Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 16:25

General

  • Target

    2024-05-23_83a9c9d4323cc1c8fbbdd073f5751e11_cobalt-strike_cobaltstrike.exe

  • Size

    5.2MB

  • MD5

    83a9c9d4323cc1c8fbbdd073f5751e11

  • SHA1

    82a8c93bc1cf2e6acff2cfb8d0a7619eb0242359

  • SHA256

    b68ded42b14484af617bc803500676f36f22c1cdebacb4f22ac3dbf20fc4a620

  • SHA512

    e816fc6919482772321e2f31305070bd47deab4dde0a15dbce26700dc090f34d0a1db136fea853fb18ec6c21bca0853643cc1e208cc674dcfdb6c5a6aaefe750

  • SSDEEP

    98304:SW1qiPgxn+cuSuxx8Svt73qq36IdKtVxNw6pUkp3bkbRxEU/:53EnsxxDt73DdKrwapwbL/

Malware Config

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Reflective DLL injection artifacts 1 IoCs
  • Detects executables containing URLs to raw contents of a Github gist 8 IoCs
  • UPX dump on OEP (original entry point) 10 IoCs
  • XMRig Miner payload 10 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops desktop.ini file(s) 9 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 8 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-23_83a9c9d4323cc1c8fbbdd073f5751e11_cobalt-strike_cobaltstrike.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-23_83a9c9d4323cc1c8fbbdd073f5751e11_cobalt-strike_cobaltstrike.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • Modifies Internet Explorer start page
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7-zip32.dll.exe

    Filesize

    5.5MB

    MD5

    e1774ccd88b0975c742698aee5847d1b

    SHA1

    5375252124fc2b25b5369b5c3ff106dbc7aa281c

    SHA256

    8f07bac94b73811be42426d851d25dcfc4dc656a61fc8029033f432e1f3ef399

    SHA512

    a828e8f6b233c36b8bf7d0ceb747e927eb20e8b40706506de0521b6417d3088cad39e80545a4458d5660845da4347de56497612d7c5d209c9a92f0b3428c7188

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

    Filesize

    230B

    MD5

    602222ded966fe7dfbc9c4707fb0bb4b

    SHA1

    193228577905033115db74808e9eb16c98d10343

    SHA256

    a278d3c54bd743b073d8948d927382ab77cf2c7ddcf11f8546a7aa0c642c9f01

    SHA512

    de94d1a6e27e72d3e75000d5e317f51ecea16cd2e8c8974eaf7d512cf92ad51c9f7db7a6bd5e619135dfdf0ec0f004e2c9e66aeb42f2c318f890d9d14e755828

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    817d68b029ead293e9a6df5c0cfbbd36

    SHA1

    bef12039c2d8138e3e9acdecec3b3e48a0e6bdd0

    SHA256

    96678c71581fe7b0366164164d131ed8a451d7aeadbd20b53c6dc54bec49a419

    SHA512

    3f01296b7a4a9cab7f0ce233085fa17f8ee55fddcb749f62c830b3cd8b908e4a9020cdaaa290f09909b3f06d0c5923a128f3badce7db1add08755a47ef1f01a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    40ed479c2352ef5c0d1ca1a50b1311e3

    SHA1

    22b71a75af9bc12178a66602e2e31fdc73e64e2e

    SHA256

    ab7859a0d5924c8db318a0e55bd9d077de01a705214690b3bfaf4a98c35787cc

    SHA512

    b5ed68328b9bf1c12f61ef52711bc8a389c623a1502da296960feee5cad5847aaa76df8b7f20fea9614cafc4e87108014a3a0952cdd4c16233fb4d948866b412

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7e9fc1e3944e769439a5240ccbedf664

    SHA1

    5444fbc2b4bfe9543c531032d339c65408257545

    SHA256

    01c74fa7994157761091d459c15887b90bb6d798d6e2d16dc5ea2d4ee349377c

    SHA512

    66091539e6bac3f6546fd1293ce2fd7326effc398a09a5519ce3b7fc325cac1129fc5a7daccdb8be13d0a7afb6cd96f2e13ac05725b828f45cf8989d0fe08a38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    85985f43d324dc2fd7e5aef7df433eb9

    SHA1

    35b18cef49e8dd1646af6010ef860da6a620c13b

    SHA256

    8516efda22f490c601e020f79163426f5e437dd43c809b70aea3b30c8461b1b5

    SHA512

    d6cbd6178490e292ed1ae20fee566c3581f467932899c485948b3f95d727dbbbad206f11ca2d4d9d15095c86c062518a92f7ddc8eb0e9542b9ace1d18696626b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    23c8e9be1e928587f1be4f685b1c5e9c

    SHA1

    0fa6a378691120607e0530d1cc662d27384b7b32

    SHA256

    cc359fff8cd30e641b7e72b9f162789fcd6f55a217f8ea50f614820515812c09

    SHA512

    450bcf3f46126e5299379d16c9379f73c9193b12a74f7bc518a368d2c4973b8f14a0d151ab96085af5fd90f50528ead3c7df029eb2ccfbc16626a7a69713f958

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ff7055f781d7659b4328a306cd19ed9f

    SHA1

    4e9abe6bb36468aeac863b1e2db69bcda88d8aa0

    SHA256

    03c3de888be88fcc8e2fa3e9fd8e9858f8e705a13de2d0025fc6e4207f5f3f91

    SHA512

    a9c642211fc0186b4373443e7cf9bfb92765173b48110efcd25d7bf5f8c0d2db013899098cff3402c4badfb4a9bf4ceb7e4737cb9e31925477adfcb9e748dd8f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7d90f074ff6b33f2e5d496e9e4ef7433

    SHA1

    6311834d6ac164b1c3f50cf631f1c5d872c1aa50

    SHA256

    9a8cb56c741498f9c947b001b2121ca529aa5b352f54eb0cbac48d6adaa87827

    SHA512

    d2adeb091eaed95857009ef8580fb28be50ae32da7bb1d6a084e80d827ddd6d4890ef568f2c01ddd8f30c2fb97d6d0210aca7e9a2ad592b4080fc7dccb692ad3

  • C:\Users\Admin\AppData\Local\Temp\Cab281C.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar281D.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/836-2112-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/836-4419-0x00000000002F0000-0x0000000000300000-memory.dmp

    Filesize

    64KB

  • memory/836-881-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/836-1-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/836-0-0x00000000002E0000-0x00000000002F0000-memory.dmp

    Filesize

    64KB

  • memory/836-3110-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/836-3974-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/836-4141-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/836-4416-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/836-4417-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB

  • memory/836-4418-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/836-871-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/836-4420-0x0000000000300000-0x0000000000310000-memory.dmp

    Filesize

    64KB

  • memory/836-4421-0x0000000000310000-0x0000000000320000-memory.dmp

    Filesize

    64KB

  • memory/836-4422-0x0000000000320000-0x0000000000360000-memory.dmp

    Filesize

    256KB

  • memory/836-4423-0x0000000000360000-0x0000000000382000-memory.dmp

    Filesize

    136KB

  • memory/836-4424-0x00000000003B0000-0x00000000003F0000-memory.dmp

    Filesize

    256KB

  • memory/836-4425-0x00000000003F0000-0x0000000000400000-memory.dmp

    Filesize

    64KB

  • memory/836-4426-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/836-4427-0x0000000000401000-0x00000000010B5000-memory.dmp

    Filesize

    12.7MB

  • memory/836-4428-0x0000000002C30000-0x0000000002C31000-memory.dmp

    Filesize

    4KB

  • memory/836-4431-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/836-4432-0x0000000000401000-0x00000000010B5000-memory.dmp

    Filesize

    12.7MB