Analysis

  • max time kernel
    145s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-05-2024 00:04

General

  • Target

    2024-05-20_d2cc7eccfe161b31e29d12979d39a973_cobalt-strike_cobaltstrike.exe

  • Size

    4.9MB

  • MD5

    d2cc7eccfe161b31e29d12979d39a973

  • SHA1

    3e5ce10edd9f8a3f8fc1596c68b6e0ce4f8eff4b

  • SHA256

    20cdc7ac54e1888d2725db0b56059f40e02c62fe121fa7f6417a335718c2622d

  • SHA512

    37caec18304dcfc1953d9964fd9daef5d331feddbd79bce9aca650527419780f9f5d8842efda320ae6b8cc2d48bbe5c4183af9c5743dab2e7f5d3c72786ca590

  • SSDEEP

    98304:SW1qiPgxn+cuSuxx8Svt73qq36IdKtVxNw6pUkp3bkbRxDUB:53EnsxxDt73DdKrwapwbcB

Malware Config

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Reflective DLL injection artifacts 1 IoCs
  • Detects executables containing URLs to raw contents of a Github gist 8 IoCs
  • UPX dump on OEP (original entry point) 10 IoCs
  • XMRig Miner payload 10 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops desktop.ini file(s) 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 5 IoCs
  • Modifies system certificate store 2 TTPs 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-20_d2cc7eccfe161b31e29d12979d39a973_cobalt-strike_cobaltstrike.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-20_d2cc7eccfe161b31e29d12979d39a973_cobalt-strike_cobaltstrike.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • Modifies Internet Explorer start page
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:720

Network

MITRE ATT&CK Matrix ATT&CK v13

Initial Access

Replication Through Removable Media

1
T1091

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Lateral Movement

Replication Through Removable Media

1
T1091

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7-zip32.dll
    Filesize

    5.1MB

    MD5

    1f13a78f3dc7e33f3eb03a35e404a8e6

    SHA1

    9cdbb1e6dcc0c736f27f065e99af0036d90bcc87

    SHA256

    061faebe786dc0e486997d96f4815ecef9312b68fe94418fd9f61b31a16229d6

    SHA512

    0cc30cf05af7d6fb8bbe8395c28d5f5a5c56d5433798c24f8b5279d177c0049d60c779da3d22285ee378cb005fd95d0202a8ec506a1d181c91eeebb18c20e012

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416
    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
    Filesize

    330B

    MD5

    5377774f6462350b5ade15252a02dc36

    SHA1

    de19ab399cefcf349c3f9443ce24e584fb9aadbc

    SHA256

    7256dac6a7a0f1e951100c4fa70e58297b292d3f52d6a1c2fbde90016aff333d

    SHA512

    169929290eae60d602b06f675d3f2a62dfa33e8bf138ccb8df860c9e1cac3c450ecff94ba98b8cd8df95b571603a6f7d8d21e2866c684ab04b213dab9e47fdde

  • memory/720-3521-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/720-1-0x00000000001E0000-0x00000000001F0000-memory.dmp
    Filesize

    64KB

  • memory/720-850-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/720-2375-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/720-2644-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/720-0-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/720-4512-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/720-4830-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/720-4831-0x0000000000060000-0x0000000000062000-memory.dmp
    Filesize

    8KB

  • memory/720-4838-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/720-4839-0x0000000000401000-0x00000000010B5000-memory.dmp
    Filesize

    12.7MB

  • memory/720-4840-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/720-4841-0x0000000000401000-0x00000000010B5000-memory.dmp
    Filesize

    12.7MB