Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 13:54

General

  • Target

    2024-05-23_4ead4120cb8942537450505c291cd308_cobalt-strike_cobaltstrike_xmrig.exe

  • Size

    11.3MB

  • MD5

    4ead4120cb8942537450505c291cd308

  • SHA1

    e9ed9d43fecee6be41b941f86b8d216c646d0653

  • SHA256

    b5a2ccff16b7a67d416f355d1fda783494cc2edbfa47ca51a7c9d5ee910d096f

  • SHA512

    dfad13eb882be49020c68f8ef7d7bb187cd5cdbdb193f8e843e8f10d1a1fcb5bc18dab86eff6a71501d2cae997f59e87d9a8bf4c910d7d39bef8d5c6913a6a57

  • SSDEEP

    196608:dvg6YpjCa8BMHwNuD7PKUNwabNJvmrMQwHEFoWXB:dYXpkG6uDBuQjmrOHC

Malware Config

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Reflective DLL injection artifacts 1 IoCs
  • Detects executables containing URLs to raw contents of a Github gist 7 IoCs
  • XMRig Miner payload 7 IoCs
  • Drops desktop.ini file(s) 9 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-23_4ead4120cb8942537450505c291cd308_cobalt-strike_cobaltstrike_xmrig.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-23_4ead4120cb8942537450505c291cd308_cobalt-strike_cobaltstrike_xmrig.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • Modifies Internet Explorer start page
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:2392

Network

MITRE ATT&CK Matrix ATT&CK v13

Initial Access

Replication Through Removable Media

1
T1091

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Lateral Movement

Replication Through Removable Media

1
T1091

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7-zip32.dll.exe
    Filesize

    11.6MB

    MD5

    286cb9b2e73c98b95583c119eed51417

    SHA1

    7058df92fdbdbb45e3a3c2a83ecaa706e7d113a8

    SHA256

    3fb549d29fd88658fa50c753b0aa14970da61f52004b42a6ba2291db9cd97c5d

    SHA512

    66355d1d0782e307ec8b2cecabe4a57026bb7f601d99848e582cc6fa8c7e287b15f01f081db771e09807cb0e34a97b5feab5bacc981266c9092b18fc71138e39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416
    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
    Filesize

    230B

    MD5

    ff17f9b97f49fde562d927e9a7c743f7

    SHA1

    664960025f13340ce570316c9f473ecc3086f645

    SHA256

    3c678f19e619b6972445a4f8ea49bcf45f0597e9b7ca874cf448ba65576e3988

    SHA512

    58caa0fbd1c6592e38d9e40701331c7f37d06ae0cf1887272c3858ccefc9cbb192ef31704eb6b5a1ac659d76dee993c919518a0a646e14b5bfaccd4e99a26fce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a6dd4e89e9f47c6f80a0cc27874ce80f

    SHA1

    dcf9ca8fb625bebd79b765994e597832d7332569

    SHA256

    c00b66af72fa8ba977d81ef9627ba165d692a5ef06b370db61ab21c413f79b94

    SHA512

    41886e41f0b1826085a5d3c710c13d534abad493d9a59248ba0af65e73477f0bb24b91a4e4ce341eeff404f22081679d07ca0968b747ec06509cecf81e9d7345

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a1811b82d42102cbe77d2082cb8591e7

    SHA1

    7f7e45fa6f709390491004d83c7b7fd8379d6a80

    SHA256

    161c8b06df5b0f49aefcd04bc6866c22fbe114af229694d3917b4a061f7d5fad

    SHA512

    16696d7f57d2e8e9328a081c9d1ffa257b9462ba155d2c27d886142187768f9ae42d321f1e1fd903f9e8f57bc37dd054c44b1213c2d2cdb5cca27ffbedac71e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    de4d59ea1f18b0f2bba2e67eada4ec7d

    SHA1

    c940eb95a50429ad520bb1a9234caefffe1015d6

    SHA256

    7b9b034879b04714dab7e20e332cdff2797b7750b5b7ae149a0f8b139724f9fe

    SHA512

    92dfa547be64803c38ad5c9998d9e9389e7c97bcb3ef2d9b996975dcf05d4631da9b41e7a39c1ba1ec88761d22a7fbe0486f0f40c7926625f0f11740b1712fb1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    766cb6b3bd91c3047369306e4b2cbf0a

    SHA1

    08ebec3a6aec3898e4c948cc8a73815821f9aa73

    SHA256

    ee773b184e3b4d123844ac00174e91f8e4969775c89ec064e6aa421e05386161

    SHA512

    ea70cf8a110fb3a361e0c54199ad5bb7d9adcdf667c34a910a62d82d9f27cfee49f824c1386cffd6925a71611159f96033ed1ea4720d706320f561db3dab3001

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    7312543dbdc4901a52a092ca13a8c331

    SHA1

    82277faf9114c967cc61293aa8c9ae36ac0ac3e9

    SHA256

    7ff1bf3f342e9f732fd4ee6c65be0b4d56dbd9e813c4ee4abed802b6f4d42eb8

    SHA512

    f397f9cf0b2e0e487f1b82b573401ae0a1451c2f4f525e231244695aad54adcecdd520ad198da01d24e170f577be373bbcaf0328117a891b6f2c6ecea68c3d81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    94f9bc121c7c2b817934837359e09a81

    SHA1

    8e0b2349b54f43b32372b5263d026ab088e37d69

    SHA256

    bbf85bf665908ecc3bedf4e06fbf9703fcfd66d1097bf5c8faec54fc83753329

    SHA512

    bc8b5d74d8d69e8adcaa1ac6d14462c4e6509453f2c1ecc4b664ee55f15a4629b7dbc2e97740ac447d40b8150abad4c4ad9925f11426f7dfa46307bc742cb451

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    4e2e2a3f9b54bae7946788833d9454b1

    SHA1

    e6cb311d3f42b85ad71ce0c614e2c80047540381

    SHA256

    ef1a1bf00efd56f1422c2270f65dd4d4dbb29ea70c8f665bcc2079939bba1368

    SHA512

    a387d7d1fdbda32a33a38604d31d184345f1810d97183c6f20ee9c7ad1599dc7b1015fe608a352e742d5d1e3be94726794c9fc855f9e90ae591a7409585bb9d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    7747e3e8a14ca8c33613c71463e98f1f

    SHA1

    06718f07a3440df0916febafc86a2d4f4d98221c

    SHA256

    c90bca118ba4f0f8f2383a4c049b6692ee4b779699d3446418a65763fc110a15

    SHA512

    48cfa7075ae99d59fc2fb9dac3209c17adfa48f015dcbca8f0f3ddad0a254db13ff894c77525a06c400ac5e6eff6571ec1aa7a6665468f0d0076eddc9c647d24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    aa493e045a56952604f27d205141f9ee

    SHA1

    34879a2bd85e25712d5339915a183cf770a338b2

    SHA256

    9e091f1c187258c44584b7c1c666fc44bab1342678e5b35babf355c72598cfb6

    SHA512

    955f312a53be72d4fc447ab6bcd5c9b18df94abc4319a5d98de2a8a86bb0a8dcc5c674fc9f817e8d495cfa8d95e3eed631d963f1e493c09680ef72958166c24c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    b921d9397e3916cbcabcb599b25b4ee2

    SHA1

    fe765df1065a72a4bb22067b97429b9242cf71ba

    SHA256

    ada1223f9e9f8a729e53df21bc4ca84537dddb3b5629c1b928c36eeb8944cc32

    SHA512

    1ae0151210406a8a3ec261a6844f0be6eae022744d599e9376b9fd60315f0dc315b50df1108b954dac912f214065dee619abceb7490eff40107b113533e04c0a

  • C:\Users\Admin\AppData\Local\Temp\Cab1306.tmp
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar1357.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/2392-3065-0x0000000000250000-0x0000000000251000-memory.dmp
    Filesize

    4KB

  • memory/2392-3067-0x0000000000270000-0x0000000000280000-memory.dmp
    Filesize

    64KB

  • memory/2392-1585-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/2392-2264-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/2392-2762-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/2392-3041-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/2392-3064-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB

  • memory/2392-783-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/2392-3066-0x0000000000260000-0x0000000000261000-memory.dmp
    Filesize

    4KB

  • memory/2392-0-0x0000000000280000-0x0000000000290000-memory.dmp
    Filesize

    64KB

  • memory/2392-3068-0x0000000000290000-0x00000000002A0000-memory.dmp
    Filesize

    64KB

  • memory/2392-3069-0x00000000002A0000-0x00000000003A0000-memory.dmp
    Filesize

    1024KB

  • memory/2392-3070-0x00000000003A0000-0x00000000003E0000-memory.dmp
    Filesize

    256KB

  • memory/2392-3071-0x00000000003E0000-0x00000000003F0000-memory.dmp
    Filesize

    64KB

  • memory/2392-3072-0x0000000004650000-0x0000000004651000-memory.dmp
    Filesize

    4KB

  • memory/2392-3075-0x0000000000401000-0x0000000000A18000-memory.dmp
    Filesize

    6.1MB

  • memory/2392-3074-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB