Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 10:42

General

  • Target

    2024-05-22_899f70d5ef318e6c2173e30cae312b74_cobalt-strike_cobaltstrike_xmrig.exe

  • Size

    11.1MB

  • MD5

    899f70d5ef318e6c2173e30cae312b74

  • SHA1

    4da4ea46e96c984b533f112235b719a1265d4903

  • SHA256

    34458cfaed3533352e08db79c36d76c29f6be7e37cd478262cf1be8286cc420d

  • SHA512

    b107071f724085d7e90ac99a89a2b512fa4ac2a63dc4cad269879ea27aaa78c52ad0db4ed0b7fbcdd42793b63509c3370524a607dbf8c52b186cfcf7b4366f83

  • SSDEEP

    196608:m2XrSIqtPazmgL7uDbzV0xpZr8o37nmPQLi7gCsLd9:maWIPyquDCzzmPfgCE

Malware Config

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Reflective DLL injection artifacts 1 IoCs
  • Detects executables containing URLs to raw contents of a Github gist 7 IoCs
  • XMRig Miner payload 7 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 5 IoCs
  • Modifies system certificate store 2 TTPs 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-22_899f70d5ef318e6c2173e30cae312b74_cobalt-strike_cobaltstrike_xmrig.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-22_899f70d5ef318e6c2173e30cae312b74_cobalt-strike_cobaltstrike_xmrig.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • Modifies Internet Explorer start page
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:4664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7z.dll
    Filesize

    11.3MB

    MD5

    e0a1cd9365c5ea7fce17ed4d9b6f9cff

    SHA1

    6164fa97b8ee5f52d3c2267d4ffd30f7a7683565

    SHA256

    7419e013b0b2f6ea4189438a9a2142e4503714d6aeeb09d39c86d31a7c39442e

    SHA512

    4bb3ffcccd496016c2bd9ad73abe5985d42d3e4b47bd528382a70185b7c78f296d39888fb2007dfaf1eb2ab189e03c3bcb87ff62b040b389ba7834dee98a1995

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
    Filesize

    330B

    MD5

    d3bc02444ac91f40c61cb0c655f3bc3b

    SHA1

    e377ce79aacbf044c93744a3ce2cd849d80dff4e

    SHA256

    081d7421a08ced85cd0abfb392ea22aa412406f37787bc75cac9b363fbc1ed23

    SHA512

    630d76f25467f5793c9b72d24ad0ddbca00a8d4c967b47292288b7082a8eefac8c219566e63fdb7b1189a2b924c2ca3d9b51b9637b1e744edce8eca55e8b4261

  • memory/4664-0-0x00000000001F0000-0x0000000000200000-memory.dmp
    Filesize

    64KB

  • memory/4664-448-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/4664-1334-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/4664-1967-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/4664-2187-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/4664-2200-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/4664-2205-0x0000000000060000-0x0000000000062000-memory.dmp
    Filesize

    8KB

  • memory/4664-2208-0x0000000000401000-0x0000000000A18000-memory.dmp
    Filesize

    6.1MB

  • memory/4664-2209-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB