Analysis

  • max time kernel
    92s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 14:26

General

  • Target

    2024-11-20_ceefbc73808897bf4eca84f41cb4ace7_cobalt-strike_luca-stealer_magniber_sliver.exe

  • Size

    9.1MB

  • MD5

    ceefbc73808897bf4eca84f41cb4ace7

  • SHA1

    a7db2acaded8246c0c055edf4dac32a004b4cf3b

  • SHA256

    f6236a45207057e0326f9da4c09e6990721ee2460f191a64963cdab94c899828

  • SHA512

    5756f7db2072b4b8acb29c4366f01205ccf4f03a584d1edd05d651711bb09f20182da5d0c7a72f758f562b071ccf06271d7766f9e85e9a28d0a6326bc1b40efb

  • SSDEEP

    98304:lQDws8wjVIKohJKt/VNdN1YeT007kxa+PZCN3RIYYAcMFCs:OL80IKIJKttNDK9076LZCN3R9xFh

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-11-20_ceefbc73808897bf4eca84f41cb4ace7_cobalt-strike_luca-stealer_magniber_sliver.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-11-20_ceefbc73808897bf4eca84f41cb4ace7_cobalt-strike_luca-stealer_magniber_sliver.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2052
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    PID:4152

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\System32\alg.exe

    Filesize

    1.3MB

    MD5

    4033f5f7003208f9e95cc872ad776c6c

    SHA1

    c6b5a4d41a80002fcfc030a325fccb7fb98a203d

    SHA256

    0c9bbefb9095fa91d2c01476bebc9d37b8abead9ab0b02388b76f9551d81d52c

    SHA512

    e966a6010f41416b84b268be0d234a68c36228d8e99c873f5e6d94400dad4695d34e3137ebb3713a0d78ea1b5ea63a087603631d028c79b03ea4f0b22afea563

  • memory/2052-0-0x0000000140000000-0x0000000140927000-memory.dmp

    Filesize

    9.2MB

  • memory/2052-7-0x00000000007B0000-0x0000000000810000-memory.dmp

    Filesize

    384KB

  • memory/2052-1-0x00000000007B0000-0x0000000000810000-memory.dmp

    Filesize

    384KB

  • memory/2052-13-0x00000000007B0000-0x0000000000810000-memory.dmp

    Filesize

    384KB

  • memory/2052-15-0x0000000140000000-0x0000000140927000-memory.dmp

    Filesize

    9.2MB

  • memory/4152-17-0x0000000140000000-0x00000001401E9000-memory.dmp

    Filesize

    1.9MB

  • memory/4152-18-0x0000000140000000-0x00000001401E9000-memory.dmp

    Filesize

    1.9MB