Analysis

  • max time kernel
    138s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-05-2024 11:50

General

  • Target

    2024-05-29_555d8c9905b9d2f0fb9359812fbbf04e_cobalt-strike_cobaltstrike_xmrig.exe

  • Size

    11.0MB

  • MD5

    555d8c9905b9d2f0fb9359812fbbf04e

  • SHA1

    e66443606d18707226b809ac1cc2344f7a2045de

  • SHA256

    5bf4e0a39786bfc9a72f8d1aea0674c934bbc472a36b26339431de7adfdacb8d

  • SHA512

    a9702d8b2871fc52eb44fcbe64a53b8386d363782884f8513cbb9a73041dbb49c913af2a36e4cd5494965364095d8d48d949b78628b1ccb104d110bae5fc0b9e

  • SSDEEP

    196608:dvg6YpjCa8BMHwNuD7PKUNwabNJvmrMQwHEFoWlD:dYXpkG6uDBuQjmrOHG

Malware Config

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Reflective DLL injection artifacts 1 IoCs
  • Detects executables containing URLs to raw contents of a Github gist 8 IoCs
  • XMRig Miner payload 8 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-29_555d8c9905b9d2f0fb9359812fbbf04e_cobalt-strike_cobaltstrike_xmrig.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-29_555d8c9905b9d2f0fb9359812fbbf04e_cobalt-strike_cobaltstrike_xmrig.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • Modifies Internet Explorer start page
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:4780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7-zip32.dll

    Filesize

    11.3MB

    MD5

    d62118e8612019d26aa65adeed9fe08d

    SHA1

    fc0f659be0a8b0f8730469bbd8a978546384bac8

    SHA256

    d3f11cf65299239f49a46695316379754b7d2624b79ef3bcbb311acc5c47f5ee

    SHA512

    856b68ba078e0f3f6719fff1a2bf5a0eb208cfb3dc460f53ac39104a56c21b149e2b9264ee23fe32648183fe9fde3ef26c314b64a538858b5addd57154fc7c3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

    Filesize

    230B

    MD5

    351831c6b6db9d03a522bd3994b846bf

    SHA1

    a365a6996ed74955c11f0edd3263a3660d03532f

    SHA256

    727a89438c7b759f57bae08a10809f077a5912b03000406fca82593edc14ac1e

    SHA512

    30071bf68e66f6fef37f6ad54b779c14f5ff40502ea6c79d8e99d2a7bf2c4d9db4074828716b5ec16ffd646de69d9d2177e40eb3f489d34056daa2743975b26a

  • memory/4780-1744-0x0000000000400000-0x00000000010B2000-memory.dmp

    Filesize

    12.7MB

  • memory/4780-555-0x0000000000400000-0x00000000010B2000-memory.dmp

    Filesize

    12.7MB

  • memory/4780-1179-0x0000000000400000-0x00000000010B2000-memory.dmp

    Filesize

    12.7MB

  • memory/4780-0-0x00000000001E0000-0x00000000001F0000-memory.dmp

    Filesize

    64KB

  • memory/4780-2078-0x0000000000400000-0x00000000010B2000-memory.dmp

    Filesize

    12.7MB

  • memory/4780-2229-0x0000000000400000-0x00000000010B2000-memory.dmp

    Filesize

    12.7MB

  • memory/4780-2230-0x0000000000060000-0x0000000000062000-memory.dmp

    Filesize

    8KB

  • memory/4780-2235-0x00000000001F0000-0x0000000000200000-memory.dmp

    Filesize

    64KB

  • memory/4780-2236-0x0000000000401000-0x0000000000A18000-memory.dmp

    Filesize

    6.1MB

  • memory/4780-2237-0x0000000006750000-0x0000000006751000-memory.dmp

    Filesize

    4KB

  • memory/4780-2238-0x0000000000400000-0x00000000010B2000-memory.dmp

    Filesize

    12.7MB

  • memory/4780-2239-0x0000000000400000-0x00000000010B2000-memory.dmp

    Filesize

    12.7MB