Analysis

  • max time kernel
    140s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 16:58

General

  • Target

    2024-05-23_759c07bf0343cf12179dae98e47a0903_cobalt-strike_cobaltstrike.exe

  • Size

    4.9MB

  • MD5

    759c07bf0343cf12179dae98e47a0903

  • SHA1

    656416bb2f0a93c8b3d00125f28566cc53f08d21

  • SHA256

    4c56041d2a620dc90bb7c83947fa2172403b3df3a90d342e89834b45a690903d

  • SHA512

    15712324d9ea0c66d7372c021d922c31f679cc88363ffc38d2bfaf149dff5c27bf0e2cb664983c7f1ceca98ecb275ca6bf61a70a1ea95609d2b8d9c29cc6ce62

  • SSDEEP

    98304:SW1qiPgxn+cuSuxx8Svt73qq36IdKtVxNw6pUkp3bkbRxOUL:53EnsxxDt73DdKrwapwbRL

Malware Config

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Reflective DLL injection artifacts 1 IoCs
  • Detects executables containing URLs to raw contents of a Github gist 8 IoCs
  • UPX dump on OEP (original entry point) 10 IoCs
  • XMRig Miner payload 10 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops desktop.ini file(s) 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-23_759c07bf0343cf12179dae98e47a0903_cobalt-strike_cobaltstrike.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-23_759c07bf0343cf12179dae98e47a0903_cobalt-strike_cobaltstrike.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • Modifies Internet Explorer start page
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:1404
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=2856,i,2607710392823067546,4648797561512801463,262144 --variations-seed-version --mojo-platform-channel-handle=4012 /prefetch:8
    1⤵
      PID:4740

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\7-Zip\7-zip32.dll
      Filesize

      5.2MB

      MD5

      8da325a80cc54cf77d29ba18ad183c13

      SHA1

      c42e4abe4a587655a74c5e3362eaa03fc63f5c54

      SHA256

      c269d35c80267511482efa8b43710659761f04cc2e4293adbf0c251cf5f7d624

      SHA512

      a1210b656a174ed78333194b5d9d1ebebf550554e86b01e33210b7dd3adef9d69b37fac1888d0a38252e09777e668b8ffd9f97161c8b3dc22182ce41ac6b587c

    • memory/1404-3653-0x0000000000400000-0x00000000010B6000-memory.dmp
      Filesize

      12.7MB

    • memory/1404-1-0x00000000001F0000-0x0000000000200000-memory.dmp
      Filesize

      64KB

    • memory/1404-847-0x0000000000400000-0x00000000010B6000-memory.dmp
      Filesize

      12.7MB

    • memory/1404-2110-0x0000000000400000-0x00000000010B6000-memory.dmp
      Filesize

      12.7MB

    • memory/1404-2742-0x0000000000400000-0x00000000010B6000-memory.dmp
      Filesize

      12.7MB

    • memory/1404-0-0x0000000000400000-0x00000000010B6000-memory.dmp
      Filesize

      12.7MB

    • memory/1404-4700-0x0000000000400000-0x00000000010B6000-memory.dmp
      Filesize

      12.7MB

    • memory/1404-4773-0x0000000000400000-0x00000000010B6000-memory.dmp
      Filesize

      12.7MB

    • memory/1404-4774-0x0000000000060000-0x0000000000062000-memory.dmp
      Filesize

      8KB

    • memory/1404-4777-0x0000000000400000-0x00000000010B6000-memory.dmp
      Filesize

      12.7MB

    • memory/1404-4778-0x0000000000401000-0x00000000010B5000-memory.dmp
      Filesize

      12.7MB

    • memory/1404-4779-0x0000000000400000-0x00000000010B6000-memory.dmp
      Filesize

      12.7MB

    • memory/1404-4780-0x0000000000401000-0x00000000010B5000-memory.dmp
      Filesize

      12.7MB