Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 07:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-28_d7d1fa33325a6e19694456fff690d50b_cobalt-strike_hijackloader_ryuk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-28_d7d1fa33325a6e19694456fff690d50b_cobalt-strike_hijackloader_ryuk.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-28_d7d1fa33325a6e19694456fff690d50b_cobalt-strike_hijackloader_ryuk.exe
-
Size
27.6MB
-
MD5
d7d1fa33325a6e19694456fff690d50b
-
SHA1
35e9c4fdda414a33de57c70d666d88ae87cc622a
-
SHA256
9a48fc78ecd173b8a61b1104b1da2ab8d9d44c1f2fc96b00370abae3221b0127
-
SHA512
f9373e9bc52696275426aa84c1ccb2aa345c114cc22e0c74fad4fcf458e16853c4b89940845fc7313f180ebecf1ff578f1fbce1c087825c25a10e2b7c4e11a0d
-
SSDEEP
393216:u9bQVj4y/KKWTJRmSQh2AYrjq/6yq0B4qUWBUQn9o2f03kND5/wPP8Mz:u9bk/9IESQhge/6F0BWW2QnGki8Mz
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" reg.exe -
Executes dropped EXE 2 IoCs
pid Process 2652 iToolsAVMTask.exe 1924 letsvpn-latest.exe -
Loads dropped DLL 10 IoCs
pid Process 2652 iToolsAVMTask.exe 2652 iToolsAVMTask.exe 2652 iToolsAVMTask.exe 2652 iToolsAVMTask.exe 2652 iToolsAVMTask.exe 2652 iToolsAVMTask.exe 2652 iToolsAVMTask.exe 1924 letsvpn-latest.exe 1924 letsvpn-latest.exe 1924 letsvpn-latest.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
pid Process 2104 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iToolsAVMTask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language letsvpn-latest.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 480 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2104 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1924 letsvpn-latest.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeShutdownPrivilege 2316 2024-09-28_d7d1fa33325a6e19694456fff690d50b_cobalt-strike_hijackloader_ryuk.exe Token: 33 2748 mmc.exe Token: SeIncBasePriorityPrivilege 2748 mmc.exe Token: 33 2748 mmc.exe Token: SeIncBasePriorityPrivilege 2748 mmc.exe Token: 33 1648 mmc.exe Token: SeIncBasePriorityPrivilege 1648 mmc.exe Token: 33 1648 mmc.exe Token: SeIncBasePriorityPrivilege 1648 mmc.exe Token: SeDebugPrivilege 2104 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2748 mmc.exe 2748 mmc.exe 2652 iToolsAVMTask.exe 1648 mmc.exe 1648 mmc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2972 2316 2024-09-28_d7d1fa33325a6e19694456fff690d50b_cobalt-strike_hijackloader_ryuk.exe 31 PID 2316 wrote to memory of 2972 2316 2024-09-28_d7d1fa33325a6e19694456fff690d50b_cobalt-strike_hijackloader_ryuk.exe 31 PID 2316 wrote to memory of 2972 2316 2024-09-28_d7d1fa33325a6e19694456fff690d50b_cobalt-strike_hijackloader_ryuk.exe 31 PID 2972 wrote to memory of 480 2972 cmd.exe 33 PID 2972 wrote to memory of 480 2972 cmd.exe 33 PID 2972 wrote to memory of 480 2972 cmd.exe 33 PID 2316 wrote to memory of 1932 2316 2024-09-28_d7d1fa33325a6e19694456fff690d50b_cobalt-strike_hijackloader_ryuk.exe 34 PID 2316 wrote to memory of 1932 2316 2024-09-28_d7d1fa33325a6e19694456fff690d50b_cobalt-strike_hijackloader_ryuk.exe 34 PID 2316 wrote to memory of 1932 2316 2024-09-28_d7d1fa33325a6e19694456fff690d50b_cobalt-strike_hijackloader_ryuk.exe 34 PID 2316 wrote to memory of 2804 2316 2024-09-28_d7d1fa33325a6e19694456fff690d50b_cobalt-strike_hijackloader_ryuk.exe 36 PID 2316 wrote to memory of 2804 2316 2024-09-28_d7d1fa33325a6e19694456fff690d50b_cobalt-strike_hijackloader_ryuk.exe 36 PID 2316 wrote to memory of 2804 2316 2024-09-28_d7d1fa33325a6e19694456fff690d50b_cobalt-strike_hijackloader_ryuk.exe 36 PID 2804 wrote to memory of 2780 2804 cmd.exe 38 PID 2804 wrote to memory of 2780 2804 cmd.exe 38 PID 2804 wrote to memory of 2780 2804 cmd.exe 38 PID 2804 wrote to memory of 2716 2804 cmd.exe 39 PID 2804 wrote to memory of 2716 2804 cmd.exe 39 PID 2804 wrote to memory of 2716 2804 cmd.exe 39 PID 2804 wrote to memory of 2700 2804 cmd.exe 40 PID 2804 wrote to memory of 2700 2804 cmd.exe 40 PID 2804 wrote to memory of 2700 2804 cmd.exe 40 PID 2316 wrote to memory of 2936 2316 2024-09-28_d7d1fa33325a6e19694456fff690d50b_cobalt-strike_hijackloader_ryuk.exe 41 PID 2316 wrote to memory of 2936 2316 2024-09-28_d7d1fa33325a6e19694456fff690d50b_cobalt-strike_hijackloader_ryuk.exe 41 PID 2316 wrote to memory of 2936 2316 2024-09-28_d7d1fa33325a6e19694456fff690d50b_cobalt-strike_hijackloader_ryuk.exe 41 PID 2748 wrote to memory of 2652 2748 mmc.exe 44 PID 2748 wrote to memory of 2652 2748 mmc.exe 44 PID 2748 wrote to memory of 2652 2748 mmc.exe 44 PID 2748 wrote to memory of 2652 2748 mmc.exe 44 PID 1648 wrote to memory of 1924 1648 mmc.exe 46 PID 1648 wrote to memory of 1924 1648 mmc.exe 46 PID 1648 wrote to memory of 1924 1648 mmc.exe 46 PID 1648 wrote to memory of 1924 1648 mmc.exe 46 PID 1924 wrote to memory of 2104 1924 letsvpn-latest.exe 47 PID 1924 wrote to memory of 2104 1924 letsvpn-latest.exe 47 PID 1924 wrote to memory of 2104 1924 letsvpn-latest.exe 47 PID 1924 wrote to memory of 2104 1924 letsvpn-latest.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-28_d7d1fa33325a6e19694456fff690d50b_cobalt-strike_hijackloader_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-28_d7d1fa33325a6e19694456fff690d50b_cobalt-strike_hijackloader_ryuk.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /all2⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\system32\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:480
-
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" -f C:\ProgramData\b956u.xml2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1932
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Roaming\2ADt8.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t reg_dword /d 0 /F3⤵
- UAC bypass
PID:2780
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t reg_dword /d 0 /F3⤵
- UAC bypass
PID:2716
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v PromptOnSecureDesktop /t reg_dword /d 0 /F3⤵
- UAC bypass
PID:2700
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /b C:\ProgramData\WqF5L\NWR5b~16\s+C:\ProgramData\WqF5L\NWR5b~16\a C:\ProgramData\WqF5L\NWR5b~16\TSLib.dll2⤵PID:2936
-
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\ProgramData\WqF5L\NWR5b~16\iToolsAVMTask.exe"C:\ProgramData\WqF5L\NWR5b~16\iToolsAVMTask.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2652
-
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\ProgramData\letsvpn-latest.exe"C:\ProgramData\letsvpn-latest.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -inputformat none -ExecutionPolicy Bypass -Command "If ($env:PROCESSOR_ARCHITEW6432) { $env:PROCESSOR_ARCHITEW6432 } Else { $env:PROCESSOR_ARCHITECTURE }"3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
444KB
MD5fd5cabbe52272bd76007b68186ebaf00
SHA1efd1e306c1092c17f6944cc6bf9a1bfad4d14613
SHA25687c42ca155473e4e71857d03497c8cbc28fa8ff7f2c8d72e8a1f39b71078f608
SHA5121563c8257d85274267089cd4aeac0884a2a300ff17f84bdb64d567300543aa9cd57101d8408d0077b01a600ddf2e804f7890902c2590af103d2c53ff03d9e4a5
-
Filesize
948KB
MD5034ccadc1c073e4216e9466b720f9849
SHA1f19e9d8317161edc7d3e963cc0fc46bd5e4a55a1
SHA25686e39b5995af0e042fcdaa85fe2aefd7c9ddc7ad65e6327bd5e7058bc3ab615f
SHA5125f11ef92d936669ee834a5cef5c7d0e7703bf05d03dc4f09b9dcfe048d7d5adfaab6a9c7f42e8080a5e9aad44a35f39f3940d5cca20623d9cafe373c635570f7
-
Filesize
204KB
MD558db5aa08fc3e68c05c41c58c09ee1a0
SHA1443317c7ab51bed50bbaa90ab9c43d7d0a371b5d
SHA2567e14d04ff4edf6e6f062184cdd41d7b1d8964be8117fa5c8d3f00c03ad6c8eac
SHA512017dde32345e0518991198a047d3dc01caf5e3fae9730b8e69e80b0033a0f62c5abd5cb339c9b3130c0012caca2d14fd67067621fe621b8b31b24a90c4196902
-
Filesize
231KB
MD54a5177de87d2ddb2e37fb334e1dd7364
SHA1fa7eb1581767cea7e6e0a91ea8453b2ec3907bce
SHA25650b27360888f2e25f5105acc7ff756a981de01af3b6d0376b9b40d565f67d3b2
SHA51246639342202800fdb3c7730e77a842ba564e132370eb62734173cc7b1db3a7a1528b74ac179fa021b9df03a0354def3a7867a4b46d570e6522906dcd4706f3bf
-
Filesize
353KB
MD593fffe6278513969f1763c74771af352
SHA1a9cba645ce1c10534b5ddbfd24846084fad3298b
SHA2563a042c0f373e48523760be41a0eebe51410a598641777c7ae4295b4f2e0cc185
SHA512d682e5da2d6223d01b25d6bb6464e16f8ef6e7460f5aac16501ea3c9ac9263fc2848dbb0ecccc4a8edf7a84ab886e753dd7b17cc48911ddd7735ba556eb6afc1
-
Filesize
643KB
MD5de97956ca645f2ff3af8abb2ddee8525
SHA1cac8bf1452795fc5d79c581a2f432735876037ef
SHA256283b86e04c42ad51de61af556163aeca222ebc3430433f37f11e70c035cbdadd
SHA5123d639c68cdb15e8d3a7a114790ae60a19378a7dfb0e56a0af95fccfec9b561eeee9b2345fbf48b8f3864fee56e1ec7786bde4545125561c0f03624006144718a
-
Filesize
515KB
MD53f2e14def6a0937dad09c7dcdde028f9
SHA116c9c6ad2337f24905e55b38e41134e9a7a248e6
SHA25655fc51e1ab6226b725f9aa8d9703514280b9405d37d507085fdb9d0fa2aecfec
SHA5121b81ce19b34e60af9236c45192fcea88b15753461c4cb88451981a2476254e5c711b3fc1382856286299e10d7ecf84b85e8d1c0213dda3755860924f598262b5
-
Filesize
109KB
MD5cf418dbccbfec6df4ca9de57d3d09e00
SHA11316b2eabb4dd172657585b229de08fb5e067799
SHA256b6901aee4202968a57bfef4ec599c35d2f6ffca3584b2835b7234c49e4b01e40
SHA51202c46b69f08d7acc9a4364cf827f113a2e970335c959c9cb6b6863ca9c935a748ac61fd1e3dbbb423a30dffb7c08f420ed6fff31ad376b32b00063e9241cee86
-
Filesize
176KB
MD599a4d2a919eeb78ce2428096a19d8be7
SHA1d069b49171dba3fe560c2b9dd782132831f6b4f2
SHA2567c7edb12d33c2483dbbd7ef7bc0184ffd5ce077b70686ce82a15e7b93283a6ca
SHA512d049a7532cf05235e3fdaf13344f1bbb2b9b0f96e4270a7096fa8b5863a1c67191768c9d0055d488417abbd3e34e1b1c79a4a0618a21392066d5b81cd8a71a11
-
Filesize
446KB
MD5e4d5dd31c405c19c69180d4e2206bab5
SHA11f01c589d383f361b4bb442476592f03ce10d173
SHA256b78c80aad5b20278e54b64f74dc8f98ab573d48b133d1a9178c53e57d8e5258f
SHA51235f46c8d33fa761e91169138f38beec5e51d735b23e4ca3894e7b0daf4c687a7f22029a2c8b80d1c46cefd5c2e7697f74646eedb8aa3161efc4fd142485562ff
-
Filesize
176KB
MD59a10d11cbc41b8b24403e07a2c6d70ab
SHA129b0c3727dc69b9b865d1eb5f08d1345fb528e18
SHA256c708b225c8d8eea884e3af3a46e14b498f05b9994da31d42f1208aa2b38c1a18
SHA512859ef3648c5d73b04703e6e43783e9967253f78ef6239e88fe098fe869602f8a3b4aa70a0f45f1e48aa4811a17ed3f559849d5cd7e4dcdb1ba34dd398b2ff21f
-
Filesize
14.5MB
MD594f6bd702b7a2e17c45d16eaf7da0d64
SHA145f8c05851bcf16416e087253ce962b320e9db8a
SHA25607f44325eab13b01d536a42e90a0247c6efecf23ccd4586309828aa814f5c776
SHA5127ffc5183d3f1fb23e38c60d55724ab9e9e1e3832c9fb09296f0635f78d81477c6894c00a28e63096fa395e1c11cbeaa1f77f910f9ff9c1f1ecf0b857aa671b3d
-
Filesize
392B
MD530d6eb22d6aeec10347239b17b023bf4
SHA1e2a6f86d66c699f6e0ff1ac4e140af4a2a4637d1
SHA256659df6b190a0b92fc34e3a4457b4a8d11a26a4caf55de64dfe79eb1276181f08
SHA512500872c3f2f3f801ec51717690873194675cb7f32cc4a862c09d90c18638d364d49b0e04c32323f52734e5c806e3503a63ac755c7019d762786a72840123df76
-
Filesize
11KB
MD575ed96254fbf894e42058062b4b4f0d1
SHA1996503f1383b49021eb3427bc28d13b5bbd11977
SHA256a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7
SHA51258174896db81d481947b8745dafe3a02c150f3938bb4543256e8cce1145154e016d481df9fe68dac6d48407c62cbe20753320ebd5fe5e84806d07ce78e0eb0c4
-
Filesize
9KB
MD5ca95c9da8cef7062813b989ab9486201
SHA1c555af25df3de51aa18d487d47408d5245dba2d1
SHA256feb6364375d0ab081e9cdf11271c40cb966af295c600903383b0730f0821c0be
SHA512a30d94910204d1419c803dc12d90a9d22f63117e4709b1a131d8c4d5ead7e4121150e2c8b004a546b33c40c294df0a74567013001f55f37147d86bb847d7bbc9
-
Filesize
6KB
MD53d366250fcf8b755fce575c75f8c79e4
SHA12ebac7df78154738d41aac8e27d7a0e482845c57
SHA2568bdd996ae4778c6f829e2bcb651c55efc9ec37eeea17d259e013b39528dddbb6
SHA51267d2d88de625227ccd2cb406b4ac3a215d1770d385c985a44e2285490f49b45f23ce64745b24444e2a0f581335fda02e913b92781043e8dfd287844435ba9094