndInitializeSid
NtSetInformationToken
NtRemoveProcessDebug
NtDuplicateToken
NtOpenProcessToken
NtSetValueKey
NtCreateKey
RtlFormatCurrentUserKeyPath
NtOpenKey
RtlAppendUnicodeToString
RtlAppendUnicodeStringToString
NtDeleteFile
NtMapViewOfSection
NtUnmapViewOfSection
NtCreateEvent
NtClose
RtlPopFrame
RtlGetFrame
NtNotifyChangeDirectoryFile
NtWaitForSingleObject
NtCreateFile
NtSetEvent
RtlDosPathNameToNtPathName_U
RtlComputeCrc32
RtlInitUnicodeString
RtlFreeUnicodeString
RtlRandomEx
RtlEqualUnicodeString
RtlSetHeapInformation
NtCreateSection
comctl32
ord17
cabinet
ord13
ord14
ord11
ord10
msdelta
ApplyDeltaB
DeltaFree
bcrypt
BCryptGenerateSymmetricKey
BCryptCloseAlgorithmProvider
BCryptOpenAlgorithmProvider
BCryptDecrypt
BCryptGetProperty
BCryptDestroyKey
Sections
.text Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ