Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 06:51

General

  • Target

    2024-05-22_db948bf79eee358f0b06d053c2fcc8d8_cobalt-strike_cobaltstrike_xmrig.exe

  • Size

    11.3MB

  • MD5

    db948bf79eee358f0b06d053c2fcc8d8

  • SHA1

    937fcf2f948a2c60b26261b977decd4de6a1d519

  • SHA256

    3b64451c46949a8fe1c19607b7f6f00b343da515bb4efd6489be4e41fb4fc34d

  • SHA512

    260ccfe03839bf7fe179bb4e5b5f90d50f45c93f88fe95d1ca81357430e9fe99fa333c762d300a4b5e5164570e563878580af7656e95aee4c47e5e6b369e50cc

  • SSDEEP

    196608:dvg6YpjCa8BMHwNuD7PKUNwabNJvmrMQwHEFoW+F:dYXpkG6uDBuQjmrOHh

Malware Config

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Reflective DLL injection artifacts 1 IoCs
  • Detects executables containing URLs to raw contents of a Github gist 7 IoCs
  • XMRig Miner payload 7 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Modifies system certificate store 2 TTPs 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-22_db948bf79eee358f0b06d053c2fcc8d8_cobalt-strike_cobaltstrike_xmrig.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-22_db948bf79eee358f0b06d053c2fcc8d8_cobalt-strike_cobaltstrike_xmrig.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:3000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7-zip32.dll.exe
    Filesize

    11.6MB

    MD5

    54a566035bd9d758b6d4fc736b3e76c9

    SHA1

    258a966cfac6f27c8d2254eaaf935578f5f4831c

    SHA256

    3bf2e8aaf7c157ed702a5d386c1097dc7c2bc7386491a3fff3f738fe4a0ca3e0

    SHA512

    5c139849a8254ba654c89698c5f2115ecc15460aebe1ea760d3f39d9beb99a9ddb4a4649673c83f5c695ac9e6c41045812d394a15e7f2d5037fb9f58a30f1fea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416
    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
    Filesize

    230B

    MD5

    bf03ac62a2f509aad21d4f854346d942

    SHA1

    af1febb119279fe60fb98f9ee2193285aec46178

    SHA256

    37d1b3496777506dee2082355d86185071656884937bfa970de816141a50bcdf

    SHA512

    75ed4cc36e425a4cf229edd972a793a4912197ad7b722fb67777e23582557ccce5741d7141a5517541911fab51f44a58ab5a0bc4ecfd3fd489816f30229a3ce3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    d8a949dc67fb005e0ac290a647eecde6

    SHA1

    729b0e1c35bf87aeb6d4b0910368dc34bad3bf8c

    SHA256

    c3593081b38884a9f240d350981262505879b3c210ae521434eb05daa4e96167

    SHA512

    6a4e8c613d47d016a8daa8bc4388668fcb0544a34447dcb0d5077ce4cdafd9b5919ba25185f0ff8b6319002f886dfbd93c8e44e0be1713577b66cd46080674bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    52d76c20b74816b7a522c46781c87c3e

    SHA1

    adbb1ef83e0fd4f7035504e1b7a4e6fc0b62ea41

    SHA256

    85ec12285f09114e9b8bba77efb7e616916cb4aff1673627f351f2078db5898a

    SHA512

    ef0005f8ae2fd7cb3de561bf4403cffeecb5068cec91c1047c5effaf13c2975aa409f16ef43935f0819acfc05c98189862467e314daff7514813e36154205b18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    6c3933b646ad7415460d19040060aeb7

    SHA1

    2372ca1858aa7c108dad8aad690a9d36e3f9909f

    SHA256

    82bbcb6a22a8c99c73c25c5ba058193a2f2fce75be2ebfd59a76c0527ea05c32

    SHA512

    e8c1c11f2438db1382397313b83e4f81df3a89c4fa8a36857053ae904e4b696f35086954c2eb0ac5e751112b77c8e5b69735c59e8a0978c14b11108f1208f680

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    35186392567979546c8f3d8db49cc8c4

    SHA1

    a93596314cf02511a4c19d1a234f80e3ce39f5ee

    SHA256

    35e652ac049168088c3641f9dc59b6ec21ddf43dcb91acb88dbc6960ff8f1632

    SHA512

    4fbafaa4bf832b0ee05be4dbae60efa3a1ce8806987b1a2186b089901d86b3f15a3f1b7fe2594bfc30e40e8d28eaa0c57226b383fa89bd7022d73548244f6040

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    843aca707abcfabe0bd0d687df302f78

    SHA1

    d98f39c8e130fd184ab94e1c5552d120d50784b3

    SHA256

    1ef2a707595d25f93e8c42d217bd3a67c43995a939ee62a1ed33288531086c58

    SHA512

    7613a7f606a0cb6e3d14030d346c7cda2b4d6a3c0d38b8c9d775c135c30b76ac18c2e7f0db3756bfa0c2e3f30bf640516f368bb515fe0834b8a42520c120dc49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    9d94d234c83d3e9d902029d440848d7d

    SHA1

    ce3ff8ab641bb6a3d76a992a4b5c944b778a885d

    SHA256

    2cec16b4a06a66ad305f5992a924f8d98665260a491774eada3ce3ebbc51847a

    SHA512

    34a19ed97b94731fa17a687b1a8c736dcfff09d4f511376f5550ac8a9634f12a5ec91f12e52087f381c1f52698088c01e57834424d7a95e06d47668fb034b406

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a4f4218a2962217d7dc1e9e70e4034be

    SHA1

    8509263b25669048a0e3456cae3d7b243a2d8720

    SHA256

    2c7ea300ad863f8c9642453446db4ac8fa43c7f4082041e2118b763fdc458fd1

    SHA512

    78433cf692d55032c1a7ad9d2dc6472aa2fcc4fe24d41a5a213f7afded4e86f5de9addd721d0a6d2d1f6648009075e0538bf19ec31570f4c377f17671e3ed7c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    621eec6807a783933444794c781aedd6

    SHA1

    4a14ed2287d137737d164a12fa4136b194896253

    SHA256

    8cb8bc01fc3088757a9012f5ce2de8d59ca57de091ee162980e1d26f83dffaf8

    SHA512

    e905c3bcde40cd2610de574621fd86a38d6ba85c580eb3e7094b3bea90422e49dc010b30ba18de81b24008c9bc4ed96d04595650c1c99a95afe60426547d71e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    65b53d041f32648de3c82af06596c295

    SHA1

    61dab7e70af16427b9d1c1f8a7c6ef8724cbe3ce

    SHA256

    9c1b1a0c3077080c09414087023114a8974bda18cc744afabf6d29bfc0e2be71

    SHA512

    08bddbc4010c0181e7a13dd90bd50009800bd7390ed5a7819aa913eb59097ca29e950743a6397025062b4ef5372d32ecedb86a8d070198490a837b5931f3ac74

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    e1f92fecba44c279a1636140ba59b3f2

    SHA1

    54579767b9c446d18a3b9ea1572ddc774373b9ab

    SHA256

    01026b1edfe95818c73a086328272ada9af8970a6d16235827cc1d1cf675ec2f

    SHA512

    145194da2818c9a46f4df2c85992e0ebb2d81a06bae2ecb6f11383ebf68fc98d3a05eb540bcd46f92e17908169d55d7b659e8d24d83f3e306d5981a03e88369c

  • C:\Users\Admin\AppData\Local\Temp\Tar2B1D.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/3000-1507-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/3000-0-0x00000000003E0000-0x00000000003F0000-memory.dmp
    Filesize

    64KB

  • memory/3000-2188-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/3000-3144-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/3000-3911-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/3000-4798-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/3000-4915-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB

  • memory/3000-4918-0x00000000002C0000-0x00000000003C0000-memory.dmp
    Filesize

    1024KB

  • memory/3000-4919-0x00000000003C0000-0x00000000003C1000-memory.dmp
    Filesize

    4KB

  • memory/3000-4920-0x00000000003D0000-0x00000000003D1000-memory.dmp
    Filesize

    4KB

  • memory/3000-4921-0x00000000003F0000-0x0000000000400000-memory.dmp
    Filesize

    64KB

  • memory/3000-4924-0x0000000004990000-0x0000000004991000-memory.dmp
    Filesize

    4KB

  • memory/3000-4926-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB