Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/05/2024, 12:33

General

  • Target

    2024-05-29_553d8128554527b34c52f25bb003bba3_cobalt-strike_cobaltstrike.exe

  • Size

    4.7MB

  • MD5

    553d8128554527b34c52f25bb003bba3

  • SHA1

    7cb7b47a2b54a81276ae678e32dda60ea3a42c83

  • SHA256

    2ad30e3184ff12cd2448eeabe56d4365335049f861550e4e7b951a0c17911fe3

  • SHA512

    8894f94cfe954270ddadaaee0d2ea146de8eb66df3707a0dab3dcc38f1c6ad5ba9290786b19c45d447666a469db73631efa8b96e6644372380da1a05c92ca128

  • SSDEEP

    98304:SW1qiPgxn+cuSuxx8Svt73qq36IdKtVxNw6pUkp3bkbRxMUB:53EnsxxDt73DdKrwapwbbB

Malware Config

Extracted

Family

cobaltstrike

Botnet

0

C2

http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

Attributes
  • access_type

    512

  • beacon_type

    256

  • create_remote_thread

    768

  • crypto_scheme

    256

  • host

    ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

  • http_header1

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==

  • http_method1

    GET

  • http_method2

    POST

  • maxdns

    255

  • pipe_name

    \\%s\pipe\msagent_%x

  • polling_time

    5000

  • port_number

    443

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /N4215/adj/amzn.us.sr.aps

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko

  • watermark

    0

Signatures

  • Cobalt Strike reflective loader 2 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Reflective DLL injection artifacts 2 IoCs
  • Detects executables containing URLs to raw contents of a Github gist 8 IoCs
  • UPX dump on OEP (original entry point) 11 IoCs
  • XMRig Miner payload 10 IoCs
  • Loads dropped DLL 18 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops desktop.ini file(s) 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 7 IoCs
  • Modifies system certificate store 2 TTPs 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-29_553d8128554527b34c52f25bb003bba3_cobalt-strike_cobaltstrike.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-29_553d8128554527b34c52f25bb003bba3_cobalt-strike_cobaltstrike.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • Modifies Internet Explorer start page
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:2188

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\7-Zip\7-zip32.dll

          Filesize

          4.9MB

          MD5

          0e2aaf7173283a8f2f9905e17b469663

          SHA1

          75e526cbcf6d39a5ad4c203c2a91e12b939827df

          SHA256

          cc91349acf5590b4cce45c22478dc17bd52b9b7276d38777d386bbce2c71ec50

          SHA512

          c616587cb08333b6578aeecf0a4153b9332b6538ba8439eb3bf4153f510342662f1679e77b44806a2d29229dea3a66cdc3a0fe49452faf7f7585a35e5eb2f960

        • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\msoshext.dll

          Filesize

          4.9MB

          MD5

          fb61f80595aea99b81508380f3c57378

          SHA1

          285fa6b9695febbe5fa98b6a6fed1fd579b24b08

          SHA256

          2edd2fc4b84c1637ea750b9073b28b03a84304f3e8d47ac8752b42ff90b04d24

          SHA512

          72edb8a65c78a3969cb72ee0b44cf3fd6b41930df0eeb7fbc6fdb1593bf0395d49434e6599bf3d826387573365c19a8c98984d96051bce19255453cda52271b0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

          Filesize

          1KB

          MD5

          55540a230bdab55187a841cfe1aa1545

          SHA1

          363e4734f757bdeb89868efe94907774a327695e

          SHA256

          d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

          SHA512

          c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

          Filesize

          230B

          MD5

          ee3dbeb64e288140fd1cefa55118358f

          SHA1

          797181d34e51e074e279b73972e79b36d3bb5c7e

          SHA256

          1fe8466faea3240c5acc0b5bf31bce305433a7040f770804ef360d99294ecaa1

          SHA512

          754b4be03bb00a8667d96c18aa003dff4fff12d9f9daa0529b7689cc586f45d47b365963b1281211b33813b16a11b12e96e9a76230173e2dd3b0236eb4a04e93

        • memory/2188-3231-0x0000000000400000-0x00000000010B6000-memory.dmp

          Filesize

          12.7MB

        • memory/2188-831-0x0000000000400000-0x00000000010B6000-memory.dmp

          Filesize

          12.7MB

        • memory/2188-2079-0x0000000000400000-0x00000000010B6000-memory.dmp

          Filesize

          12.7MB

        • memory/2188-2656-0x0000000000400000-0x00000000010B6000-memory.dmp

          Filesize

          12.7MB

        • memory/2188-0-0x0000000000400000-0x00000000010B6000-memory.dmp

          Filesize

          12.7MB

        • memory/2188-4306-0x0000000000400000-0x00000000010B6000-memory.dmp

          Filesize

          12.7MB

        • memory/2188-4985-0x0000000000400000-0x00000000010B6000-memory.dmp

          Filesize

          12.7MB

        • memory/2188-4986-0x0000000000060000-0x0000000000062000-memory.dmp

          Filesize

          8KB

        • memory/2188-4989-0x0000000000400000-0x00000000010B6000-memory.dmp

          Filesize

          12.7MB

        • memory/2188-4990-0x0000000000401000-0x00000000010B5000-memory.dmp

          Filesize

          12.7MB

        • memory/2188-4991-0x0000000000400000-0x00000000010B6000-memory.dmp

          Filesize

          12.7MB

        • memory/2188-4992-0x0000000000401000-0x00000000010B5000-memory.dmp

          Filesize

          12.7MB

        • memory/2188-1-0x00000000001F0000-0x0000000000200000-memory.dmp

          Filesize

          64KB