Static task
static1
Behavioral task
behavioral1
Sample
2024-05-11_2bf507614df8beb12ae42b2c96671d2a_cobalt-strike_lockbit.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-11_2bf507614df8beb12ae42b2c96671d2a_cobalt-strike_lockbit.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-11_2bf507614df8beb12ae42b2c96671d2a_cobalt-strike_lockbit
-
Size
325KB
-
MD5
2bf507614df8beb12ae42b2c96671d2a
-
SHA1
73a4b9f3a04d4bceb1e2c94c9567de4be695d4a2
-
SHA256
15836904c11349240a3f76c5aa15ce344940069fa510503c38135ce3617327ab
-
SHA512
f046588eda15384f09965b776c910838dd863db548dcfd67acbf6a099cf94663f467c08538f258e4770b21b3646a9f3d207211abd63dc7ee9fb2a41c619b3264
-
SSDEEP
6144:WLNkSTnE1kb+55UEyOLrWwOpOjpOdpOjpOXxTuUnBGBpTyz+4:WLNkSTnE1kb+557rWc020tGHyz+4
Malware Config
Signatures
-
Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-11_2bf507614df8beb12ae42b2c96671d2a_cobalt-strike_lockbit
Files
-
2024-05-11_2bf507614df8beb12ae42b2c96671d2a_cobalt-strike_lockbit.exe windows:6 windows x64 arch:x64
3164b0e3117a873c87f9d6c1f176d6c8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
ReadFile
SetFilePointer
WriteFile
GetTempPathA
GetTempFileNameA
FileTimeToDosDateTime
WideCharToMultiByte
HeapCreate
HeapDestroy
HeapAlloc
CreateFileW
DeleteFileW
CompareFileTime
CreateDirectoryW
GetFileTime
RemoveDirectoryW
SetEndOfFile
TerminateProcess
GetExitCodeProcess
ResumeThread
CreateProcessW
MoveFileExW
CopyFileW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetFileAttributesW
LoadLibraryW
ContinueDebugEvent
WaitForDebugEvent
GetStartupInfoW
InitializeProcThreadAttributeList
DeleteProcThreadAttributeList
UpdateProcThreadAttribute
CreateThread
TerminateThread
SetThreadPriority
SetEvent
GetCurrentProcess
GetCurrentThreadId
OpenProcess
VirtualFree
LocalAlloc
LocalFree
GetConsoleMode
GetConsoleOutputCP
GetCommandLineW
SetStdHandle
SetFilePointerEx
LoadLibraryExW
FreeLibrary
FindNextFileW
FindFirstFileW
FindClose
FileTimeToLocalFileTime
WriteConsoleW
GetProcAddress
GetModuleHandleW
GetTickCount
Sleep
CreateEventW
WaitForSingleObject
SetLastError
GetLastError
CloseHandle
GetModuleFileNameW
RaiseException
EncodePointer
MultiByteToWideChar
GetStringTypeW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
LCMapStringW
FlsSetValue
FlsGetValue
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleExW
IsProcessorFeaturePresent
TlsSetValue
TlsGetValue
InitializeCriticalSectionAndSpinCount
GetFileInformationByHandle
DeleteFileA
CreateFileA
ExitProcess
FlushFileBuffers
VirtualAlloc
user32
GetUserObjectInformationW
SendMessageTimeoutW
CharPrevW
GetShellWindow
GetWindowThreadProcessId
GetThreadDesktop
GetProcessWindowStation
advapi32
QueryServiceStatusEx
RevertToSelf
RegSetKeyValueW
RegOpenKeyW
RegFlushKey
RegEnumKeyExW
CreateWellKnownSid
CreateProcessAsUserW
RegRenameKey
RegDeleteKeyW
RegCreateKeyW
StartServiceW
ImpersonateLoggedOnUser
OpenServiceW
OpenSCManagerW
CloseServiceHandle
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumValueW
RegDeleteValueW
RegCreateKeyExW
RegCloseKey
shell32
SHCreateItemFromParsingName
SHAssocEnumHandlersForProtocolByApplication
SHGetSpecialFolderPathW
ShellExecuteExW
SHGetKnownFolderPath
ole32
CoCreateInstance
StringFromCLSID
CoUninitialize
CoTaskMemFree
CoGetObject
CLSIDFromString
CoCreateGuid
CoInitializeSecurity
CoInitializeEx
oleaut32
VariantInit
SysStringLen
SysFreeString
SysAllocString
rpcrt4
RpcBindingSetAuthInfoExW
RpcStringFreeW
RpcStringBindingComposeW
RpcBindingFree
RpcRaiseException
RpcAsyncInitializeHandle
RpcAsyncCompleteCall
NdrAsyncClientCall
UuidCompare
UuidCreateNil
UuidFromStringW
NdrClientCall2
RpcBindingFromStringBindingW
secur32
QuerySecurityContextToken
AcceptSecurityContext
InitializeSecurityContextW
FreeCredentialsHandle
AcquireCredentialsHandleW
DeleteSecurityContext
ntdll
RtlCreateHeap
RtlDestroyHeap
RtlSetHeapInformation
RtlAllocateHeap
RtlFreeHeap
RtlImageNtHeader
RtlCreateBoundaryDescriptor
RtlDeleteBoundaryDescriptor
RtlAddSIDToBoundaryDescriptor
NtQuerySystemInformation
NtCreatePrivateNamespace
NtDeletePrivateNamespace
NtFsControlFile
NtReadFile
NtQueryInformationFile
NtQueryInformationToken
NtOpenThreadToken
RtlNtStatusToDosErrorNoTeb
NtRemoveProcessDebug
NtDeleteValueKey
NtOpenProcess
NtQueryInformationProcess
NtAllocateVirtualMemory
NtFreeVirtualMemory
RtlUnwindEx
NtTerminateProcess
RtlExpandEnvironmentStrings_U
RtlQueryElevationFlags
NtCompressKey
RtlImageDirectoryEntryToData
RtlExitUserProcess
LdrGetDllHandleEx
RtlPrefixUnicodeString
RtlGetVersion
RtlGetCurrentPeb
RtlSubAuthoritySid
RtlInitializeSid
RtlLengthRequiredSid
RtlRaiseStatus
RtlReleasePebLock
RtlAcquirePebLock
NtQueryValueKey
LdrGetDllHandle
LdrFindEntryForAddress
LdrFindResource_U
LdrEnumerateLoadedModules
LdrAccessResource
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlPcToFileHeader
RtlGetFrame
NtSetInformationToken
NtDuplicateToken
NtOpenProcessToken
NtDuplicateObject
DbgUiSetThreadDebugObject
RtlLengthSid
RtlAllocateAndInitializeSid
RtlFreeSid
NtSetValueKey
NtOpenKey
NtCreateKey
RtlAppendUnicodeToString
RtlAppendUnicodeStringToString
RtlFormatCurrentUserKeyPath
NtDeleteFile
NtUnmapViewOfSection
NtMapViewOfSection
NtCreateSection
NtClose
RtlPopFrame
RtlPushFrame
NtNotifyChangeDirectoryFile
NtCreateFile
NtWaitForSingleObject
NtSetEvent
RtlDosPathNameToNtPathName_U
RtlComputeCrc32
NtCreateEvent
RtlFreeUnicodeString
RtlRandomEx
RtlEqualUnicodeString
NtDeleteKey
RtlInitUnicodeString
comctl32
ord17
cabinet
ord10
ord13
ord14
ord11
msdelta
ApplyDeltaB
DeltaFree
bcrypt
BCryptDestroyKey
BCryptDecrypt
BCryptGenerateSymmetricKey
BCryptCloseAlgorithmProvider
BCryptGetProperty
BCryptOpenAlgorithmProvider
Sections
.text Size: 134KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 101KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ