Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 00:27

General

  • Target

    2024-05-25_157ae992fca9372ffb5024567d7c5c91_cobalt-strike_cobaltstrike.exe

  • Size

    7.7MB

  • MD5

    157ae992fca9372ffb5024567d7c5c91

  • SHA1

    afebddfce9228e613ef2db06e52a191b322f0e8b

  • SHA256

    fe2ac02b3ce91421f1b899a043ffea2a40be8cc7d7298bcf47889bbbb321dcb8

  • SHA512

    20263243a2b55a9e7b1835ac1ad2f94feabe571fe0c4899ee5686811c7a04d8de48a0304f43b6c688cc2ddf6991d9850bc754bd38adbd636f5a8ab0d4ca822c8

  • SSDEEP

    98304:bGUjSb/X0Z3y/t2uDN8nsk/39999999999eEN3JjAUtw6MT4nR8CZqXebhnp3aJF:bGUGb/X0Zi/t2uDN8qurYmd08uDH

Malware Config

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Reflective DLL injection artifacts 1 IoCs
  • Detects executables containing URLs to raw contents of a Github gist 15 IoCs
  • XMRig Miner payload 15 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Modifies Internet Explorer start page 1 TTPs 11 IoCs
  • Modifies system certificate store 2 TTPs 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-25_157ae992fca9372ffb5024567d7c5c91_cobalt-strike_cobaltstrike.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-25_157ae992fca9372ffb5024567d7c5c91_cobalt-strike_cobaltstrike.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Modifies Internet Explorer start page
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:1796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.msi.exe
    Filesize

    7.8MB

    MD5

    ab099c72bbbeba7282d90c24b7b13995

    SHA1

    ea20eb2857ebe7d586dcf113dc8d671044b596c6

    SHA256

    412ff46638ec9853f9e38fc80f737879aa833e569d876659b69e8caa06821343

    SHA512

    3e2047fc74a7287788de28f065dc7ed75692367aa3fef0aa93005f65e2267b57afaf5eb1fa6d81f1b3605b902e973d3d5545cb83dd019b50ba2bdbb57b382083

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    d6f69daeb561c3d2ccb9477631f3a359

    SHA1

    1dd777300c6a59bd45ae43a7202c4fd843c3343d

    SHA256

    6c339abf72d7582a1dd5083e07e721295289f999d677f909d4bf0a0ab2a0b5ea

    SHA512

    69c14d9e36bb1955fde0ae7a00acae919c1c7298fba44da43f555eb313802fa953262301347cf9302c92f328745177221dbaa5a2436dec197f68b22a512f2cbf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    65405c4be651369cbc09a0a099127b66

    SHA1

    fbf4aaba381ba30fb5d442f7b0dbfb7c2908c6bb

    SHA256

    45c6594e72e3277e8274b679b308fb8e2c5fe594fb44754660a1aa31e5214b1a

    SHA512

    5cbbee1fb1c9c5a1711f079f99aac2c0d2b8545e00910481ea3212cc5c05cc7c50ed3f9bd185205f1632fd755cd2aa7140fd33465ab0da3cf21dbd4064429d39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    31a5ccd0a4b02b7bc8dc28b5e98aa2f8

    SHA1

    49a220fa52ce9f7455976d6f8b36dd7609f13adf

    SHA256

    b210244f7856df469de0a4d58bbbb459fa2de4d8f2f7e892c59cea4f68604f16

    SHA512

    fe87cdc7721c0fcdb723b5b9eaa7e7b332226d4e4f4eaae6039860503b758d6265fb0af4a6547298aa8d56822ea39634273d33ee1f3f8b14739bb6ad6c7832ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    676e3a3401042d48b7dc4086f5d1ba2e

    SHA1

    2e61b8ca886f97d1c8092d034508e8596570948a

    SHA256

    ad140e333eefa83d2ecd8872c044e287a125f0b1474571fccb566258ccc27014

    SHA512

    210932722492dbf6ac1aa797dacbf6b3a0c8873996428abef3ac952433a6cc32c0329a8c22e9c10b2f3c2bada30ad85127870f83d3d8131746d154531409ab39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    9589a3e733b3c745a76d940a046b000a

    SHA1

    7545ce895a2cc9ae75f3abb4cca2d258ae7cbbb4

    SHA256

    b99ef6ad1867709890ccc9d3c5ececfbced62c366e5b47d725fe513e3e24f28d

    SHA512

    cd676a53d6d75a7a7f2196b4d1e44ac19a3ecb4543ffe4a7af0172023f799b0e8db8c0f4a64211e474bacd53e346a253db0c5d98e606b1650ba2ed34dbb550df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    ef84a95f95ba6822c0a32d8c438a7e30

    SHA1

    24e750bba350d630ab82c3f2e7fbe964862e5517

    SHA256

    8ac823c021dec7796afe1afe9a9512978a4b369ec27401cd361fa6009874a12a

    SHA512

    d32023be4ba8c5b60bb52df8fe6f1d461acd6c4c2708ceb1ea8f2f0fdd693e408b2680c0ce701cd0a33e7f33816068a9747a3e9f54be731a71b30b5efa2df8d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    90763da98af35a63d772317c30593752

    SHA1

    c7fedb83865260d0fcbb07c3280328230f963c38

    SHA256

    1434f2afb86f22a8730868858cb3624f62a4924e5fe5d3e481d3f37c7d437e3e

    SHA512

    633a1737b2a39bfd400e1a935539fc4dfaa802b4409c1f45a1ea5954a0eaa74647d747497defd39852a0295d1bd8a833973d3f6cb639b979f414fcd46e0258c8

  • C:\Users\Admin\AppData\Local\Temp\Tar178D.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • F:\autorun.inf
    Filesize

    28B

    MD5

    8e994937ffb8479625c7f22aabaf5961

    SHA1

    7c9fe7fef3a211a4209024cbf3d8b66048251e76

    SHA256

    a31bf562b712e9f8566113f00d31db4338e817867126d98f10e4abfd1ecda4e5

    SHA512

    14935be5b42bcdff2d7286648adbed3c2c23846f0308907e837d96c61a462569cf8f8e80e5d9ae9ae17fc46a41fe2669ae3979751894ef264fe9e2c9ec782b78

  • memory/1796-258-0x0000000000400000-0x0000000000DBD000-memory.dmp
    Filesize

    9.7MB

  • memory/1796-1436-0x0000000000400000-0x0000000000DBD000-memory.dmp
    Filesize

    9.7MB

  • memory/1796-0-0x00000000003E0000-0x00000000003F0000-memory.dmp
    Filesize

    64KB

  • memory/1796-1004-0x0000000000400000-0x0000000000DBD000-memory.dmp
    Filesize

    9.7MB

  • memory/1796-1007-0x0000000000400000-0x0000000000DBD000-memory.dmp
    Filesize

    9.7MB

  • memory/1796-1010-0x0000000000400000-0x0000000000DBD000-memory.dmp
    Filesize

    9.7MB

  • memory/1796-1073-0x0000000000400000-0x0000000000DBD000-memory.dmp
    Filesize

    9.7MB

  • memory/1796-444-0x0000000000400000-0x0000000000DBD000-memory.dmp
    Filesize

    9.7MB

  • memory/1796-1437-0x0000000000400000-0x0000000000DBD000-memory.dmp
    Filesize

    9.7MB

  • memory/1796-1624-0x0000000000400000-0x0000000000DBD000-memory.dmp
    Filesize

    9.7MB

  • memory/1796-1687-0x0000000000400000-0x0000000000DBD000-memory.dmp
    Filesize

    9.7MB

  • memory/1796-169-0x0000000000400000-0x0000000000DBD000-memory.dmp
    Filesize

    9.7MB

  • memory/1796-1692-0x0000000000400000-0x0000000000DBD000-memory.dmp
    Filesize

    9.7MB

  • memory/1796-1697-0x0000000000400000-0x0000000000DBD000-memory.dmp
    Filesize

    9.7MB

  • memory/1796-1700-0x0000000000400000-0x0000000000DBD000-memory.dmp
    Filesize

    9.7MB