Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 00:04

General

  • Target

    2024-05-20_d2cc7eccfe161b31e29d12979d39a973_cobalt-strike_cobaltstrike.exe

  • Size

    4.9MB

  • MD5

    d2cc7eccfe161b31e29d12979d39a973

  • SHA1

    3e5ce10edd9f8a3f8fc1596c68b6e0ce4f8eff4b

  • SHA256

    20cdc7ac54e1888d2725db0b56059f40e02c62fe121fa7f6417a335718c2622d

  • SHA512

    37caec18304dcfc1953d9964fd9daef5d331feddbd79bce9aca650527419780f9f5d8842efda320ae6b8cc2d48bbe5c4183af9c5743dab2e7f5d3c72786ca590

  • SSDEEP

    98304:SW1qiPgxn+cuSuxx8Svt73qq36IdKtVxNw6pUkp3bkbRxDUB:53EnsxxDt73DdKrwapwbcB

Malware Config

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Reflective DLL injection artifacts 1 IoCs
  • Detects executables containing URLs to raw contents of a Github gist 8 IoCs
  • UPX dump on OEP (original entry point) 10 IoCs
  • XMRig Miner payload 8 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops desktop.ini file(s) 9 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-20_d2cc7eccfe161b31e29d12979d39a973_cobalt-strike_cobaltstrike.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-20_d2cc7eccfe161b31e29d12979d39a973_cobalt-strike_cobaltstrike.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • Modifies Internet Explorer start page
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:2460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7-zip32.dll.exe

    Filesize

    5.2MB

    MD5

    4e2c41e374f169b4ddcc9bea57d0334f

    SHA1

    e352e45b095a0b375c27e514eaa81787cb63fd10

    SHA256

    d75034d159f8bf19bfebdfc75ffa71e1ffd589620833f6365f533dc24a1cb5cc

    SHA512

    21c8ea172052b3e9ae520a5ca2dae176afc8c9bc208b8ced342214065daac0c96f6275883a97a55e7d8ae0b26b78b4f13f57bcc8140029fb8ff2a01fe29c034b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

    Filesize

    230B

    MD5

    06e4e5ade0ab6c315177f6b9d5a3a1ef

    SHA1

    c48faca84c7d56b020ac612ade8a45e54a8fabae

    SHA256

    f004ec743b75a89ac1f89947a7d40784cde425b8cfaa728573c5f92400f3386b

    SHA512

    3699808af1f5fe9e47c23e0e5e99fe46738499ddf9d0954404d8413bc396fb8944ee87002fdf391d237538d67ee5836ab05f75b207251ecc0fadfb660c1fda6d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7fc7d4585df70d44bce9ee666fe59e88

    SHA1

    523ba043fa2aad9caee505bcdba74087f70107e2

    SHA256

    a18c44e2c7b32d3f633b70f4179ca437ea32ac0bc67fee17c8bc26d498676377

    SHA512

    d380b0529ccb9711d79a617994d5970746fd5be15b2b21872c96cf02978c3687308aa67c513465fa78e20e0ac0b8cb0e08ecfe29ea62ff6b87f6a5f1edc85e4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1fc712d52ceca113e05261d06fd52e58

    SHA1

    f4f568026c0c3e64385f5f61a4948f8a0306aeb3

    SHA256

    9350a46f9d38126fe101e1df36d7013e7d32c21c7a5c7e1426b1b9305afc83de

    SHA512

    155b310c9dc0b92e6820c19815c8fafa183a470677ef13041adccc65491a4622685b6508a91cd61fa7019728fa842379574624e4a37f114fb3b38989d58fc8c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c1a254e4fe1cee8996719a5635e14b1c

    SHA1

    46b5cf4cc3d92bdcff5a01280d06f244e4bdf5b0

    SHA256

    7de2fc18341154203e2be44403ab940454b12dfb4e0b12acfb7f5bb62e048cf8

    SHA512

    e2978e7b86b54a2d8a52a0ee55cfb5a4d2f2fdce9e85a7ce7cdbd2683e75998846c9ff5a18aba088ab65b81b67da0b04695d2e6a91ee8af6136b965d051fdb3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6dc21ff6d65d5146878f1d4375336b43

    SHA1

    579515e6b20e5e7fc1da3fe9560978c0cd776011

    SHA256

    9709e651e0645c4477c4f4fea8aae206304f2fdb041f07ac6abdb34477a3ae2f

    SHA512

    72e6e7e7bf90fc0d9e11ac29da4ccba55d10193daece3c7c424fcf039c78c3b00eca2a65672a06cb5c4835461a43aad47a65d591609bb1cb86be7f3be7354bf6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    75f05408eb5ab1b02e75c4825b12874b

    SHA1

    f7560fd403d1be3063fe805b08d5df395724922d

    SHA256

    f9333a57c573adf8a7a214120199026c65e69ea866da6b37f441e8c85c2bd4d7

    SHA512

    ccb8c8fdaee26f0b2e9ebcaad5ff0727422a39f518d79498337baf1ccb989c634753750568dc5c3ea06a5c041fc34a3d3b539e4542a50209cf4bbf9656d01e0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d43f62b45633aaae0c8264085c220b7f

    SHA1

    c29062b4ab0d96d1f05e4716374280ea19622334

    SHA256

    bd4abe993a3426eae95715981463b9d1ec60a5c97b4606bff8bbb1c3e0bfa203

    SHA512

    822c59e86aad8c8c107424d6683e231b3b64b34fec02451203111d1cbef15ae42673ac0c23ab45312accfc84e97433511fc835b41db192fcf9b1c41056fd8dff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6d3ca6deb0c552da38595059efa3dfe6

    SHA1

    702c05426cb54da6d6d47f07353cc8906c78cd1c

    SHA256

    9ad357d06669d4c25bf022356e35b0fe1758983680ef6f168ccab63869470f48

    SHA512

    082df6cf708c5a27076cb3271235e9970ca4e147d9c197cd756accbc7bbdb191c8c6f6b8cf388be3acc2676713faf83215ce0fa6dd1bce7e046c3b9237e216a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    938494fde1c74d7f4713b3634936b1f0

    SHA1

    ab5ed9ccda9dab3c082bbaf21decd56bb43b64d5

    SHA256

    66fa40727b18207c359fbce617f51fc9b7adda5b03e17e66dcbecdf960a0a709

    SHA512

    24344c6eec3a55099d858123bfdb280102c8beaaa6cc4ea27b0ac6bcf4966ae74e27c058c5a34501f3694890573393fa37e5634e52a2455c6f317361db64dc81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f688c84a48c003a09a38e0f0f3b20ea5

    SHA1

    970b10995aa7121d6f5a4cd290847cb87ddb6a0b

    SHA256

    75e47c4ec4ac1e0909e3c0bec7c5ff594f9e113e1948641f20cdede889d017cd

    SHA512

    bc3e65a15d2e1a4d84e508338c7e088e6bb080c2bade93ea476c28057c1ea458344b9b9631a861559dbf7a1d7b38e3efeaa8345bb55c0b95eb2b22bb7eac1139

  • C:\Users\Admin\AppData\Local\Temp\Cab1547.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar155A.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/2460-1-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/2460-4719-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/2460-1220-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/2460-2725-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/2460-3543-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/2460-0-0x0000000000270000-0x0000000000280000-memory.dmp

    Filesize

    64KB

  • memory/2460-4661-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/2460-1194-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/2460-4992-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2460-4993-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2460-4994-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2460-4995-0x0000000000280000-0x0000000000380000-memory.dmp

    Filesize

    1024KB

  • memory/2460-4996-0x00000000003F0000-0x0000000000400000-memory.dmp

    Filesize

    64KB

  • memory/2460-4998-0x0000000005C80000-0x0000000005C81000-memory.dmp

    Filesize

    4KB

  • memory/2460-4997-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/2460-5001-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB