Analysis

  • max time kernel
    93s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/09/2024, 21:51 UTC

General

  • Target

    202409234a27f40979c27b52e3c7d3fa3069c246cobaltstrikepoetratsnatch.exe

  • Size

    22.4MB

  • MD5

    4a27f40979c27b52e3c7d3fa3069c246

  • SHA1

    7b2d0df594741ce1ea9d6b1b4106ba15fad8e837

  • SHA256

    6587e68c8e53df8abb6bbd312feaf054bf9986df2db98c5850b1fd92469c3053

  • SHA512

    e305aacc185d51f8feb942e6591e2b9f8f7f690bcd2dc643541ef794bd9af3c6d534029779f7b8b9c5583e6e0619f406f969d168a7dabd453a30c1c4806bf4ea

  • SSDEEP

    393216:1C2db4TD1/gzQnSegNPCQM2/psErTmlJhjePxnIX2Gf:Q2di4zQnSxJCQHscmNePxn82G

Malware Config

Signatures

  • An open source browser data exporter written in golang. 9 IoCs
  • HackBrowserData

    An open source golang web browser extractor.

  • Executes dropped EXE 6 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 6 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\202409234a27f40979c27b52e3c7d3fa3069c246cobaltstrikepoetratsnatch.exe
    "C:\Users\Admin\AppData\Local\Temp\202409234a27f40979c27b52e3c7d3fa3069c246cobaltstrikepoetratsnatch.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Users\Admin\script_cookie_encrypted.exe
      C:\Users\Admin\script_cookie_encrypted.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3888
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"
        3⤵
          PID:4612
      • C:\Users\Admin\rate.exe
        C:\Users\Admin\rate.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3692
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
          3⤵
            PID:1540
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
            3⤵
              PID:4604
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
              3⤵
                PID:1436
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
                3⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                PID:5052
            • C:\Users\Admin\rate.exe
              C:\Users\Admin\rate.exe
              2⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1360
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                3⤵
                • System Location Discovery: System Language Discovery
                PID:3376
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                3⤵
                  PID:116
              • C:\Users\Admin\rate.exe
                C:\Users\Admin\rate.exe
                2⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2288
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:3816
              • C:\Users\Admin\rate.exe
                C:\Users\Admin\rate.exe
                2⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2672
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:4936
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                  3⤵
                    PID:988
                • C:\Users\Admin\rate.exe
                  C:\Users\Admin\rate.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:3564
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:2040
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                    3⤵
                      PID:4232

                Network

                • flag-us
                  DNS
                  api.ipify.org
                  202409234a27f40979c27b52e3c7d3fa3069c246cobaltstrikepoetratsnatch.exe
                  Remote address:
                  8.8.8.8:53
                  Request
                  api.ipify.org
                  IN A
                  Response
                  api.ipify.org
                  IN A
                  104.26.13.205
                  api.ipify.org
                  IN A
                  104.26.12.205
                  api.ipify.org
                  IN A
                  172.67.74.152
                • flag-us
                  DNS
                  8.8.8.8.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  8.8.8.8.in-addr.arpa
                  IN PTR
                  Response
                  8.8.8.8.in-addr.arpa
                  IN PTR
                  dnsgoogle
                • flag-us
                  DNS
                  97.17.167.52.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  97.17.167.52.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  172.210.232.199.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  172.210.232.199.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  205.13.26.104.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  205.13.26.104.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  73.31.126.40.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  73.31.126.40.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  95.221.229.192.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  95.221.229.192.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  217.106.137.52.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  217.106.137.52.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  167.190.252.52.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  167.190.252.52.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  77.190.18.2.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  77.190.18.2.in-addr.arpa
                  IN PTR
                  Response
                  77.190.18.2.in-addr.arpa
                  IN PTR
                  a2-18-190-77deploystaticakamaitechnologiescom
                • flag-us
                  DNS
                  197.87.175.4.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  197.87.175.4.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  241.42.69.40.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  241.42.69.40.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  217.135.221.88.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  217.135.221.88.in-addr.arpa
                  IN PTR
                  Response
                  217.135.221.88.in-addr.arpa
                  IN PTR
                  a88-221-135-217deploystaticakamaitechnologiescom
                • flag-us
                  DNS
                  api.telegram.org
                  202409234a27f40979c27b52e3c7d3fa3069c246cobaltstrikepoetratsnatch.exe
                  Remote address:
                  8.8.8.8:53
                  Request
                  api.telegram.org
                  IN A
                  Response
                  api.telegram.org
                  IN A
                  149.154.167.220
                • flag-us
                  DNS
                  220.167.154.149.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  220.167.154.149.in-addr.arpa
                  IN PTR
                  Response
                • 104.26.13.205:443
                  api.ipify.org
                  tls
                  202409234a27f40979c27b52e3c7d3fa3069c246cobaltstrikepoetratsnatch.exe
                  2.4kB
                  5.1kB
                  16
                  14
                • 52.252.190.167:56001
                  jsc.exe
                  3.7kB
                  4.1kB
                  32
                  29
                • 149.154.167.220:443
                  api.telegram.org
                  tls
                  202409234a27f40979c27b52e3c7d3fa3069c246cobaltstrikepoetratsnatch.exe
                  4.0kB
                  7.7kB
                  16
                  15
                • 8.8.8.8:53
                  api.ipify.org
                  dns
                  202409234a27f40979c27b52e3c7d3fa3069c246cobaltstrikepoetratsnatch.exe
                  59 B
                  107 B
                  1
                  1

                  DNS Request

                  api.ipify.org

                  DNS Response

                  104.26.13.205
                  104.26.12.205
                  172.67.74.152

                • 8.8.8.8:53
                  8.8.8.8.in-addr.arpa
                  dns
                  66 B
                  90 B
                  1
                  1

                  DNS Request

                  8.8.8.8.in-addr.arpa

                • 8.8.8.8:53
                  97.17.167.52.in-addr.arpa
                  dns
                  71 B
                  145 B
                  1
                  1

                  DNS Request

                  97.17.167.52.in-addr.arpa

                • 8.8.8.8:53
                  172.210.232.199.in-addr.arpa
                  dns
                  74 B
                  128 B
                  1
                  1

                  DNS Request

                  172.210.232.199.in-addr.arpa

                • 8.8.8.8:53
                  205.13.26.104.in-addr.arpa
                  dns
                  72 B
                  134 B
                  1
                  1

                  DNS Request

                  205.13.26.104.in-addr.arpa

                • 8.8.8.8:53
                  73.31.126.40.in-addr.arpa
                  dns
                  71 B
                  157 B
                  1
                  1

                  DNS Request

                  73.31.126.40.in-addr.arpa

                • 8.8.8.8:53
                  95.221.229.192.in-addr.arpa
                  dns
                  73 B
                  144 B
                  1
                  1

                  DNS Request

                  95.221.229.192.in-addr.arpa

                • 8.8.8.8:53
                  217.106.137.52.in-addr.arpa
                  dns
                  73 B
                  147 B
                  1
                  1

                  DNS Request

                  217.106.137.52.in-addr.arpa

                • 8.8.8.8:53
                  167.190.252.52.in-addr.arpa
                  dns
                  73 B
                  147 B
                  1
                  1

                  DNS Request

                  167.190.252.52.in-addr.arpa

                • 8.8.8.8:53
                  77.190.18.2.in-addr.arpa
                  dns
                  70 B
                  133 B
                  1
                  1

                  DNS Request

                  77.190.18.2.in-addr.arpa

                • 8.8.8.8:53
                  197.87.175.4.in-addr.arpa
                  dns
                  71 B
                  157 B
                  1
                  1

                  DNS Request

                  197.87.175.4.in-addr.arpa

                • 8.8.8.8:53
                  241.42.69.40.in-addr.arpa
                  dns
                  71 B
                  145 B
                  1
                  1

                  DNS Request

                  241.42.69.40.in-addr.arpa

                • 8.8.8.8:53
                  217.135.221.88.in-addr.arpa
                  dns
                  73 B
                  139 B
                  1
                  1

                  DNS Request

                  217.135.221.88.in-addr.arpa

                • 8.8.8.8:53
                  api.telegram.org
                  dns
                  202409234a27f40979c27b52e3c7d3fa3069c246cobaltstrikepoetratsnatch.exe
                  62 B
                  78 B
                  1
                  1

                  DNS Request

                  api.telegram.org

                  DNS Response

                  149.154.167.220

                • 8.8.8.8:53
                  220.167.154.149.in-addr.arpa
                  dns
                  74 B
                  167 B
                  1
                  1

                  DNS Request

                  220.167.154.149.in-addr.arpa

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AddInProcess32.exe.log

                  Filesize

                  517B

                  MD5

                  3334ecde6536c93e216decce323cbe3e

                  SHA1

                  277f9a4e3a14c5dbe6b92fabac8b2050cab3629b

                  SHA256

                  494fcff7f11e2d7ea9abfbf91d6dea2595388ab4c45269e5fd74c82796d0a76a

                  SHA512

                  2830773d60aa9fe73c7e0a28502e198d931422b4a1df9a0b844d3952bb0aed7aa2b5da39e1adf145c9e6c2f75a33560da23c9b2b774fb38718bde066eafcad9d

                • C:\Users\Admin\AppData\Local\Temp\Local Storage\leveldb_7.temp\CURRENT.5

                  Filesize

                  16B

                  MD5

                  9f36605efba98dab15728fe8b5538aa0

                  SHA1

                  6a7cff514ae159a59b70f27dde52a3a5dd01b1c8

                  SHA256

                  9c283f6e81028b9eb0760d918ee4bc0aa256ed3b926393c1734c760c4bd724fd

                  SHA512

                  1893aa3d1abcf7f9e83911468fa2eeb2ad1d7e23f4586bd6c4d76f9f96a645c15e63e44da55700347165e97b6ac412e6d495b81c3da9faa61d617c7a71a7404c

                • C:\Users\Admin\AppData\Local\Temp\Session Storage_8.temp\CURRENT.bak

                  Filesize

                  16B

                  MD5

                  46295cac801e5d4857d09837238a6394

                  SHA1

                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                  SHA256

                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                  SHA512

                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                • C:\Users\Admin\AppData\Local\Temp\Session Storage_8.temp\MANIFEST-000001

                  Filesize

                  41B

                  MD5

                  5af87dfd673ba2115e2fcf5cfdb727ab

                  SHA1

                  d5b5bbf396dc291274584ef71f444f420b6056f1

                  SHA256

                  f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                  SHA512

                  de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                • C:\Users\Admin\rate.exe

                  Filesize

                  3.6MB

                  MD5

                  0c8bc5317e4b23f1e6dd3a2b7af70255

                  SHA1

                  49dd70a5dfb41a77806f0abb0b9f54d0cd01d652

                  SHA256

                  af847306fa5457d15f4d378e2622f6ff3f92c9a093810f760bf1f3cc91aacb7f

                  SHA512

                  e95a567a70df88ac1226fd4973a6103f195c38f1790750047feead51b186434d88ab5a525c77cbe509f6fa8d8c90b77fac9daf2a48d31f85db12ab1b11863878

                • C:\Users\Admin\results\chrome_default_extension.csv

                  Filesize

                  302B

                  MD5

                  81b496ce1578a88f74dcf1b5a09f98b5

                  SHA1

                  ec5b2723bf4f88d001069fccd5300096c5955d0b

                  SHA256

                  5c99c6eb19efecfdcb5da9e8e547ce78065d0de4e7dcc4b70166d03d0870b7d5

                  SHA512

                  b72794dfb6955f8a2c102d072cd650617d08ca94805c791e4549ec2b326b8b896d872f848f701ebbad46342da6df051a3799af5434092b167a233a23978e580f

                • C:\Users\Admin\results\chrome_default_sessionstorage.csv

                  Filesize

                  34B

                  MD5

                  d07886f7107c50304e1b9cde0793ed04

                  SHA1

                  41453a6e9db25a06b4ef031c12fdcee8a3818741

                  SHA256

                  963b596f0385f5be1b8ad2f7e5b4ff474aeb1a1a8d17d20ff67a1cd30ca70344

                  SHA512

                  a917504c89a8ec7b8fc5d89a683fce01ce45a160dbb98861cc2432c221a2f3e7aca15b7325967c171e2de2d7ce26ffa01ecef49c7b896b1a16daa5a3125eb4ca

                • C:\Users\Admin\script_cookie_encrypted.exe

                  Filesize

                  11.2MB

                  MD5

                  b50c04edf22d51016e00d6f385b41cc7

                  SHA1

                  22295a90e102a3ffdada9f52230fb9e604bac281

                  SHA256

                  2a7cae1fd866ff4f11e5c41c428b9b3c1078df3b523706d8a5145c55bd359ba9

                  SHA512

                  a574405593129fd729d8bf5fdcf6813cb68870cbb1124969def626db06069ccb2e18841c73ca5f34f71d33b4edd9c1982b6282a6f3e66b645e1043eff45f1f73

                • memory/3692-10-0x00007FFCEFAF3000-0x00007FFCEFAF5000-memory.dmp

                  Filesize

                  8KB

                • memory/3692-9-0x0000024781DE0000-0x0000024781DE8000-memory.dmp

                  Filesize

                  32KB

                • memory/3692-179-0x000002479C4D0000-0x000002479C580000-memory.dmp

                  Filesize

                  704KB

                • memory/4612-45-0x0000000000400000-0x0000000000DED000-memory.dmp

                  Filesize

                  9.9MB

                • memory/4612-48-0x0000000000400000-0x0000000000DED000-memory.dmp

                  Filesize

                  9.9MB

                • memory/4612-12-0x0000000000400000-0x0000000000DED000-memory.dmp

                  Filesize

                  9.9MB

                • memory/4612-13-0x0000000000400000-0x0000000000DED000-memory.dmp

                  Filesize

                  9.9MB

                • memory/4612-174-0x0000000000400000-0x0000000000DED000-memory.dmp

                  Filesize

                  9.9MB

                • memory/4612-16-0x0000000000400000-0x0000000000DED000-memory.dmp

                  Filesize

                  9.9MB

                • memory/4612-15-0x0000000000400000-0x0000000000DED000-memory.dmp

                  Filesize

                  9.9MB

                • memory/4612-14-0x0000000000400000-0x0000000000DED000-memory.dmp

                  Filesize

                  9.9MB

                • memory/4612-4-0x0000000000400000-0x0000000000DED000-memory.dmp

                  Filesize

                  9.9MB

                • memory/5052-180-0x0000000000400000-0x000000000045C000-memory.dmp

                  Filesize

                  368KB

                • memory/5052-182-0x0000000004F20000-0x0000000004FDA000-memory.dmp

                  Filesize

                  744KB

                • memory/5052-183-0x0000000005080000-0x00000000050E6000-memory.dmp

                  Filesize

                  408KB

                We care about your privacy.

                This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.