Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 19:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-19_3c56709aaa2cf517aef6f78021a4c0eb_cobalt-strike_megazord.exe
Resource
win7-20241010-en
General
-
Target
2024-11-19_3c56709aaa2cf517aef6f78021a4c0eb_cobalt-strike_megazord.exe
-
Size
14.7MB
-
MD5
3c56709aaa2cf517aef6f78021a4c0eb
-
SHA1
1f3eb8a98ab052feffe67271046bd74f3323785e
-
SHA256
44862c2a9db11af1dc86f515dffa4b34cecca13c488af038cd69f99838376a66
-
SHA512
8c917400882348d4698eaf2259a63771847593ca3edfda22ff2a15bd7d43183629029c7605ca0b4194436b1d26e58e563ac1df69bbb73c171c4138ab0cc91d5b
-
SSDEEP
196608:TZdyirGA46KGiTjG1XG8gpmjX1fb4gYYdQZ2BHU:TrRGb1Tx8gkT4gY4s
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4784 powershell.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 2024-11-19_3c56709aaa2cf517aef6f78021a4c0eb_cobalt-strike_megazord.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation ServiceUpdate.exe -
Executes dropped EXE 4 IoCs
pid Process 436 ServiceUpdate.exe 2120 WindowsUpdate.exe 5084 WindowsUpdate.exe 536 WindowsUpdate.exe -
resource yara_rule behavioral2/files/0x0009000000023c79-40.dat upx behavioral2/memory/2120-43-0x0000000000F00000-0x0000000000F64000-memory.dmp upx behavioral2/memory/2120-45-0x0000000000F00000-0x0000000000F64000-memory.dmp upx behavioral2/memory/5084-47-0x0000000000F00000-0x0000000000F64000-memory.dmp upx behavioral2/memory/536-50-0x0000000000F00000-0x0000000000F64000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceUpdate.exe 2024-11-19_3c56709aaa2cf517aef6f78021a4c0eb_cobalt-strike_megazord.exe File created C:\Windows\WindowsUpdate.exe ServiceUpdate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4784 powershell.exe 4784 powershell.exe 436 ServiceUpdate.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4784 powershell.exe Token: SeDebugPrivilege 436 ServiceUpdate.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2292 wrote to memory of 4472 2292 2024-11-19_3c56709aaa2cf517aef6f78021a4c0eb_cobalt-strike_megazord.exe 104 PID 2292 wrote to memory of 4472 2292 2024-11-19_3c56709aaa2cf517aef6f78021a4c0eb_cobalt-strike_megazord.exe 104 PID 4472 wrote to memory of 4784 4472 cmd.exe 106 PID 4472 wrote to memory of 4784 4472 cmd.exe 106 PID 2292 wrote to memory of 436 2292 2024-11-19_3c56709aaa2cf517aef6f78021a4c0eb_cobalt-strike_megazord.exe 108 PID 2292 wrote to memory of 436 2292 2024-11-19_3c56709aaa2cf517aef6f78021a4c0eb_cobalt-strike_megazord.exe 108 PID 436 wrote to memory of 2120 436 ServiceUpdate.exe 111 PID 436 wrote to memory of 2120 436 ServiceUpdate.exe 111 PID 436 wrote to memory of 2120 436 ServiceUpdate.exe 111 PID 436 wrote to memory of 5084 436 ServiceUpdate.exe 113 PID 436 wrote to memory of 5084 436 ServiceUpdate.exe 113 PID 436 wrote to memory of 5084 436 ServiceUpdate.exe 113 PID 436 wrote to memory of 536 436 ServiceUpdate.exe 116 PID 436 wrote to memory of 536 436 ServiceUpdate.exe 116 PID 436 wrote to memory of 536 436 ServiceUpdate.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-19_3c56709aaa2cf517aef6f78021a4c0eb_cobalt-strike_megazord.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-19_3c56709aaa2cf517aef6f78021a4c0eb_cobalt-strike_megazord.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\ServiceUpdate.exe'"2⤵
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\ServiceUpdate.exe'"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4784
-
-
-
C:\Windows\ServiceUpdate.exe"C:\Windows\ServiceUpdate.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\WindowsUpdate.exe"C:\Windows\WindowsUpdate.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2120
-
-
C:\Windows\WindowsUpdate.exe"C:\Windows\WindowsUpdate.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5084
-
-
C:\Windows\WindowsUpdate.exe"C:\Windows\WindowsUpdate.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:536
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
42KB
MD5cf04317fdd2c24d8e17e6d16a932faf6
SHA144c273ffa8adcb4b05bf7fb43865459b7748e8e9
SHA25668e54fb81888bf034822a4a1024a64825b75b66db6ed5cded4bfa877e3c501ca
SHA51293ffde81a9129586ead3766ec40bffab8caac3f3c9e1c855ac747fa7db2f95dcee45b9d8341f53ef801323e27eb0100e1c63886b02f6cb5c1b1c50afde5b861d
-
Filesize
153KB
MD5a00c0d77144d4e845e5f3587d9c7b20e
SHA1628ee41efd7cf32a9c6d6aa57a5a6b1ade0757a4
SHA25669cf88eaeef3d908c41e265df8fb29df59a7a631fd909e1eb039f72af18aefa3
SHA51238441644a3b2a7c7469ee8f4bd36d02219386be308d0e5529ab2280eb1e4f57fab033d08b83abd1860843c74edb89f60ed8abc4b22161976818bb90174906753