Analysis
-
max time kernel
69s -
max time network
94s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 19:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-19_3c56709aaa2cf517aef6f78021a4c0eb_cobalt-strike_megazord.exe
Resource
win7-20241010-en
General
-
Target
2024-11-19_3c56709aaa2cf517aef6f78021a4c0eb_cobalt-strike_megazord.exe
-
Size
14.7MB
-
MD5
3c56709aaa2cf517aef6f78021a4c0eb
-
SHA1
1f3eb8a98ab052feffe67271046bd74f3323785e
-
SHA256
44862c2a9db11af1dc86f515dffa4b34cecca13c488af038cd69f99838376a66
-
SHA512
8c917400882348d4698eaf2259a63771847593ca3edfda22ff2a15bd7d43183629029c7605ca0b4194436b1d26e58e563ac1df69bbb73c171c4138ab0cc91d5b
-
SSDEEP
196608:TZdyirGA46KGiTjG1XG8gpmjX1fb4gYYdQZ2BHU:TrRGb1Tx8gkT4gY4s
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2876 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 1116 ServiceUpdate.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\ServiceUpdate.exe 2024-11-19_3c56709aaa2cf517aef6f78021a4c0eb_cobalt-strike_megazord.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2876 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2876 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 108 wrote to memory of 2892 108 2024-11-19_3c56709aaa2cf517aef6f78021a4c0eb_cobalt-strike_megazord.exe 30 PID 108 wrote to memory of 2892 108 2024-11-19_3c56709aaa2cf517aef6f78021a4c0eb_cobalt-strike_megazord.exe 30 PID 108 wrote to memory of 2892 108 2024-11-19_3c56709aaa2cf517aef6f78021a4c0eb_cobalt-strike_megazord.exe 30 PID 2892 wrote to memory of 2876 2892 cmd.exe 32 PID 2892 wrote to memory of 2876 2892 cmd.exe 32 PID 2892 wrote to memory of 2876 2892 cmd.exe 32 PID 108 wrote to memory of 1116 108 2024-11-19_3c56709aaa2cf517aef6f78021a4c0eb_cobalt-strike_megazord.exe 33 PID 108 wrote to memory of 1116 108 2024-11-19_3c56709aaa2cf517aef6f78021a4c0eb_cobalt-strike_megazord.exe 33 PID 108 wrote to memory of 1116 108 2024-11-19_3c56709aaa2cf517aef6f78021a4c0eb_cobalt-strike_megazord.exe 33 PID 1116 wrote to memory of 1524 1116 ServiceUpdate.exe 34 PID 1116 wrote to memory of 1524 1116 ServiceUpdate.exe 34 PID 1116 wrote to memory of 1524 1116 ServiceUpdate.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-19_3c56709aaa2cf517aef6f78021a4c0eb_cobalt-strike_megazord.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-19_3c56709aaa2cf517aef6f78021a4c0eb_cobalt-strike_megazord.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Windows\system32\cmd.exe"cmd.exe" /C powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\ServiceUpdate.exe'"2⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\ServiceUpdate.exe'"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
-
C:\Windows\ServiceUpdate.exe"C:\Windows\ServiceUpdate.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1116 -s 5323⤵PID:1524
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5cf04317fdd2c24d8e17e6d16a932faf6
SHA144c273ffa8adcb4b05bf7fb43865459b7748e8e9
SHA25668e54fb81888bf034822a4a1024a64825b75b66db6ed5cded4bfa877e3c501ca
SHA51293ffde81a9129586ead3766ec40bffab8caac3f3c9e1c855ac747fa7db2f95dcee45b9d8341f53ef801323e27eb0100e1c63886b02f6cb5c1b1c50afde5b861d