Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 08:24

General

  • Target

    2024-05-21_04ea36428f34a1b14107432694d4898a_cobalt-strike_cobaltstrike.exe

  • Size

    5.5MB

  • MD5

    04ea36428f34a1b14107432694d4898a

  • SHA1

    da85edba1d091d9901dd685784e57dfa1da561cf

  • SHA256

    c0c38cccb23c23f613fc87c4e5bbf1a887dc5ce4c1e0569bb13b355ffafd4aba

  • SHA512

    e3481e95c362ee8f4749c9b489911699b01404745dd45dcde23c9d3ed5aaa276f27e569400523fb5fbf0419ab2d00780d8f41d5a8b8435ead65853ce513917cc

  • SSDEEP

    98304:SW1qiPgxn+cuSuxx8Svt73qq36IdKtVxNw6pUkp3bkbRxoUR:53EnsxxDt73DdKrwapwbnR

Malware Config

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Reflective DLL injection artifacts 1 IoCs
  • Detects executables containing URLs to raw contents of a Github gist 9 IoCs
  • UPX dump on OEP (original entry point) 11 IoCs
  • XMRig Miner payload 9 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops desktop.ini file(s) 9 IoCs
  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 7 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-21_04ea36428f34a1b14107432694d4898a_cobalt-strike_cobaltstrike.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-21_04ea36428f34a1b14107432694d4898a_cobalt-strike_cobaltstrike.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • Modifies Internet Explorer start page
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:2940

Network

MITRE ATT&CK Matrix ATT&CK v13

Initial Access

Replication Through Removable Media

1
T1091

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Lateral Movement

Replication Through Removable Media

1
T1091

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7-zip32.dll.exe
    Filesize

    5.8MB

    MD5

    e4ae188b10747b0d0b07e5fe20dbdfc6

    SHA1

    51598c9fff6875cbeec686fb633ae7bd17db78ce

    SHA256

    5c57601a8780f50c23b1b153396d2fde634f308c28f5733c5a4b1b83b27964ca

    SHA512

    5ac5314281fbe5d6160ad39a8ebc63a24445495c126affb08205b66b4b91ab4d950df2ad56f81cb4d49e5ce5d693f1dbe9ba3bf855462541c5e3d8c543174bf7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416
    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
    Filesize

    230B

    MD5

    6e8b87ef555e0210b86115ac041c79a4

    SHA1

    056fc59d52397659bfde8cb581562ee5daa76f83

    SHA256

    ea98f6dcb85bd4f63b25c54f460a301c0a89c3c492f5af7e56bd0355512848d6

    SHA512

    1e3ec46e4fd13db69d01ea80018fc8c8e9e3eb77f92820c033d7e414124b94396920ae439eb8e28127099e62e0bb4dd98b2410f31940a17ee2e0a4de521612b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    c5b6d796d8ac7249bc5d19fdd15c7958

    SHA1

    e75865d93e23a6781ed35f5e2ecf604d06dd3103

    SHA256

    ee1208ed19a9b4e846ccfeebe5e747dcf05236c7920ed7d689e07ad7743f6089

    SHA512

    f44538a0622f403ea1e8e05ca5f77669ad3dd0aa2747eddb50a038d318038fb0203a6cb842b63a709dc97dd36fb8454babc6278d84aba32883d72ea9fa3276e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    2698081654209f99981f9dbd4ba45a12

    SHA1

    114eccda92bb44320220871f2066cd8468b87c6c

    SHA256

    345734d433b6c5bfea6bb876ab8c9bbd3dad53380ec06836a6639d24f7de76dd

    SHA512

    ad6bdd6ff6d5d13f103f695e23e898de123247436bb373d0df5b64414fed7e9728f178d223bc8c9d118d000bcee244bf430a95654e46e38757ae06e93a9a9424

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    bc19f5a961cda72907e400f1ec677de2

    SHA1

    1a7df0c5e8a5b389f3965f84af433d8437d00bda

    SHA256

    14e4bf8e37ac485c06e0dd3678a5be523533ca0de44f405fe408870ce2186151

    SHA512

    b9de53dab8462f797a97478ff64bbe0748de2337087c15bb285d6df8eea7dc804e091d7f9c51b3398d41b8f9c63e862209858810e418ab4716a4d1745eb474db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    d49171a3f25041d6b5979b0417f5cb42

    SHA1

    4a7f6cd82f4d21a02c61a32140bb0851308c2f56

    SHA256

    841f97aa3a33b1bcaa9c574f5bb0414eb429f08b2ab3badc8653cfbac0ba781b

    SHA512

    5f280b4b879196edaf532e06b9aedcfdc3652b444c80dffae84641886e650926d3c62c43e17d6461ad83301259557389571c1b8c2df5f9abbdecc5d1d707c3f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    89550a753b769fd84ea0f45110b7eb94

    SHA1

    2fe6333685b058a3a4996ceca0e71efce28bc312

    SHA256

    f31d669e3b58fb9a8e8e81ab926e3eeedd4cdc9c9a229b50082916507b5b9ff8

    SHA512

    6e310b4cdfcb3433816d4b1f15bc7884930df0a39245468af7efcff47a8110f4862df562676d7b48eeaf98f667f7cb3923b3ba415f3739753e73da61a52ed75c

  • C:\Users\Admin\AppData\Local\Temp\Cab119E.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Cab12BC.tmp
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar11D1.tmp
    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\Tar12F0.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/2940-900-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/2940-4525-0x00000000002C0000-0x00000000002C1000-memory.dmp
    Filesize

    4KB

  • memory/2940-1-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/2940-913-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/2940-2573-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/2940-3593-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/2940-4364-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/2940-4519-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/2940-4524-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB

  • memory/2940-0-0x00000000002E0000-0x00000000002F0000-memory.dmp
    Filesize

    64KB

  • memory/2940-4526-0x00000000002D0000-0x00000000002D1000-memory.dmp
    Filesize

    4KB

  • memory/2940-4527-0x00000000002F0000-0x0000000000300000-memory.dmp
    Filesize

    64KB

  • memory/2940-4528-0x0000000000300000-0x0000000000400000-memory.dmp
    Filesize

    1024KB

  • memory/2940-4529-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/2940-4530-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/2940-4531-0x00000000046B0000-0x00000000046B1000-memory.dmp
    Filesize

    4KB

  • memory/2940-4534-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB