Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-05-2024 20:45

General

  • Target

    2024-05-20_47c1196fe65906870295faef8613560d_cobalt-strike_cobaltstrike.exe

  • Size

    5.3MB

  • MD5

    47c1196fe65906870295faef8613560d

  • SHA1

    805ec30c834967b67873cb1a4f43905ff7c3ac13

  • SHA256

    0cb1414aa217149ab312795430ed3056117823afe084b861b4bae1708114d58c

  • SHA512

    3cf19cb0083fdb54709e67faff23f4a54cd75fb46addf3ffc2aecfe3bfd7e9c217f168e53841c26745bd3278ae47a61cd4dcdcbdabcc2581397beb7d26d7135e

  • SSDEEP

    98304:SW1qiPgxn+cuSuxx8Svt73qq36IdKtVxNw6pUkp3bkbRxRUu:53EnsxxDt73DdKrwapwbuu

Malware Config

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Reflective DLL injection artifacts 1 IoCs
  • Detects executables containing URLs to raw contents of a Github gist 7 IoCs
  • UPX dump on OEP (original entry point) 9 IoCs
  • XMRig Miner payload 8 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops desktop.ini file(s) 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-20_47c1196fe65906870295faef8613560d_cobalt-strike_cobaltstrike.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-20_47c1196fe65906870295faef8613560d_cobalt-strike_cobaltstrike.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • Modifies Internet Explorer start page
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:1412

Network

MITRE ATT&CK Matrix ATT&CK v13

Initial Access

Replication Through Removable Media

1
T1091

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Lateral Movement

Replication Through Removable Media

1
T1091

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7-zip32.dll
    Filesize

    5.5MB

    MD5

    94168038b1f231f7e1b32f594df36e76

    SHA1

    1265dca0466740ff6b3bdf74a3640137b28ba4a4

    SHA256

    cf0c9a1a6112335b814d50e9be7cda012cdd8ad8ced60d2a2d0c24e0a2af2227

    SHA512

    5340c5d8845705d7bc84679324f7415b258179b9bd241f74e0eb004b5225eea35c3fa38d4f9cb166248c573bf4b2d015b8e5a9ab05e2f128b1e6e464e12399cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
    Filesize

    330B

    MD5

    a3958a33cf893971cda3e63ee1868f86

    SHA1

    66e24eaaa32a10ffd66903593d0a99c889d66392

    SHA256

    6c861da4f11cf473d996c664098fec15cfc52ab3bd4ac2680db8fc0bcedd671a

    SHA512

    63036367b902fc73f4b863ccc14ee818084b5666643f06ed4f9f65cec2780ab5c84108fc91e049e4c772319baf506a24d2aadedf72da1d54f5ce845433990d7f

  • memory/1412-2058-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/1412-1-0x00000000001F0000-0x0000000000200000-memory.dmp
    Filesize

    64KB

  • memory/1412-564-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/1412-1565-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/1412-0-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/1412-2579-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/1412-3545-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/1412-4479-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/1412-4496-0x0000000000060000-0x0000000000062000-memory.dmp
    Filesize

    8KB

  • memory/1412-4499-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/1412-4501-0x0000000000401000-0x00000000010B5000-memory.dmp
    Filesize

    12.7MB