Analysis

  • max time kernel
    145s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 13:54

General

  • Target

    2024-05-23_4ead4120cb8942537450505c291cd308_cobalt-strike_cobaltstrike_xmrig.exe

  • Size

    11.3MB

  • MD5

    4ead4120cb8942537450505c291cd308

  • SHA1

    e9ed9d43fecee6be41b941f86b8d216c646d0653

  • SHA256

    b5a2ccff16b7a67d416f355d1fda783494cc2edbfa47ca51a7c9d5ee910d096f

  • SHA512

    dfad13eb882be49020c68f8ef7d7bb187cd5cdbdb193f8e843e8f10d1a1fcb5bc18dab86eff6a71501d2cae997f59e87d9a8bf4c910d7d39bef8d5c6913a6a57

  • SSDEEP

    196608:dvg6YpjCa8BMHwNuD7PKUNwabNJvmrMQwHEFoWXB:dYXpkG6uDBuQjmrOHC

Malware Config

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Reflective DLL injection artifacts 1 IoCs
  • Detects executables containing URLs to raw contents of a Github gist 7 IoCs
  • XMRig Miner payload 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-23_4ead4120cb8942537450505c291cd308_cobalt-strike_cobaltstrike_xmrig.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-23_4ead4120cb8942537450505c291cd308_cobalt-strike_cobaltstrike_xmrig.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies Internet Explorer start page
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:3016

Network

MITRE ATT&CK Matrix ATT&CK v13

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

3
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Lateral Movement

Replication Through Removable Media

1
T1091

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7-zip.dll.exe
    Filesize

    11.6MB

    MD5

    1763b5e6f4c52721ee253c25471d1842

    SHA1

    74ff03de7fc40fa54db14649c1d7689cf07cca8b

    SHA256

    2be6c9e3e793d750dd1eba686239e2ff118c98aadf52b7cd5f47421fcc6796ad

    SHA512

    501d47794b10c701e91ef855466abdd7af010852e470ef08cae4ca906a0757e526c8e5b61837508d36fd41c13937e88a5151eeda99ab6afa59389628af110971

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
    Filesize

    330B

    MD5

    d2c2f71b38833c170cab038aeb0e0a9a

    SHA1

    9a49c5d781deb9cfd977ae087778f0844389d4a4

    SHA256

    a575ce7df93ce60dd8d3bad4fa5842b3fbed7674132da97642248948c4e6c17a

    SHA512

    20b19f2c1f6b2821c861e1f8c1c6eca63c437b1b4cc9754a92563784d5998223abd6149c248035b23594460b725d9a86f618f14acafdc9ee813b2af62cb58d14

  • memory/3016-2024-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/3016-521-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/3016-1101-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/3016-1729-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/3016-0-0x00000000000E0000-0x00000000000F0000-memory.dmp
    Filesize

    64KB

  • memory/3016-2166-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/3016-2167-0x0000000000060000-0x0000000000062000-memory.dmp
    Filesize

    8KB

  • memory/3016-2169-0x00000000000F0000-0x0000000000100000-memory.dmp
    Filesize

    64KB

  • memory/3016-2175-0x0000000000401000-0x0000000000A18000-memory.dmp
    Filesize

    6.1MB

  • memory/3016-2176-0x0000000005960000-0x0000000005961000-memory.dmp
    Filesize

    4KB

  • memory/3016-2177-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB