Analysis

  • max time kernel
    91s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-05-2024 12:35

General

  • Target

    2024-05-27_4dc8805f238e1c4d9ba815c9a57d6ec0_cobalt-strike_cobaltstrike_xmrig.exe

  • Size

    10.8MB

  • MD5

    4dc8805f238e1c4d9ba815c9a57d6ec0

  • SHA1

    6415fcc33099afadf437e50514d6bd04b28aa148

  • SHA256

    36d8a46fd49b9fc942e78301536ab51d2e94c938ace1faad0ce0918f5d448f93

  • SHA512

    1ba057f58574c7e6763c6a8abf92a4f4a14a6f83d42b9f7db0ca9f7ed948549ba37f835f6fb738a3b190076f09aecd1391bc6e5b3d67b4e9ebf750fc2cb4a480

  • SSDEEP

    196608:dvg6YpjCa8BMHwNuD7PKUNwabNJvmrMQwHEFoW9m:dYXpkG6uDBuQjmrOHz

Malware Config

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Reflective DLL injection artifacts 1 IoCs
  • Detects executables containing URLs to raw contents of a Github gist 7 IoCs
  • XMRig Miner payload 7 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 5 IoCs
  • Modifies system certificate store 2 TTPs 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-27_4dc8805f238e1c4d9ba815c9a57d6ec0_cobalt-strike_cobaltstrike_xmrig.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-27_4dc8805f238e1c4d9ba815c9a57d6ec0_cobalt-strike_cobaltstrike_xmrig.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • Modifies Internet Explorer start page
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7-zip32.dll

    Filesize

    11.0MB

    MD5

    37124d918319badfb788c95c77ba4e60

    SHA1

    341440c888b63d1ca626201d30fa5e4d2431f0e6

    SHA256

    767040c4a79acba3b9c890fcb25565d02e34cadc57e3d0db869d64fd25d015f2

    SHA512

    7df70c849a77ca5795b9f739c056293bae81abfd51d2164f5530a3c31707529693ec66dcf1ec1d614b230a8274ae27d2719991fb8713cfd56a77780f49d0992e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506

    Filesize

    330B

    MD5

    933794e97176ac5f6c439897a17d1a9e

    SHA1

    8d53c88ee36c1c4080ebe9d4c77117caee44ff76

    SHA256

    1d293b335a64a6d8b8f1fe85f0b4a6977424877dead686cb69fd97a5a3a5179e

    SHA512

    29149c47e2cb5bd083837371a29e2b75952b433d79013df0a7260421f35113f6aedc6b8e50c8cb98f2f482a013a6111a42d7526a3f89d5c68e379d80dc90233a

  • memory/628-2123-0x0000000000400000-0x00000000010B2000-memory.dmp

    Filesize

    12.7MB

  • memory/628-481-0x0000000000400000-0x00000000010B2000-memory.dmp

    Filesize

    12.7MB

  • memory/628-1150-0x0000000000400000-0x00000000010B2000-memory.dmp

    Filesize

    12.7MB

  • memory/628-1760-0x0000000000400000-0x00000000010B2000-memory.dmp

    Filesize

    12.7MB

  • memory/628-0-0x00000000001E0000-0x00000000001F0000-memory.dmp

    Filesize

    64KB

  • memory/628-2277-0x0000000000400000-0x00000000010B2000-memory.dmp

    Filesize

    12.7MB

  • memory/628-2278-0x0000000000060000-0x0000000000062000-memory.dmp

    Filesize

    8KB

  • memory/628-2282-0x00000000001F0000-0x0000000000200000-memory.dmp

    Filesize

    64KB

  • memory/628-2283-0x00000000057F0000-0x00000000057F1000-memory.dmp

    Filesize

    4KB

  • memory/628-2284-0x0000000000401000-0x0000000000A18000-memory.dmp

    Filesize

    6.1MB

  • memory/628-2285-0x0000000000400000-0x00000000010B2000-memory.dmp

    Filesize

    12.7MB