Analysis

  • max time kernel
    139s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-05-2024 06:29

General

  • Target

    2024-05-25_2cbbcf36f9bedbffb10f821eb280c001_cobalt-strike_cobaltstrike.exe

  • Size

    4.9MB

  • MD5

    2cbbcf36f9bedbffb10f821eb280c001

  • SHA1

    1726ea09c6af1714a1dd8b9a47782f33ac99d742

  • SHA256

    b2682a2b6fc2c23a7ee8d5be63e8ff378f8953168aa9a776411979b20605a3f4

  • SHA512

    877270c949890c4af87ddc425628df80274e73e938a20224b1a0b30d91d4c248aca92929ba6e6fa01d185f76df962a639d5efef0b34da1cdb86e3628081a2096

  • SSDEEP

    98304:SW1qiPgxn+cuSuxx8Svt73qq36IdKtVxNw6pUkp3bkbRxOUk:53EnsxxDt73DdKrwapwbRk

Malware Config

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Reflective DLL injection artifacts 1 IoCs
  • Detects executables containing URLs to raw contents of a Github gist 8 IoCs
  • UPX dump on OEP (original entry point) 10 IoCs
  • XMRig Miner payload 10 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops desktop.ini file(s) 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-25_2cbbcf36f9bedbffb10f821eb280c001_cobalt-strike_cobaltstrike.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-25_2cbbcf36f9bedbffb10f821eb280c001_cobalt-strike_cobaltstrike.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • Modifies Internet Explorer start page
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:3840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7-zip32.dll

    Filesize

    5.1MB

    MD5

    4902113a17622300ebf2fa68291c1b27

    SHA1

    a17a661bc59ac44ac29b01da190cbc576a60ca56

    SHA256

    0bb19f33b2e16f1ba36f96258b4f357aa5627e736b18ecf686e629618732b68e

    SHA512

    fab2e184ceb7a85a351cacef850c7341083403294880d4fc9da67bf87a7aad54738a89eb545824fa9449baa08fe76f9c975c165df76a0fb86f0eb5a4679dd67f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506

    Filesize

    330B

    MD5

    3a1c7f1d1f90d4a2df1be751ec262a4b

    SHA1

    fdb0b13e0c4d9739234ff590d0cdba26d738d2c2

    SHA256

    0d6c394edf0a5cfe73de937916000e0d4698bf9542c9f28957288f14def5c9ac

    SHA512

    ec8f7c65d8a2a2132aeba15d08adcaf24e05e60f39c7f2a42aa3035c7d6e2f8a6cbc15ff6c54e0970ca0872efbc79239b9798d9ec104d4f743dc671e9dd6317d

  • memory/3840-4487-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/3840-4825-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/3840-740-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/3840-1939-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/3840-2563-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/3840-3132-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/3840-0-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/3840-1-0x00000000001E0000-0x00000000001F0000-memory.dmp

    Filesize

    64KB

  • memory/3840-4826-0x0000000000060000-0x0000000000062000-memory.dmp

    Filesize

    8KB

  • memory/3840-4832-0x00000000001F0000-0x0000000000200000-memory.dmp

    Filesize

    64KB

  • memory/3840-4833-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/3840-4834-0x0000000000401000-0x00000000010B5000-memory.dmp

    Filesize

    12.7MB

  • memory/3840-4835-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/3840-4836-0x0000000000401000-0x00000000010B5000-memory.dmp

    Filesize

    12.7MB