Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250502-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250502-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/05/2025, 08:32

General

  • Target

    2025-05-20_c67dd6e6528753aad5cfd228b68d9468_black-basta_cobalt-strike_elex_luca-stealer.exe

  • Size

    570KB

  • MD5

    c67dd6e6528753aad5cfd228b68d9468

  • SHA1

    a61ffbe31fc355ffa535cfe90e325ecf6ff3a4e1

  • SHA256

    d2c9c7c9c025566bf2cf270f8b8e3fd6233bba864c623162625313db67fa2c78

  • SHA512

    1df698071f782c2508aab9e48523a15cb2e4ee42ca100ca31daf22fe93d9078fe63516c79d08ac3125bb134f4a03604a5fa7b38fe64afa3ba5506013ed0d29ae

  • SSDEEP

    12288:zENN+T5xYrllrU7QY6e/J+CtaxnjZpAbxdxDcWcnR4bfXfwiSeiw8xHgbYpj58Ni:Z5xolYQY62el3+s0DvfeUYqcZQCGm4Y/

Malware Config

Signatures

  • Detects Mofksys worm 5 IoCs
  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Mofksys

    Mofksys is a worm written in VisualBasic.

  • Mofksys family
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-05-20_c67dd6e6528753aad5cfd228b68d9468_black-basta_cobalt-strike_elex_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-05-20_c67dd6e6528753aad5cfd228b68d9468_black-basta_cobalt-strike_elex_luca-stealer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1228
    • \??\c:\users\admin\appdata\local\temp\2025-05-20_c67dd6e6528753aad5cfd228b68d9468_black-basta_cobalt-strike_elex_luca-stealer.exe 
      c:\users\admin\appdata\local\temp\2025-05-20_c67dd6e6528753aad5cfd228b68d9468_black-basta_cobalt-strike_elex_luca-stealer.exe 
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2136
    • C:\Users\Admin\AppData\Local\icsys.icn.exe
      C:\Users\Admin\AppData\Local\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1164
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visiblity of hidden/system files in Explorer
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3056
        • \??\c:\windows\system\spoolsv.exe
          c:\windows\system\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:6040
          • \??\c:\windows\system\svchost.exe
            c:\windows\system\svchost.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:5060
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:1064
            • C:\Windows\SysWOW64\at.exe
              at 08:34 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4760
            • C:\Windows\SysWOW64\at.exe
              at 08:35 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2632
            • C:\Windows\SysWOW64\at.exe
              at 08:36 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1856
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c c:\windows\system\explorer.exe RO
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2856
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe RO
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4824
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c c:\windows\system\svchost.exe RO
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4844
    • \??\c:\windows\system\svchost.exe
      c:\windows\system\svchost.exe RO
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4812

Network

        MITRE ATT&CK Enterprise v16

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\2025-05-20_c67dd6e6528753aad5cfd228b68d9468_black-basta_cobalt-strike_elex_luca-stealer.exe 

          Filesize

          364KB

          MD5

          38f18ebb5b81b4481b732f68d2b9fe90

          SHA1

          eae6a3ea6b5b8ac5ccafcc6dd0bbdbb07d6ee6c0

          SHA256

          a27bef270abb8e0649358d89a004573b45156c7a2bb520fb62cfe1f50300145b

          SHA512

          9c38a92d015f8524b28d5b99c83f6923f2505cd65817e11b8079201148f0299cb38646bdbb8fb5f64c97b178507cf8a851c3edb38fb442f0caebfdc0482c2749

        • C:\Users\Admin\AppData\Local\icsys.icn.exe

          Filesize

          206KB

          MD5

          b03b0c11f7c46b181af61975f0ca255e

          SHA1

          7caf7c1f48e209aec8ae245d9194a2159d111e45

          SHA256

          3ab5d937f24e9fd0ed04e87e493111c094ea9bddfb4083d9e0247438b79f26c2

          SHA512

          02305908293ba9667ba341461c0f4f5842a4e3b2b3ac8444aa18b2fc5bc60d38956e2421d3b398b6a2c8d372c0a85e246f078d3f48913012fe40efdac0809a7d

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          206KB

          MD5

          d1d04b5f68cedac7ea70374cf80aac00

          SHA1

          c8bd50c3cae4492a5c62e3d6ac5b17637a3b7770

          SHA256

          929d75ee9aced76ea2d652c713a7208617a14b25483e15b216244a54f244b310

          SHA512

          c4e4a5fa81a2b53386277ba40581950e6078daed697bf4d8c5a6e91e08d3874926adc6597bc6be8d96d2586270d626921e2694029f7e931f8224187a0c88c50d

        • C:\Windows\System\explorer.exe

          Filesize

          206KB

          MD5

          7f9dabcdb38a6acf1a6e139b00e913a0

          SHA1

          4d33495151eef3cae8865c424d74fe3bda17f5a3

          SHA256

          8d277133cd022915c33b37ac25ae49491e0b8f408b0224df278c95638d3476fb

          SHA512

          dcb3ec3f418e7a564dc13b5fadcb027dc0efab108e54ec24a77042dafb3e79adb3700e4ad1c7af19e5345eef1fbf52c0d49c9e5d9112d11ac888dc0c9930d18e

        • C:\Windows\System\spoolsv.exe

          Filesize

          206KB

          MD5

          a8b63025c791af5da82535476f182e3c

          SHA1

          82b5a2d08fd99f7fd81fb4b3aa3ed1128e9cd5fd

          SHA256

          6c66e1237ff70512255d1ba4a6399ded88f6bfff5d1e354569838e8570d687a8

          SHA512

          e2fec57471a8898958660f979aabdb43484f32122dec02d5f473f576e7cc0b95896626be269e8cddcd71239bf7d0f11cc36a5896b4e0ae85d83bff2dee4b42a9

        • C:\Windows\System\svchost.exe

          Filesize

          206KB

          MD5

          cfe65d49cf14d5e745e5ba1b63d142b9

          SHA1

          e4237d25f5279577f8f9765b2f545400fd9ed0d5

          SHA256

          2787f7e8672bb6a2dc44b2f238e508b2d58203d96949e4cb1852f0870c633719

          SHA512

          fe3b20989e2c6d7e2a422cb910bbfbf7a51db179f8f2bc2d677d3c5ecc039bf466ec12f5b2edffa00349d8cf94493eb29e7b3e13a5a112191f8160e463135fcc