Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 16:58

General

  • Target

    2024-05-23_759c07bf0343cf12179dae98e47a0903_cobalt-strike_cobaltstrike.exe

  • Size

    4.9MB

  • MD5

    759c07bf0343cf12179dae98e47a0903

  • SHA1

    656416bb2f0a93c8b3d00125f28566cc53f08d21

  • SHA256

    4c56041d2a620dc90bb7c83947fa2172403b3df3a90d342e89834b45a690903d

  • SHA512

    15712324d9ea0c66d7372c021d922c31f679cc88363ffc38d2bfaf149dff5c27bf0e2cb664983c7f1ceca98ecb275ca6bf61a70a1ea95609d2b8d9c29cc6ce62

  • SSDEEP

    98304:SW1qiPgxn+cuSuxx8Svt73qq36IdKtVxNw6pUkp3bkbRxOUL:53EnsxxDt73DdKrwapwbRL

Malware Config

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Reflective DLL injection artifacts 1 IoCs
  • Detects executables containing URLs to raw contents of a Github gist 9 IoCs
  • UPX dump on OEP (original entry point) 11 IoCs
  • XMRig Miner payload 9 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops desktop.ini file(s) 9 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-23_759c07bf0343cf12179dae98e47a0903_cobalt-strike_cobaltstrike.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-23_759c07bf0343cf12179dae98e47a0903_cobalt-strike_cobaltstrike.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • Modifies Internet Explorer start page
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:2168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7-zip32.dll.exe
    Filesize

    5.2MB

    MD5

    dc07c3f3fae97b85236a87b2014edec4

    SHA1

    3e5ba846f027e29cf1919111ae93d07fb916740e

    SHA256

    8d6ff14a748a2df5bc57e8b349f8831750b95e0417a57c86b7c71c89fffc6429

    SHA512

    057a63911b3b1400c3fabd5f7d6475f8e716b9236e43e23578848532d0ed7d06986f6024d1d4b72098d9d45a2183144e27afe369b199813a55e751c19c891f50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416
    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
    Filesize

    230B

    MD5

    049f210281c2d07de4cef47c1052df7c

    SHA1

    9125b5d44bf681019e8584c57b9a102b854fbede

    SHA256

    22c2886cdf94f4bf99736bdf70f6eb8747f3b1ddbc0290f4d71cf9b3486bb107

    SHA512

    c5216fc3e2860b29c4a59d6c0321a12dcbca11851cce019b895bf311b74ce25feb61da4d3418a7469d48036652dbfe1df0c44cd1b1747b032f7e4e8e93bb6a8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    3028771193fffc64b6520eaa984bb41b

    SHA1

    bdcaea3e374647a685d5ad286ab63d9d41eb321c

    SHA256

    5c644931a652da6b5aa0e4c2e04e1658ac85a4c594e7689db9685e36bb3a3aac

    SHA512

    d026af64c8ab220504c7a720971aefb9dd370cb7821f50e95ac81f6e29346224e4434457cacc9f8b5b11713825e0f6e239a640dd0deab1cc2c56c9dc2d79dbe3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    b8242ca9299328b63c6d77105dabac7c

    SHA1

    25311c5094ac9569c029f9a6401e59329152c9de

    SHA256

    72686b49e4e6cb6f1fc687c23956905364ce6e6de52e994b0f64296500d9919d

    SHA512

    f377bff51aff919e952d766fc9a99c7e4107136185e321f3593ae4df40fde8e71eca62eaf0cf6c40fbea3cdb4b906279c07338fee2e3dad6df3d25c9182b85fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    9ef1329ebb03c1349aac714f7db8254d

    SHA1

    9952c0ed9eed42adbd32483c2e62f919ff28fd25

    SHA256

    6b231afac888f1d4f6c2a057f91a027f1de99b6baa0f84e1c02b5ebd768a9d0f

    SHA512

    5f3f24e0a006db11aaf7ccfe56f68ac565391f18e303068f2488111b19ac3ccb56fc6d2359fe51861d1f0cad4c050477069b109f6ecbd888cc1a7f19ff2d4770

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    87c5fe632f04036273cff7e0741df3e1

    SHA1

    58334cfe80c7baa40c8041795b973707829e5936

    SHA256

    6f2f4b6350b48065639175addc47e4350ac52b9390f8430c66a070daf6ee8b7f

    SHA512

    7a0d39087219bed243c2b4a590aeefca12a36720ccd355695a26b86d44bfc86305afc8062f9a5836ed8c6ece251c0ac3e50fd504b88d8e56e20a327b3a2670bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    c4386ab5f15168f2bab565ae8f5ac0e3

    SHA1

    a3b4621ed82505645dd82febe3c1f2b627594780

    SHA256

    67e2599b55e21113c1b46d1eaf0d7d8760b95f19ef10de90e078a969877fed4a

    SHA512

    f7d937c816078f7341a8c20d9eeb12a9a39d8dedfcfe4a13ab3432483e78a876826e66da0bb49a276ab41a396be2c3abc80bdfa07fdc6870d4eacfec2a593dd8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    327dd895a0db138b48ed155ddfd889c2

    SHA1

    09c905ce6b8609b7a208a0725393d76e3baecb7e

    SHA256

    1f2e3004bff5a7ed6b9bc17feac7ff12235f2a611efbc09fe2f14a77ef45b69d

    SHA512

    b929705e57eaed8887417146f2207dcfe8decc3673014548ead024a87fc2802c82849ad3322d62ca9bf0ad84f94932e07048acbb3a208cfbb8c4895cd972367a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    6c0f21ec9116d7af02de96345921b2f8

    SHA1

    30adeb155dd98ce77a36d5cceb5512c696878fbd

    SHA256

    231e29c6391299387632bfce9d4628434e82b766b604382582e79aeb7a57b6f2

    SHA512

    e0e7cccc023fcf05686c43f284b8db0e6e7b8e8affd2f96629176a813f5b16258cfe8d6dbf99bbbc69e88fec1651a95d6b37e4ae29b80dac60a16b560130bf7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    30947921f3f48fdaa2fa24cf9d476397

    SHA1

    e0e50758f149599141e026852f9f9ec0d9f6d7cb

    SHA256

    dbbfc93198b271c26f32af6f66a4aed7a6d477cb66eb11263f24be69cc877580

    SHA512

    53ddfd804d4ab7923d98e0fa6a0db8835ac0afc1f1576b6b0e93a546209b38e4dbd3b1707856c2689090853ec8e83fd4c651cb4848c1c1d9f2b1dc423f2ea3e1

  • C:\Users\Admin\AppData\Local\Temp\Cab2648.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar2689.tmp
    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\Tar27C7.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/2168-955-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/2168-4641-0x00000000003C0000-0x00000000003C1000-memory.dmp
    Filesize

    4KB

  • memory/2168-946-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/2168-1-0x00000000003E0000-0x00000000003F0000-memory.dmp
    Filesize

    64KB

  • memory/2168-2068-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/2168-3033-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/2168-4235-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/2168-4576-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/2168-4639-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB

  • memory/2168-0-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/2168-4640-0x00000000002C0000-0x00000000003C0000-memory.dmp
    Filesize

    1024KB

  • memory/2168-4642-0x00000000003D0000-0x00000000003D1000-memory.dmp
    Filesize

    4KB

  • memory/2168-4643-0x00000000003F0000-0x0000000000400000-memory.dmp
    Filesize

    64KB

  • memory/2168-4644-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/2168-4645-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB

  • memory/2168-4646-0x0000000004600000-0x0000000004601000-memory.dmp
    Filesize

    4KB

  • memory/2168-4649-0x0000000000400000-0x00000000010B6000-memory.dmp
    Filesize

    12.7MB