Analysis

  • max time kernel
    131s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-05-2024 10:29

General

  • Target

    2024-05-21_c7912766a959b8f4b207a465528eb394_cobalt-strike_cobaltstrike_xmrig.exe

  • Size

    10.7MB

  • MD5

    c7912766a959b8f4b207a465528eb394

  • SHA1

    b2cb37e7d5e77a6916f509360030f73de8a0cd21

  • SHA256

    96bc045f03acd5ab614adb27946a86268c6b9d7e6dc9d0a2fcbe3de74523148f

  • SHA512

    fe3c0e666e6e995dbd02ad6ae6cd5e39647b1e619ee737b40b0b0c4e476f71e081d7f3e0f8f03713cbd974bc7f45ba6dc1e550c147b4e861d509e3f1915e87c5

  • SSDEEP

    196608:dvg6YpjCa8BMHwNuD7PKUNwabNJvmrMQwHEFoW79:dYXpkG6uDBuQjmrOHy

Malware Config

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Reflective DLL injection artifacts 1 IoCs
  • Detects executables containing URLs to raw contents of a Github gist 7 IoCs
  • XMRig Miner payload 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 5 IoCs
  • Modifies system certificate store 2 TTPs 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-21_c7912766a959b8f4b207a465528eb394_cobalt-strike_cobaltstrike_xmrig.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-21_c7912766a959b8f4b207a465528eb394_cobalt-strike_cobaltstrike_xmrig.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies Internet Explorer start page
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:2816

Network

MITRE ATT&CK Matrix ATT&CK v13

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

3
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Lateral Movement

Replication Through Removable Media

1
T1091

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7-zip32.dll
    Filesize

    10.9MB

    MD5

    9df06af52035adc8dad41ae683840994

    SHA1

    88f67b04f7671fc5df2a0e80ce6850b4270b0fc7

    SHA256

    fbc781a67fe15dac1f0468cbac1fdbf4b43d06aba50bc8133c73cdf5a7de4a4e

    SHA512

    2972a8f7f26cf98165cac820a54d109e3c9e970c772d14e178a80f378f2dbfe735a379acbaf2671289d5ea987e0da3814f9f8ce448711a9a2e37450a59ddc2fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416
    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
    Filesize

    230B

    MD5

    31c223e5bda213667960ce679da4d98b

    SHA1

    5a44ab6fe48cc8d4c7e52343b91c8049078250a1

    SHA256

    cf2f30703505bcb01a62fa986ad33d4be55006c235173a9a48d41e29d4744a1a

    SHA512

    a36275bb669989e4dfaaeb81d6e526ee47dda80a0f3a6c2d1730b355efd128257ff5a4b4cd819ce08ac14d799bc6d77f7eecfde9482160bb3eb3d2605174cbff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
    Filesize

    330B

    MD5

    4e58a9a656ef30ca629f03a03d3f08b7

    SHA1

    0683d9e1dbc93e60d8a5fd79c1299e6d2f37711a

    SHA256

    bef8a8ab47ef4e3d3cfc843dddba7c1c20a314da324dc239c411ffb961ecb908

    SHA512

    02c4a1942a9064c516f94b1b178e960ea8f71d6fe5d10ae6624fcf0578f178799eb8322338a362cf8e9f462e85229c3c66d2a214c046dabe86d90f2567f4a04f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
    Filesize

    330B

    MD5

    c5a0b6683fb87ce09e32c6eb15ffbf3c

    SHA1

    3fe610f978269bca8120a40fcde227bd705d6634

    SHA256

    9f8ff68da1029bf717cad2356d601d3048f171b6b5a8cc39ec9460fe7ce4835a

    SHA512

    4865ab35c74e6d69e9029f3518080add5bb579b178294cfcf5a77c512cf3cb1b38431f66e9ee1025152e7bd3dfc83146f5f35b300d6a204b51b538dfa7485c93

  • memory/2816-544-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/2816-0-0x00000000001F0000-0x0000000000200000-memory.dmp
    Filesize

    64KB

  • memory/2816-1319-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/2816-2025-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/2816-2257-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/2816-2293-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/2816-2294-0x0000000000060000-0x0000000000062000-memory.dmp
    Filesize

    8KB

  • memory/2816-2297-0x0000000005700000-0x0000000005701000-memory.dmp
    Filesize

    4KB

  • memory/2816-2298-0x0000000000401000-0x0000000000A18000-memory.dmp
    Filesize

    6.1MB

  • memory/2816-2299-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB