Static task
static1
Behavioral task
behavioral1
Sample
2024-06-06_c6ef2196409b533bb81ab7f9b8406e23_cobalt-strike_lockbit.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-06_c6ef2196409b533bb81ab7f9b8406e23_cobalt-strike_lockbit.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-06-06_c6ef2196409b533bb81ab7f9b8406e23_cobalt-strike_lockbit
-
Size
232KB
-
MD5
c6ef2196409b533bb81ab7f9b8406e23
-
SHA1
b7a4bfbd79bfbc8d8cb6a9323b65021b953b1d16
-
SHA256
6cd93383254cf3815e1736ebffafaefce11914565adce9afc7748f1d9b9ecb37
-
SHA512
ed5bedbb2919149a6d65fd726dba8416adb7abe06d552f0a756a0fc7fb56b5fb8253f8050be55a223d2e2b4fb93193c60e50534154008b9dbac7219b6857e22c
-
SSDEEP
3072:8cUjorcnfNdOaYAw08AYEIosiXu8pgSlJiMZQXUqmR20/M5txCW1Doo8dqh:8xGaNgZAd8AlIosiX/p4kqmUFCQ0Zdq
Malware Config
Signatures
-
Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-06_c6ef2196409b533bb81ab7f9b8406e23_cobalt-strike_lockbit
Files
-
2024-06-06_c6ef2196409b533bb81ab7f9b8406e23_cobalt-strike_lockbit.exe windows:6 windows x64 arch:x64
57c18978fe558d53adcd4ead468f62d5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CreateFileW
UnmapViewOfFile
OutputDebugStringW
LoadLibraryW
FreeLibrary
CreateFileMappingW
MapViewOfFile
GetStartupInfoW
WaitForDebugEvent
InitializeProcThreadAttributeList
ContinueDebugEvent
UpdateProcThreadAttribute
SetEvent
DeleteProcThreadAttributeList
CreateProcessW
TerminateThread
GetCurrentProcess
GetCurrentThreadId
SetFilePointerEx
FindClose
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
SetStdHandle
RaiseException
EncodePointer
MultiByteToWideChar
CreateDirectoryW
GetCPInfo
GetOEMCP
GetACP
FindNextFileW
VirtualFree
GetFileSizeEx
LoadLibraryExW
GetModuleHandleW
GetProcAddress
ResumeThread
HeapAlloc
HeapCreate
FileTimeToDosDateTime
GetTempFileNameA
WideCharToMultiByte
FileTimeToLocalFileTime
DeleteFileA
CreateFileA
GetTempPathA
GetFileInformationByHandle
SetFilePointer
WriteFile
ReadFile
GetCommandLineW
LocalFree
CloseHandle
GetLastError
CreateEventW
IsValidCodePage
LCMapStringW
FlsSetValue
FlsGetValue
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleExW
IsProcessorFeaturePresent
TlsSetValue
TlsGetValue
InitializeCriticalSectionAndSpinCount
FindFirstFileW
DeleteFileW
CreateThread
CopyFileW
Sleep
GetFileAttributesW
HeapDestroy
TerminateProcess
LocalAlloc
WaitForSingleObject
SetLastError
ExitProcess
GetModuleFileNameW
GetStringTypeW
VirtualAlloc
WriteConsoleW
user32
GetUserObjectInformationW
GetThreadDesktop
MessageBoxW
wsprintfW
GetDesktopWindow
GetProcessWindowStation
GetMessageW
CreateWindowExW
SendMessageW
UnregisterClassW
RegisterClassExW
DispatchMessageW
TranslateMessage
PostQuitMessage
LoadImageW
DefWindowProcW
GetDC
gdi32
SwapBuffers
SetPixelFormat
ChoosePixelFormat
advapi32
RegCopyTreeW
RegSetValueExW
RegCreateKeyExW
RegDeleteKeyW
RegCloseKey
RegQueryValueExW
RegDeleteValueW
RegEnumKeyExW
RegOpenKeyW
CreateProcessWithLogonW
CreateProcessAsUserW
RegQueryInfoKeyW
CloseServiceHandle
OpenSCManagerW
CreateWellKnownSid
RegOpenKeyExW
RegCreateKeyW
OpenServiceW
QueryServiceStatusEx
RegEnumValueW
RegFlushKey
shell32
SHCreateItemFromParsingName
ShellExecuteExW
ole32
CoCreateGuid
CoUninitialize
StringFromCLSID
CoTaskMemFree
CoGetObject
StringFromGUID2
CoCreateInstance
CoInitializeEx
oleaut32
SafeArrayCreateVector
SafeArrayUnaccessData
SysAllocString
SysFreeString
SafeArrayDestroy
SafeArrayAccessData
ntdll
LdrAccessResource
RtlUnwindEx
NtEnumerateValueKey
NtResumeProcess
NtOpenKey
NtNotifyChangeDirectoryFile
NtWaitForSingleObject
NtCreateFile
NtSetEvent
NtCreateEvent
RtlDosPathNameToNtPathName_U
NtQuerySystemInformation
RtlEqualUnicodeString
NtCreateSection
RtlAppendUnicodeStringToString
RtlDestroyHeap
RtlInitializeSid
NtFreeVirtualMemory
RtlNtStatusToDosErrorNoTeb
NtDeletePrivateNamespace
RtlImageNtHeader
NtDeleteKey
DbgUiSetThreadDebugObject
NtFilterToken
RtlFreeSid
NtDuplicateObject
RtlLengthSid
NtQueryInformationToken
RtlAllocateAndInitializeSid
NtQueryInformationFile
NtOpenProcess
NtAllocateVirtualMemory
NtRemoveProcessDebug
RtlFreeUnicodeString
NtClose
NtDeleteFile
RtlExpandEnvironmentStrings_U
RtlPushFrame
RtlQueryElevationFlags
RtlPopFrame
RtlReleasePebLock
NtMapViewOfSection
NtQueryValueKey
RtlAddSIDToBoundaryDescriptor
NtUnmapViewOfSection
LdrFindEntryForAddress
NtCreateKey
RtlCreateHeap
RtlSetHeapInformation
RtlRaiseStatus
RtlGetFrame
RtlFreeHeap
RtlPrefixUnicodeString
LdrGetDllHandleEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlPcToFileHeader
LdrLoadDll
RtlInitUnicodeString
LdrUnloadDll
RtlAllocateHeap
RtlImageDirectoryEntryToData
NtDuplicateToken
NtOpenProcessToken
NtSetValueKey
NtSuspendProcess
NtTerminateProcess
NtWriteVirtualMemory
RtlCreateUserThread
NtCreatePrivateNamespace
RtlGetCurrentPeb
RtlFormatCurrentUserKeyPath
NtFsControlFile
RtlGetVersion
RtlAcquirePebLock
RtlLengthRequiredSid
NtDeleteValueKey
LdrEnumerateLoadedModules
RtlSubAuthorityCountSid
NtReadFile
RtlComputeCrc32
LdrFindResource_U
RtlDeleteBoundaryDescriptor
NtQueryInformationProcess
LdrGetDllHandle
RtlCreateBoundaryDescriptor
RtlRandomEx
RtlAppendUnicodeToString
NtSetInformationThread
RtlSubAuthoritySid
NtSetInformationToken
apphelp
SdbWriteStringTag
SdbBeginWriteListTag
SdbCloseDatabaseWrite
SdbWriteBinaryTag
SdbWriteDWORDTag
SdbEndWriteListTag
SdbCreateDatabase
rpcrt4
RpcBindingFree
RpcStringFreeW
RpcBindingSetAuthInfoExW
NdrAsyncClientCall
RpcStringBindingComposeW
RpcBindingFromStringBindingW
RpcAsyncInitializeHandle
RpcRaiseException
RpcAsyncCompleteCall
opengl32
glClear
glDrawBuffer
wglMakeCurrent
glVertex2i
glBegin
glLoadIdentity
wglCreateContext
glReadPixels
glDrawPixels
glMatrixMode
glEnd
glColor4i
comctl32
ord17
cabinet
ord10
ord14
ord11
ord13
msdelta
GetDeltaInfoB
DeltaFree
ApplyDeltaB
bcrypt
BCryptGenerateSymmetricKey
BCryptCloseAlgorithmProvider
BCryptOpenAlgorithmProvider
BCryptDecrypt
BCryptGetProperty
BCryptDestroyKey
Sections
.text Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ