Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 01:26

General

  • Target

    2024-05-22_07ca8b7a8462cf263b1b4189cc18cdf6_cobalt-strike_cobaltstrike_xmrig.exe

  • Size

    10.6MB

  • MD5

    07ca8b7a8462cf263b1b4189cc18cdf6

  • SHA1

    c8e15653f4c4eead32d54586632651c27c609c1e

  • SHA256

    7f28018c3f6727670ae7c0535b9e1039d52bdd32e950bc789609c95d81b3f6a8

  • SHA512

    83b63ae20eb99491d2f1b31036a6aa4e8a2032b8469db31922ffa6fefae3c6c131aed378ef251fc69aee27a1d13a2e9ebd10e4a9a936d7dd8eae02d392d6c326

  • SSDEEP

    196608:dvg6YpjCa8BMHwNuD7PKUNwabNJvmrMQwHEFoWcY:dYXpkG6uDBuQjmrOHO

Malware Config

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Reflective DLL injection artifacts 1 IoCs
  • Detects executables containing URLs to raw contents of a Github gist 7 IoCs
  • XMRig Miner payload 7 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Modifies system certificate store 2 TTPs 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-22_07ca8b7a8462cf263b1b4189cc18cdf6_cobalt-strike_cobaltstrike_xmrig.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-22_07ca8b7a8462cf263b1b4189cc18cdf6_cobalt-strike_cobaltstrike_xmrig.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:1596

Network

MITRE ATT&CK Matrix ATT&CK v13

Initial Access

Replication Through Removable Media

1
T1091

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Lateral Movement

Replication Through Removable Media

1
T1091

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7-zip32.dll.exe
    Filesize

    10.8MB

    MD5

    15da1ef48ed8815753589c9fcad752ff

    SHA1

    a6dac4dd3468cfaccc3835e8fe9733f215dabe3f

    SHA256

    fd255d3f613605bf76f7a208b20021261ff4a851064ae841442a8acb7a894ef6

    SHA512

    695688e6d54130eab5bdb25504c25f10885bedf1b118116d9b06e87be96f42ce13d39f517e5ba587c553e0744cff74a4fdcbedbeee8bba964578db8062d4e9fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416
    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
    Filesize

    230B

    MD5

    9a15e4d267e4983d82ada56e8f26fe38

    SHA1

    4b4cf579ce49356918debfb4ea8df60709f4fd7b

    SHA256

    ba129637803a56b77496daa64dcc244528c5a200b3650e4ed09b71286f8b4799

    SHA512

    586405ee699dc35ecf7e538021e35f2c8ddae80247f7af2e75c8f617688f231b212f5ec9db237de8f9d4f4e4d29c6e4be04c7575fd17122dbe1a782879933dee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    52c5638162018f1a667b26effed89aae

    SHA1

    e025fe5d4ce628338926d60d81d113afd7a172f9

    SHA256

    4db9e921ac9604df5f1d35350e501df63cc16d0cef3dbfdc44319eb373966eac

    SHA512

    340cf571dae65c6daf9594e81bcfd908eea2aedeab4c745e2dcf452c0a866add972eeb683c53bbb992bc190fba101560f63e92a218093985d54dc6ab6987bf46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    241ab9ddb147bb3dccb0982e721bad94

    SHA1

    026b0b5e397261e9ebf6fe450cad1750fcd2912b

    SHA256

    518bbf2872314c9703c9103d60c97091ebb0f6c3a9f39072f90631c3f979a9e9

    SHA512

    90c9ab034af4b9a77c5e3b76e89f88f5c92593ab8fe82e14637cbfb22da9a15cb2c004b235a5b3056caff7eb8d665928962c814c08d13210876ea88b444dc3e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    8fac0f66bd99df7f1837ffc9916c092b

    SHA1

    f10e1fa999e5b6328ec4ca8647bd661b9916d805

    SHA256

    661314ea8a8496bea8e1e2bbf58043e1517e5be486d54f84310f72b99f9cc242

    SHA512

    301a4ce7fc0e02d361bd693b4965048fcc86a2282203ab0206a3e2241de278d42550b8ab3a4e71b6d7c1e7d4ef6cc765bbd88a46a316122aa41668c4f4c90109

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    de8bc6a53889eb08c6ec2217cad9c982

    SHA1

    7e08a1ee41c5bd8f7f933e02fb535d404f2ed7ad

    SHA256

    0abad2017f29c07da7ef89c0ad175996049220c348cdc732857b48be8e03905c

    SHA512

    bb7805651c818ad68a12e1203d9a8e31f249763420547de25ae9a96868f68687afa56b5e4f41ee4ca2f4318a9aa91905b38d116d115cf85668a9db0229c2956a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    d4e8bdbc019390544b91939c28517b7c

    SHA1

    28490b55dde74555b5c51f59e6940b05c0c330c9

    SHA256

    002ec7a2afbb03efc7d9f84db1dad8d1f9c7453413e3eec9681e7d6ac3e210c3

    SHA512

    7d692fc540de17f39958b2f15099351f0b19f91b4da23c5b61418fd8c99840c8f52106ee33324b0b388b5b2ddcadfeac3930d96cfa90b5e072291f2950fc56c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    dae233660013c8cf866db86bbb54dc49

    SHA1

    2f516a1e60fea1eed1f6165ba9f600e965ae041a

    SHA256

    27bfdc829e90f60a106126c8376cf3a47077b15cbc493050d2e90e2b16cfe82a

    SHA512

    75008585366899ea152279cca1ac13bd0e34e5373826cac0c53c91b70450aba3bd04e57aacdbc63130a4b2bb48e35271ef51de578e6e1426b0d132afa3b93b5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    e45f1560407c4b0e2f6a99f35dbe2355

    SHA1

    07af40a53c39b41fb577dcf559c26a67c304adc8

    SHA256

    f0dc40c1a0c9f0a57ec01f73c494a32363ee4e5d42627338a9f70c1541df6274

    SHA512

    337011cd9a9d5757e14dde11a4185194abb94cfee22180ced363ab0ceac1eb458955163ab0c43e037f594097fb04ef8f702cbd48f06c858854bcb563bccdb4e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    915ab93ed2f68476c2646ba3ec8a47fe

    SHA1

    7dbf43f75e34d69df82c0105de2d8da4393f60fc

    SHA256

    fb0de5e743f982279426e8a065f7382a00c537a8bf327b0df0a9e67848fc70a7

    SHA512

    c4e5e68d022fa6eb3cc204e2737580ad8ef21d46ae0b789070e6f8b03d1a7ac6fd667ad677f9b1c390bac33016700638ab1cfa6682d41021176d1cc0a6f8bc86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    401670ac59e4d606f8b645ab0c611ea8

    SHA1

    2855a51f4a568097782028df67ebaa5ad103c156

    SHA256

    83034c3ee84f24003f73d79b3fe637e113f03c480512a52c9aaaf48074be1244

    SHA512

    7ac3dd14eedc60f6fd7fa4f34659ca63ae069f78e8293f3a4eebbdbef0788db6ceda7bf107cfbc8ec232db4975f1b9c6d7933c3e86707f2e6c5e13b790c0046f

  • C:\Users\Admin\AppData\Local\Temp\Cab2158.tmp
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar2199.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/1596-2684-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/1596-1115-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/1596-1936-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/1596-0-0x00000000003E0000-0x00000000003F0000-memory.dmp
    Filesize

    64KB

  • memory/1596-3505-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/1596-3674-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/1596-3720-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB

  • memory/1596-3722-0x00000000003C0000-0x00000000003C1000-memory.dmp
    Filesize

    4KB

  • memory/1596-3723-0x00000000003D0000-0x00000000003D1000-memory.dmp
    Filesize

    4KB

  • memory/1596-3724-0x00000000003F0000-0x0000000000400000-memory.dmp
    Filesize

    64KB

  • memory/1596-3725-0x0000000004680000-0x0000000004681000-memory.dmp
    Filesize

    4KB

  • memory/1596-3727-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB