Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 05:21

General

  • Target

    2024-05-21_c1d129530d87fb97b08b0632a9f080cb_cobalt-strike_cobaltstrike_xmrig.exe

  • Size

    12.8MB

  • MD5

    c1d129530d87fb97b08b0632a9f080cb

  • SHA1

    5d0b9567dc5b4f32a308c6b33091d6a08fb1c35f

  • SHA256

    fc1432f13e331a7b24963ca2e24276aefc6c9bbfcee4370122a0e357314dfd74

  • SHA512

    82f8bc334562cba476e94ae42c51197f1cedb29791a5f75015f40741bcd1b12c16f37213fbabd680d867f33563db9a6c546c313e8d2059c940ea59dc6c83598c

  • SSDEEP

    196608:u2XrSIqtPazmgL7uDbzVXUHXUXEOZmPOEDkfsLKi:uaWIPyquDBZtmPfkfe

Malware Config

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Reflective DLL injection artifacts 1 IoCs
  • Detects executables containing URLs to raw contents of a Github gist 7 IoCs
  • XMRig Miner payload 7 IoCs
  • Drops desktop.ini file(s) 11 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 5 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-21_c1d129530d87fb97b08b0632a9f080cb_cobalt-strike_cobaltstrike_xmrig.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-21_c1d129530d87fb97b08b0632a9f080cb_cobalt-strike_cobaltstrike_xmrig.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • Modifies Internet Explorer start page
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:2364

Network

MITRE ATT&CK Matrix ATT&CK v13

Initial Access

Replication Through Removable Media

1
T1091

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Lateral Movement

Replication Through Removable Media

1
T1091

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.msi.exe
    Filesize

    13.0MB

    MD5

    b02f6cd28c1d56c4a67b71c3e76cb3cf

    SHA1

    53ad8eac77ecdbfe97d503ac1458da9989f52736

    SHA256

    75a078032ec0f00907eb9905aedb2e7be843ebc9b2c09c72d7c76f4be82d39f6

    SHA512

    971d103b77647bfaece25aaa1836d9ed5a593ad75e3377abea792b31b6170adca8ed3c1b0d4524a39e1b9f2781c8d6ab1451841c27f90f9e5733cd9e97f9eaa0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416
    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
    Filesize

    230B

    MD5

    ee3c9b7c0507776eb670f2a018241982

    SHA1

    159701136bc7b3ebf337a9bdfabe7410d6c64a5f

    SHA256

    29e2efb4321eb9bb9e2c1e4b3af608f777caf9264cd769a5c4adeddac1d7bdf0

    SHA512

    57d4c6a57551be1eeadf78ed6d489f232957a489b7c5f92ca010f5376b6b5d044a3b06375888acedbe6a879400faac1591df4af700231cf99145aa506cea63ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    cadadd7d0090faeca8ff41b3a72eb203

    SHA1

    0e09b7524c6460dfb686e0b3bfd29aaf574116f4

    SHA256

    e604c7faf738a5927883d7ce6d0b0e0a2841d30949d7b08da1d7730ff5b3600a

    SHA512

    14236cf40f1da3f253d9ab857f7b83469a4a27c3afbbbb4bee7ada428aed4431d66fc610bababaf45b2a9a93ee837ebc413cd219e2165ba01aedbd4a86c5ce88

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    294110cb3c5dad86399fbaaf293030cc

    SHA1

    5b409c8ca276b596943fb30838210323623db357

    SHA256

    3aca0f6d7e09eab3519c5ad698a940f61bfa15a7c510678e2306ecd5dfa10c7d

    SHA512

    0e477343b693133c12ef602143ad8e2d890bd24982f013a425c50e549ac3867d8a45e611a24d0f891023b7d1bebf4aa61edff928aa81376b2b9d4b6d0e78a697

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    4a713834d0ee7b8138544aa462faa7cd

    SHA1

    752cd11263d59a0b1b10bced7fbb7493f3b8369f

    SHA256

    dc353d4b8afbe82299fa0f3e180761d94787c9b68e4a4b4b8b55d89311d97b37

    SHA512

    7be810298c95796e6f1585394e8645e6f7e91b561962a9c6c2fc6265acde795ec48447ce3cd950649cfb8aea41576234e9697945a79603ff1058521cd45ec94a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    f922d31cf89c65930a23a6509ee81fe8

    SHA1

    ad73c67297636f1f006226986e729cea8b8bbf7c

    SHA256

    8eca7ef65a9399d09cf02d03b56ddd607ea33ce46601f9fc532e062b18fac4cf

    SHA512

    a7751721b8dbb0175ca2b814784b00a7e135885c2bdccb912162a504823478a0bb888885ba19b97f1a454b7290d1cd19bcbe9244affeb67a0777bdbae734690c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    da5799211277d5b227537ce105c53721

    SHA1

    8b3038e059bb2b78e58a37ce8607202900fa64a6

    SHA256

    8b2c957888f5cb3758f62043462a5c3e4ce90787b5a93babaa7b74d8535355bb

    SHA512

    52d26e2d0c079f5c791ad400f23bed15aa8939f3e5e118abf420f3268de6a88cacf3ee03ad1894d63680a69a9a9d49ca8d5e60229f2739d96d0545f277f51822

  • C:\Users\Admin\AppData\Local\Temp\CabEB2.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarFF1.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/2364-819-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/2364-0-0x00000000002E0000-0x00000000002F0000-memory.dmp
    Filesize

    64KB

  • memory/2364-1331-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/2364-2071-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/2364-2832-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/2364-3350-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/2364-3380-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB

  • memory/2364-3381-0x00000000002C0000-0x00000000002C1000-memory.dmp
    Filesize

    4KB

  • memory/2364-3382-0x00000000002D0000-0x00000000002D1000-memory.dmp
    Filesize

    4KB

  • memory/2364-3384-0x0000000000370000-0x0000000000380000-memory.dmp
    Filesize

    64KB

  • memory/2364-3385-0x0000000000380000-0x00000000003C0000-memory.dmp
    Filesize

    256KB

  • memory/2364-3386-0x00000000003C0000-0x00000000003E2000-memory.dmp
    Filesize

    136KB

  • memory/2364-3387-0x00000000003F0000-0x0000000000400000-memory.dmp
    Filesize

    64KB

  • memory/2364-3389-0x0000000000401000-0x0000000000A18000-memory.dmp
    Filesize

    6.1MB

  • memory/2364-3388-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB