Analysis

  • max time kernel
    95s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/09/2024, 22:00

General

  • Target

    202409237cbe4acc2760708e7190b160585eee77cobaltstrikepoetratsnatch.exe

  • Size

    22.4MB

  • MD5

    7cbe4acc2760708e7190b160585eee77

  • SHA1

    01e7fece2462724c7ce6d5a9152500a09dfcd667

  • SHA256

    1402b75764fd726cf62364af9d6bf9449e3415682e8d0ecbc017deb8b23808a9

  • SHA512

    c5495047b8fc4d4c81323f63a4e8feca77090f1fcb4ecbc53496c1fd609a3676fd339e9147647ce75d9e3640f3c285cb19f0988d08486077020765872e5c9200

  • SSDEEP

    393216:692DO8D1/gzQnSegNPCQM2/psErTmlJhjePxnIGuYebQZ:G2D4zQnSxJCQHscmNePxnlDebQ

Malware Config

Signatures

  • An open source browser data exporter written in golang. 9 IoCs
  • HackBrowserData

    An open source golang web browser extractor.

  • Executes dropped EXE 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\202409237cbe4acc2760708e7190b160585eee77cobaltstrikepoetratsnatch.exe
    "C:\Users\Admin\AppData\Local\Temp\202409237cbe4acc2760708e7190b160585eee77cobaltstrikepoetratsnatch.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1036
    • C:\Users\Admin\script_cookie_encrypted.exe
      C:\Users\Admin\script_cookie_encrypted.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4784
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"
        3⤵
          PID:3456
      • C:\Users\Admin\rate.exe
        C:\Users\Admin\rate.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:624
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:3668
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
          3⤵
            PID:3828

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Local Storage\leveldb_7.temp\CURRENT.bak

        Filesize

        16B

        MD5

        46295cac801e5d4857d09837238a6394

        SHA1

        44e0fa1b517dbf802b18faf0785eeea6ac51594b

        SHA256

        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

        SHA512

        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

      • C:\Users\Admin\AppData\Local\Temp\Local Storage\leveldb_7.temp\MANIFEST-000001

        Filesize

        41B

        MD5

        5af87dfd673ba2115e2fcf5cfdb727ab

        SHA1

        d5b5bbf396dc291274584ef71f444f420b6056f1

        SHA256

        f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

        SHA512

        de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

      • C:\Users\Admin\rate.exe

        Filesize

        3.6MB

        MD5

        0c8bc5317e4b23f1e6dd3a2b7af70255

        SHA1

        49dd70a5dfb41a77806f0abb0b9f54d0cd01d652

        SHA256

        af847306fa5457d15f4d378e2622f6ff3f92c9a093810f760bf1f3cc91aacb7f

        SHA512

        e95a567a70df88ac1226fd4973a6103f195c38f1790750047feead51b186434d88ab5a525c77cbe509f6fa8d8c90b77fac9daf2a48d31f85db12ab1b11863878

      • C:\Users\Admin\script_cookie_encrypted.exe

        Filesize

        11.2MB

        MD5

        b50c04edf22d51016e00d6f385b41cc7

        SHA1

        22295a90e102a3ffdada9f52230fb9e604bac281

        SHA256

        2a7cae1fd866ff4f11e5c41c428b9b3c1078df3b523706d8a5145c55bd359ba9

        SHA512

        a574405593129fd729d8bf5fdcf6813cb68870cbb1124969def626db06069ccb2e18841c73ca5f34f71d33b4edd9c1982b6282a6f3e66b645e1043eff45f1f73

      • memory/624-10-0x00007FFAA4C23000-0x00007FFAA4C25000-memory.dmp

        Filesize

        8KB

      • memory/624-9-0x00000297B8410000-0x00000297B8418000-memory.dmp

        Filesize

        32KB

      • memory/624-160-0x00000297D2A50000-0x00000297D2B00000-memory.dmp

        Filesize

        704KB

      • memory/3456-41-0x0000000000400000-0x0000000000DED000-memory.dmp

        Filesize

        9.9MB

      • memory/3456-16-0x0000000000400000-0x0000000000DED000-memory.dmp

        Filesize

        9.9MB

      • memory/3456-15-0x0000000000400000-0x0000000000DED000-memory.dmp

        Filesize

        9.9MB

      • memory/3456-38-0x0000000000400000-0x0000000000DED000-memory.dmp

        Filesize

        9.9MB

      • memory/3456-12-0x0000000000400000-0x0000000000DED000-memory.dmp

        Filesize

        9.9MB

      • memory/3456-14-0x0000000000400000-0x0000000000DED000-memory.dmp

        Filesize

        9.9MB

      • memory/3456-5-0x0000000000400000-0x0000000000DED000-memory.dmp

        Filesize

        9.9MB

      • memory/3456-155-0x0000000000400000-0x0000000000DED000-memory.dmp

        Filesize

        9.9MB

      • memory/3456-13-0x0000000000400000-0x0000000000DED000-memory.dmp

        Filesize

        9.9MB

      • memory/3668-161-0x0000000000400000-0x000000000045C000-memory.dmp

        Filesize

        368KB

      • memory/3668-162-0x0000000005850000-0x000000000590A000-memory.dmp

        Filesize

        744KB

      • memory/3668-163-0x0000000005910000-0x0000000005976000-memory.dmp

        Filesize

        408KB