Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
21-06-2024 01:37
Behavioral task
behavioral1
Sample
2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240611-en
General
-
Target
2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
b48b89bbe5fb0560df393f7e5e8d084b
-
SHA1
c03c2568e487b94905ae2b7f3dbdc80fc0edeb26
-
SHA256
5de42bf62d03b9babeacd06187622aed6517da529ffe4072600df034fd8498da
-
SHA512
bd590c918ce7cd0e7aca80c3ee6197e88e5a3cb4a7e795f8915eac6b3a36fb7f306ec0d1774352026eadb4e4995e508c66da46f00319ae630c8118e3d465b3d2
-
SSDEEP
98304:kPrrcBpddfE0pZVg56utgpPFotBER/mQ32lUw:i0BM56utgpPF8u/7w
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\hPPcDdo.exe cobalt_reflective_dll \Windows\system\BKmsLfK.exe cobalt_reflective_dll C:\Windows\system\wVYxCHh.exe cobalt_reflective_dll \Windows\system\lrIBkga.exe cobalt_reflective_dll \Windows\system\wotwvRV.exe cobalt_reflective_dll \Windows\system\DXJcKtr.exe cobalt_reflective_dll \Windows\system\saRVhFr.exe cobalt_reflective_dll C:\Windows\system\tUaFCvj.exe cobalt_reflective_dll C:\Windows\system\WNHFyFe.exe cobalt_reflective_dll \Windows\system\XTmUcTV.exe cobalt_reflective_dll C:\Windows\system\WpheIKl.exe cobalt_reflective_dll \Windows\system\VZChbQP.exe cobalt_reflective_dll \Windows\system\JydbcQY.exe cobalt_reflective_dll C:\Windows\system\zgLyvnO.exe cobalt_reflective_dll \Windows\system\zqCwHLC.exe cobalt_reflective_dll \Windows\system\DUOdZQl.exe cobalt_reflective_dll C:\Windows\system\aSgcTbS.exe cobalt_reflective_dll \Windows\system\bCstqHj.exe cobalt_reflective_dll C:\Windows\system\kLfVQhh.exe cobalt_reflective_dll C:\Windows\system\CFzQlQs.exe cobalt_reflective_dll C:\Windows\system\upsFcIq.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule \Windows\system\hPPcDdo.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\BKmsLfK.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\wVYxCHh.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\lrIBkga.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\wotwvRV.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\DXJcKtr.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\saRVhFr.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\tUaFCvj.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\WNHFyFe.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\XTmUcTV.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\WpheIKl.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\VZChbQP.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\JydbcQY.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\zgLyvnO.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\zqCwHLC.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\DUOdZQl.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\aSgcTbS.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\bCstqHj.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\kLfVQhh.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\CFzQlQs.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\upsFcIq.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 54 IoCs
Processes:
resource yara_rule behavioral1/memory/2804-0-0x000000013FA30000-0x000000013FD84000-memory.dmp UPX \Windows\system\hPPcDdo.exe UPX behavioral1/memory/2296-8-0x000000013FFF0000-0x0000000140344000-memory.dmp UPX \Windows\system\BKmsLfK.exe UPX C:\Windows\system\wVYxCHh.exe UPX behavioral1/memory/1880-14-0x000000013FB90000-0x000000013FEE4000-memory.dmp UPX \Windows\system\lrIBkga.exe UPX behavioral1/memory/2380-21-0x000000013F640000-0x000000013F994000-memory.dmp UPX \Windows\system\wotwvRV.exe UPX behavioral1/memory/2780-34-0x000000013F2B0000-0x000000013F604000-memory.dmp UPX \Windows\system\DXJcKtr.exe UPX behavioral1/memory/2652-43-0x000000013FF10000-0x0000000140264000-memory.dmp UPX behavioral1/memory/2804-41-0x000000013FA30000-0x000000013FD84000-memory.dmp UPX behavioral1/memory/2736-31-0x000000013F940000-0x000000013FC94000-memory.dmp UPX \Windows\system\saRVhFr.exe UPX behavioral1/memory/3012-56-0x000000013F860000-0x000000013FBB4000-memory.dmp UPX C:\Windows\system\tUaFCvj.exe UPX behavioral1/memory/2792-65-0x000000013F830000-0x000000013FB84000-memory.dmp UPX behavioral1/memory/2736-64-0x000000013F940000-0x000000013FC94000-memory.dmp UPX behavioral1/memory/1880-60-0x000000013FB90000-0x000000013FEE4000-memory.dmp UPX behavioral1/memory/2784-49-0x000000013F140000-0x000000013F494000-memory.dmp UPX C:\Windows\system\WNHFyFe.exe UPX \Windows\system\XTmUcTV.exe UPX C:\Windows\system\WpheIKl.exe UPX behavioral1/memory/2780-77-0x000000013F2B0000-0x000000013F604000-memory.dmp UPX behavioral1/memory/2964-81-0x000000013F510000-0x000000013F864000-memory.dmp UPX behavioral1/memory/2592-80-0x000000013F2A0000-0x000000013F5F4000-memory.dmp UPX \Windows\system\VZChbQP.exe UPX behavioral1/memory/2784-87-0x000000013F140000-0x000000013F494000-memory.dmp UPX behavioral1/memory/1900-88-0x000000013F0A0000-0x000000013F3F4000-memory.dmp UPX \Windows\system\JydbcQY.exe UPX C:\Windows\system\zgLyvnO.exe UPX \Windows\system\zqCwHLC.exe UPX \Windows\system\DUOdZQl.exe UPX C:\Windows\system\aSgcTbS.exe UPX \Windows\system\bCstqHj.exe UPX C:\Windows\system\kLfVQhh.exe UPX C:\Windows\system\CFzQlQs.exe UPX behavioral1/memory/2828-108-0x000000013FD90000-0x00000001400E4000-memory.dmp UPX behavioral1/memory/3012-99-0x000000013F860000-0x000000013FBB4000-memory.dmp UPX C:\Windows\system\upsFcIq.exe UPX behavioral1/memory/2296-144-0x000000013FFF0000-0x0000000140344000-memory.dmp UPX behavioral1/memory/1880-145-0x000000013FB90000-0x000000013FEE4000-memory.dmp UPX behavioral1/memory/2380-146-0x000000013F640000-0x000000013F994000-memory.dmp UPX behavioral1/memory/2736-147-0x000000013F940000-0x000000013FC94000-memory.dmp UPX behavioral1/memory/2652-148-0x000000013FF10000-0x0000000140264000-memory.dmp UPX behavioral1/memory/2780-149-0x000000013F2B0000-0x000000013F604000-memory.dmp UPX behavioral1/memory/2784-150-0x000000013F140000-0x000000013F494000-memory.dmp UPX behavioral1/memory/2792-151-0x000000013F830000-0x000000013FB84000-memory.dmp UPX behavioral1/memory/3012-152-0x000000013F860000-0x000000013FBB4000-memory.dmp UPX behavioral1/memory/2964-153-0x000000013F510000-0x000000013F864000-memory.dmp UPX behavioral1/memory/2592-154-0x000000013F2A0000-0x000000013F5F4000-memory.dmp UPX behavioral1/memory/1900-155-0x000000013F0A0000-0x000000013F3F4000-memory.dmp UPX behavioral1/memory/2828-156-0x000000013FD90000-0x00000001400E4000-memory.dmp UPX -
XMRig Miner payload 59 IoCs
Processes:
resource yara_rule behavioral1/memory/2804-0-0x000000013FA30000-0x000000013FD84000-memory.dmp xmrig \Windows\system\hPPcDdo.exe xmrig behavioral1/memory/2296-8-0x000000013FFF0000-0x0000000140344000-memory.dmp xmrig \Windows\system\BKmsLfK.exe xmrig C:\Windows\system\wVYxCHh.exe xmrig behavioral1/memory/1880-14-0x000000013FB90000-0x000000013FEE4000-memory.dmp xmrig \Windows\system\lrIBkga.exe xmrig behavioral1/memory/2380-21-0x000000013F640000-0x000000013F994000-memory.dmp xmrig \Windows\system\wotwvRV.exe xmrig behavioral1/memory/2780-34-0x000000013F2B0000-0x000000013F604000-memory.dmp xmrig \Windows\system\DXJcKtr.exe xmrig behavioral1/memory/2652-43-0x000000013FF10000-0x0000000140264000-memory.dmp xmrig behavioral1/memory/2804-41-0x000000013FA30000-0x000000013FD84000-memory.dmp xmrig behavioral1/memory/2736-31-0x000000013F940000-0x000000013FC94000-memory.dmp xmrig \Windows\system\saRVhFr.exe xmrig behavioral1/memory/3012-56-0x000000013F860000-0x000000013FBB4000-memory.dmp xmrig C:\Windows\system\tUaFCvj.exe xmrig behavioral1/memory/2792-65-0x000000013F830000-0x000000013FB84000-memory.dmp xmrig behavioral1/memory/2736-64-0x000000013F940000-0x000000013FC94000-memory.dmp xmrig behavioral1/memory/2804-61-0x00000000022F0000-0x0000000002644000-memory.dmp xmrig behavioral1/memory/1880-60-0x000000013FB90000-0x000000013FEE4000-memory.dmp xmrig behavioral1/memory/2784-49-0x000000013F140000-0x000000013F494000-memory.dmp xmrig C:\Windows\system\WNHFyFe.exe xmrig \Windows\system\XTmUcTV.exe xmrig C:\Windows\system\WpheIKl.exe xmrig behavioral1/memory/2780-77-0x000000013F2B0000-0x000000013F604000-memory.dmp xmrig behavioral1/memory/2964-81-0x000000013F510000-0x000000013F864000-memory.dmp xmrig behavioral1/memory/2592-80-0x000000013F2A0000-0x000000013F5F4000-memory.dmp xmrig \Windows\system\VZChbQP.exe xmrig behavioral1/memory/2784-87-0x000000013F140000-0x000000013F494000-memory.dmp xmrig behavioral1/memory/1900-88-0x000000013F0A0000-0x000000013F3F4000-memory.dmp xmrig \Windows\system\JydbcQY.exe xmrig C:\Windows\system\zgLyvnO.exe xmrig \Windows\system\zqCwHLC.exe xmrig \Windows\system\DUOdZQl.exe xmrig C:\Windows\system\aSgcTbS.exe xmrig \Windows\system\bCstqHj.exe xmrig C:\Windows\system\kLfVQhh.exe xmrig behavioral1/memory/2804-123-0x000000013F330000-0x000000013F684000-memory.dmp xmrig C:\Windows\system\CFzQlQs.exe xmrig behavioral1/memory/2804-119-0x00000000022F0000-0x0000000002644000-memory.dmp xmrig behavioral1/memory/2828-108-0x000000013FD90000-0x00000001400E4000-memory.dmp xmrig behavioral1/memory/3012-99-0x000000013F860000-0x000000013FBB4000-memory.dmp xmrig C:\Windows\system\upsFcIq.exe xmrig behavioral1/memory/2804-138-0x000000013F2A0000-0x000000013F5F4000-memory.dmp xmrig behavioral1/memory/2804-139-0x000000013F510000-0x000000013F864000-memory.dmp xmrig behavioral1/memory/2296-144-0x000000013FFF0000-0x0000000140344000-memory.dmp xmrig behavioral1/memory/1880-145-0x000000013FB90000-0x000000013FEE4000-memory.dmp xmrig behavioral1/memory/2380-146-0x000000013F640000-0x000000013F994000-memory.dmp xmrig behavioral1/memory/2736-147-0x000000013F940000-0x000000013FC94000-memory.dmp xmrig behavioral1/memory/2652-148-0x000000013FF10000-0x0000000140264000-memory.dmp xmrig behavioral1/memory/2780-149-0x000000013F2B0000-0x000000013F604000-memory.dmp xmrig behavioral1/memory/2784-150-0x000000013F140000-0x000000013F494000-memory.dmp xmrig behavioral1/memory/2792-151-0x000000013F830000-0x000000013FB84000-memory.dmp xmrig behavioral1/memory/3012-152-0x000000013F860000-0x000000013FBB4000-memory.dmp xmrig behavioral1/memory/2964-153-0x000000013F510000-0x000000013F864000-memory.dmp xmrig behavioral1/memory/2592-154-0x000000013F2A0000-0x000000013F5F4000-memory.dmp xmrig behavioral1/memory/1900-155-0x000000013F0A0000-0x000000013F3F4000-memory.dmp xmrig behavioral1/memory/2828-156-0x000000013FD90000-0x00000001400E4000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
hPPcDdo.exeBKmsLfK.exewVYxCHh.exelrIBkga.exewotwvRV.exeDXJcKtr.exeWNHFyFe.exesaRVhFr.exetUaFCvj.exeWpheIKl.exeXTmUcTV.exeVZChbQP.exeupsFcIq.exeJydbcQY.exezgLyvnO.exeDUOdZQl.exezqCwHLC.exekLfVQhh.exeaSgcTbS.exeCFzQlQs.exebCstqHj.exepid process 2296 hPPcDdo.exe 1880 BKmsLfK.exe 2380 wVYxCHh.exe 2736 lrIBkga.exe 2780 wotwvRV.exe 2652 DXJcKtr.exe 2784 WNHFyFe.exe 3012 saRVhFr.exe 2792 tUaFCvj.exe 2964 WpheIKl.exe 2592 XTmUcTV.exe 1900 VZChbQP.exe 2828 upsFcIq.exe 2588 JydbcQY.exe 2216 zgLyvnO.exe 2440 DUOdZQl.exe 2824 zqCwHLC.exe 2200 kLfVQhh.exe 1816 aSgcTbS.exe 2164 CFzQlQs.exe 2192 bCstqHj.exe -
Loads dropped DLL 21 IoCs
Processes:
2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exepid process 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe -
Processes:
resource yara_rule behavioral1/memory/2804-0-0x000000013FA30000-0x000000013FD84000-memory.dmp upx \Windows\system\hPPcDdo.exe upx behavioral1/memory/2296-8-0x000000013FFF0000-0x0000000140344000-memory.dmp upx \Windows\system\BKmsLfK.exe upx C:\Windows\system\wVYxCHh.exe upx behavioral1/memory/1880-14-0x000000013FB90000-0x000000013FEE4000-memory.dmp upx \Windows\system\lrIBkga.exe upx behavioral1/memory/2380-21-0x000000013F640000-0x000000013F994000-memory.dmp upx \Windows\system\wotwvRV.exe upx behavioral1/memory/2780-34-0x000000013F2B0000-0x000000013F604000-memory.dmp upx \Windows\system\DXJcKtr.exe upx behavioral1/memory/2652-43-0x000000013FF10000-0x0000000140264000-memory.dmp upx behavioral1/memory/2804-41-0x000000013FA30000-0x000000013FD84000-memory.dmp upx behavioral1/memory/2736-31-0x000000013F940000-0x000000013FC94000-memory.dmp upx \Windows\system\saRVhFr.exe upx behavioral1/memory/3012-56-0x000000013F860000-0x000000013FBB4000-memory.dmp upx C:\Windows\system\tUaFCvj.exe upx behavioral1/memory/2792-65-0x000000013F830000-0x000000013FB84000-memory.dmp upx behavioral1/memory/2736-64-0x000000013F940000-0x000000013FC94000-memory.dmp upx behavioral1/memory/1880-60-0x000000013FB90000-0x000000013FEE4000-memory.dmp upx behavioral1/memory/2784-49-0x000000013F140000-0x000000013F494000-memory.dmp upx C:\Windows\system\WNHFyFe.exe upx \Windows\system\XTmUcTV.exe upx C:\Windows\system\WpheIKl.exe upx behavioral1/memory/2780-77-0x000000013F2B0000-0x000000013F604000-memory.dmp upx behavioral1/memory/2964-81-0x000000013F510000-0x000000013F864000-memory.dmp upx behavioral1/memory/2592-80-0x000000013F2A0000-0x000000013F5F4000-memory.dmp upx \Windows\system\VZChbQP.exe upx behavioral1/memory/2784-87-0x000000013F140000-0x000000013F494000-memory.dmp upx behavioral1/memory/1900-88-0x000000013F0A0000-0x000000013F3F4000-memory.dmp upx \Windows\system\JydbcQY.exe upx C:\Windows\system\zgLyvnO.exe upx \Windows\system\zqCwHLC.exe upx \Windows\system\DUOdZQl.exe upx C:\Windows\system\aSgcTbS.exe upx \Windows\system\bCstqHj.exe upx C:\Windows\system\kLfVQhh.exe upx C:\Windows\system\CFzQlQs.exe upx behavioral1/memory/2828-108-0x000000013FD90000-0x00000001400E4000-memory.dmp upx behavioral1/memory/3012-99-0x000000013F860000-0x000000013FBB4000-memory.dmp upx C:\Windows\system\upsFcIq.exe upx behavioral1/memory/2296-144-0x000000013FFF0000-0x0000000140344000-memory.dmp upx behavioral1/memory/1880-145-0x000000013FB90000-0x000000013FEE4000-memory.dmp upx behavioral1/memory/2380-146-0x000000013F640000-0x000000013F994000-memory.dmp upx behavioral1/memory/2736-147-0x000000013F940000-0x000000013FC94000-memory.dmp upx behavioral1/memory/2652-148-0x000000013FF10000-0x0000000140264000-memory.dmp upx behavioral1/memory/2780-149-0x000000013F2B0000-0x000000013F604000-memory.dmp upx behavioral1/memory/2784-150-0x000000013F140000-0x000000013F494000-memory.dmp upx behavioral1/memory/2792-151-0x000000013F830000-0x000000013FB84000-memory.dmp upx behavioral1/memory/3012-152-0x000000013F860000-0x000000013FBB4000-memory.dmp upx behavioral1/memory/2964-153-0x000000013F510000-0x000000013F864000-memory.dmp upx behavioral1/memory/2592-154-0x000000013F2A0000-0x000000013F5F4000-memory.dmp upx behavioral1/memory/1900-155-0x000000013F0A0000-0x000000013F3F4000-memory.dmp upx behavioral1/memory/2828-156-0x000000013FD90000-0x00000001400E4000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exedescription ioc process File created C:\Windows\System\wotwvRV.exe 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\WNHFyFe.exe 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\tUaFCvj.exe 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\WpheIKl.exe 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\JydbcQY.exe 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\upsFcIq.exe 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\hPPcDdo.exe 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\lrIBkga.exe 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\kLfVQhh.exe 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\bCstqHj.exe 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\wVYxCHh.exe 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\saRVhFr.exe 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\XTmUcTV.exe 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\zgLyvnO.exe 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\aSgcTbS.exe 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\BKmsLfK.exe 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\DXJcKtr.exe 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\zqCwHLC.exe 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\CFzQlQs.exe 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\VZChbQP.exe 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\DUOdZQl.exe 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process Token: SeLockMemoryPrivilege 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process target process PID 2804 wrote to memory of 2296 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe hPPcDdo.exe PID 2804 wrote to memory of 2296 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe hPPcDdo.exe PID 2804 wrote to memory of 2296 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe hPPcDdo.exe PID 2804 wrote to memory of 1880 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe BKmsLfK.exe PID 2804 wrote to memory of 1880 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe BKmsLfK.exe PID 2804 wrote to memory of 1880 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe BKmsLfK.exe PID 2804 wrote to memory of 2380 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe wVYxCHh.exe PID 2804 wrote to memory of 2380 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe wVYxCHh.exe PID 2804 wrote to memory of 2380 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe wVYxCHh.exe PID 2804 wrote to memory of 2736 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe lrIBkga.exe PID 2804 wrote to memory of 2736 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe lrIBkga.exe PID 2804 wrote to memory of 2736 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe lrIBkga.exe PID 2804 wrote to memory of 2780 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe wotwvRV.exe PID 2804 wrote to memory of 2780 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe wotwvRV.exe PID 2804 wrote to memory of 2780 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe wotwvRV.exe PID 2804 wrote to memory of 2652 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe DXJcKtr.exe PID 2804 wrote to memory of 2652 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe DXJcKtr.exe PID 2804 wrote to memory of 2652 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe DXJcKtr.exe PID 2804 wrote to memory of 2784 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe WNHFyFe.exe PID 2804 wrote to memory of 2784 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe WNHFyFe.exe PID 2804 wrote to memory of 2784 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe WNHFyFe.exe PID 2804 wrote to memory of 3012 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe saRVhFr.exe PID 2804 wrote to memory of 3012 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe saRVhFr.exe PID 2804 wrote to memory of 3012 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe saRVhFr.exe PID 2804 wrote to memory of 2792 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe tUaFCvj.exe PID 2804 wrote to memory of 2792 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe tUaFCvj.exe PID 2804 wrote to memory of 2792 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe tUaFCvj.exe PID 2804 wrote to memory of 2592 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe XTmUcTV.exe PID 2804 wrote to memory of 2592 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe XTmUcTV.exe PID 2804 wrote to memory of 2592 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe XTmUcTV.exe PID 2804 wrote to memory of 2964 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe WpheIKl.exe PID 2804 wrote to memory of 2964 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe WpheIKl.exe PID 2804 wrote to memory of 2964 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe WpheIKl.exe PID 2804 wrote to memory of 1900 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe VZChbQP.exe PID 2804 wrote to memory of 1900 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe VZChbQP.exe PID 2804 wrote to memory of 1900 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe VZChbQP.exe PID 2804 wrote to memory of 2588 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe JydbcQY.exe PID 2804 wrote to memory of 2588 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe JydbcQY.exe PID 2804 wrote to memory of 2588 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe JydbcQY.exe PID 2804 wrote to memory of 2828 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe upsFcIq.exe PID 2804 wrote to memory of 2828 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe upsFcIq.exe PID 2804 wrote to memory of 2828 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe upsFcIq.exe PID 2804 wrote to memory of 2440 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe DUOdZQl.exe PID 2804 wrote to memory of 2440 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe DUOdZQl.exe PID 2804 wrote to memory of 2440 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe DUOdZQl.exe PID 2804 wrote to memory of 2216 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe zgLyvnO.exe PID 2804 wrote to memory of 2216 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe zgLyvnO.exe PID 2804 wrote to memory of 2216 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe zgLyvnO.exe PID 2804 wrote to memory of 2200 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe kLfVQhh.exe PID 2804 wrote to memory of 2200 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe kLfVQhh.exe PID 2804 wrote to memory of 2200 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe kLfVQhh.exe PID 2804 wrote to memory of 2824 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe zqCwHLC.exe PID 2804 wrote to memory of 2824 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe zqCwHLC.exe PID 2804 wrote to memory of 2824 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe zqCwHLC.exe PID 2804 wrote to memory of 1816 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe aSgcTbS.exe PID 2804 wrote to memory of 1816 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe aSgcTbS.exe PID 2804 wrote to memory of 1816 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe aSgcTbS.exe PID 2804 wrote to memory of 2164 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe CFzQlQs.exe PID 2804 wrote to memory of 2164 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe CFzQlQs.exe PID 2804 wrote to memory of 2164 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe CFzQlQs.exe PID 2804 wrote to memory of 2192 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe bCstqHj.exe PID 2804 wrote to memory of 2192 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe bCstqHj.exe PID 2804 wrote to memory of 2192 2804 2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe bCstqHj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-21_b48b89bbe5fb0560df393f7e5e8d084b_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\hPPcDdo.exeC:\Windows\System\hPPcDdo.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\BKmsLfK.exeC:\Windows\System\BKmsLfK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wVYxCHh.exeC:\Windows\System\wVYxCHh.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lrIBkga.exeC:\Windows\System\lrIBkga.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wotwvRV.exeC:\Windows\System\wotwvRV.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\DXJcKtr.exeC:\Windows\System\DXJcKtr.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\WNHFyFe.exeC:\Windows\System\WNHFyFe.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\saRVhFr.exeC:\Windows\System\saRVhFr.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\tUaFCvj.exeC:\Windows\System\tUaFCvj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\XTmUcTV.exeC:\Windows\System\XTmUcTV.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\WpheIKl.exeC:\Windows\System\WpheIKl.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\VZChbQP.exeC:\Windows\System\VZChbQP.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\JydbcQY.exeC:\Windows\System\JydbcQY.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\upsFcIq.exeC:\Windows\System\upsFcIq.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\DUOdZQl.exeC:\Windows\System\DUOdZQl.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zgLyvnO.exeC:\Windows\System\zgLyvnO.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\kLfVQhh.exeC:\Windows\System\kLfVQhh.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zqCwHLC.exeC:\Windows\System\zqCwHLC.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aSgcTbS.exeC:\Windows\System\aSgcTbS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CFzQlQs.exeC:\Windows\System\CFzQlQs.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bCstqHj.exeC:\Windows\System\bCstqHj.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\CFzQlQs.exeFilesize
5.9MB
MD5b2577c690a33b9d2f6dcf3603dfb8a10
SHA146d44065579650724f037622efab95d01ba048cf
SHA2561399e7a41c82a56da127437abae9756834c0c9674d0902838a01c4792512f160
SHA512da6352284305c298d61946ab1e04b961e2462ce86f48a8d75e3b257d124badff411a19163c5eb508f8eaff3bd7581731756c0508a69fd8c14ef45be5312aef00
-
C:\Windows\system\WNHFyFe.exeFilesize
5.9MB
MD54a5a34efccc6264901bf707e385c0737
SHA1c3b4574ce282aecd4899095101538fcc659e58d0
SHA2569ec3d54c1054a630255f75d6d2577a8947967f47008a4d2b46cc89f42ac79dd5
SHA512bbba3ac9353c9f428f82fe01072a9899e17cf61a27a250f97f2cf2d53f621b270f7c346f80e40c503b383be85421b817a47deaed743f9b2e51079b6ebd8405cc
-
C:\Windows\system\WpheIKl.exeFilesize
5.9MB
MD5e86818390a61671047a885710dd2e805
SHA12d7b0c7147361fbb3421783fd5b91d42b1164459
SHA25642827b607c657b63b97553437f1c2e288bade6af6a085ce82836c6f8416f6d87
SHA512c8b88bacda979804da60d232f6f9bc62252af50f77677975d2f83e9eaaef1b1eb9d0634d10bdf773be24cb2134976755c0d28aee6e6a8451554269ecd0d76361
-
C:\Windows\system\aSgcTbS.exeFilesize
5.9MB
MD5fe66555e64da0b6b41ff7f7c9b0256f7
SHA1e0c1f6e9eff7e9e112561be3dc5159311c48dab8
SHA25684443da3af6d1db74c594dc965f200cb7ad4ff3eb9887913cd40138ca3de7d54
SHA512d59839731bd494d649414fdf641dca95917e01b669e4189b4e3c6295c9fb9f80ea41f49131c7c6f6e8bf284cd49b9308cda8a7574c8429406abd447ce5849627
-
C:\Windows\system\kLfVQhh.exeFilesize
5.9MB
MD5d9e1c2340769460961e5618de5de2177
SHA1fb5ea963ea4b7aab05af7fea60c5c68ac283ad2f
SHA256cad6963fd7739380d0c1d11c3ace0de5e918283105b9084bb7b468573f5fd8db
SHA5124966159d9a47f8b3e2bec564c8dec438923dbee55ae50d77c66c77d95adc4dd094cfe6c699f98d0fd5cb5747c9015bc3e785d92b7f8ba4595b23ac740913c79c
-
C:\Windows\system\tUaFCvj.exeFilesize
5.9MB
MD5efca35cbcdb1fbf8c59045866536cc64
SHA15571bc54edd0e07755b1a646a47319a9451b87fe
SHA256ed4169899a8c2001b57a372ecf01ffcf9a5fcb5a3d30dd8d6a079b562f8c0288
SHA512e87e4af81077876a7130fe1fb14e38b07fcccbb534a804491b5a9969c8df416693b82d3b620274377c87ab55b490a00ca465cf0d6b56701bf2b287c607a0a861
-
C:\Windows\system\upsFcIq.exeFilesize
5.9MB
MD57765a36a5687ce63148207cbb2cfe29e
SHA1102aa14c22d854faf0d176f2e2b11741870e8ab4
SHA256194520ef7b16119d5e51515483111d138c1b957be3f2111e4a566d2eee997070
SHA5124819cc6569f5e44c9d94fa818cb1ac8660306ee695d250656e8147747eb6bb24371ec91568079a207503a132afe70d9e4a28a5fd087613815b440a1c8a4135aa
-
C:\Windows\system\wVYxCHh.exeFilesize
5.9MB
MD5099c4e23c41c65e646f132a3deebbfbb
SHA17f20ffb9757c194416161781c1390010b07148a9
SHA256d94dc320f5211ac40b05d7baf961aaa8cd1556eb3caa22f1e9a4b95d3ec7c099
SHA51246eb0f8f0d1c63de9e3317935ed18ff0c3cf26ca568de94a96aba4f0309369fb0643476b05b783bba2963664bb275d01191f3f7cad05023f896a21054bf8663a
-
C:\Windows\system\zgLyvnO.exeFilesize
5.9MB
MD56bb21bf423ada9303c2c6d2d91da2390
SHA17c6ee3210a352845049fbc4de5604c4479efbbeb
SHA25661fd5c741ab39384a67130f484d9985b8ed9defdf64d4750b7eb1fadf2507d3a
SHA5129a168d4fe7e83226d7177a4bc4ec0747c511fb547262a594d2959d5608503413db7b2bfc5a4c24fb937ccb61e911bf323d8f34026249419fc3592fc046c3e6db
-
\Windows\system\BKmsLfK.exeFilesize
5.9MB
MD577fbd59c1e6bb7e4c66618209a30e899
SHA152d47f3622b31fd81e8c363cdcd400c59e8c347c
SHA256aba77bcff50f347d71d1e430297832977870c1643af02cfc2d334e54bec825b0
SHA512b66590ceea27347c2c70a44d2761ac08866dfbefaf09324344ac6c0e40dfca06e6c151dea2c8799ea203acc9c78aa02c74f551559dd050b2b91fec863fbbeeca
-
\Windows\system\DUOdZQl.exeFilesize
5.9MB
MD53d45e3c7eeb4e60d2b104439536c3c3b
SHA104a7fd605684151ad2a40e49c0d30cb8cf1d5805
SHA256e746593cdc436df56670cdc484cfb8a74bebc53d75a215d2d8843bdcbdc4d19e
SHA512d77f5d74958a79699e5cc2d2a3497b5942a5db6984666f049418cbbff07d28875a9d2775045a744c75c0137b2a5b2fa9d0e5dac67c876343543dbbcbe1ad3c08
-
\Windows\system\DXJcKtr.exeFilesize
5.9MB
MD5136363946e534ad3b73e339e0bb51ccc
SHA10f120abad2c86d8c5f8054bd4973531678835f06
SHA256eeb1788b6ed2c3dcfe5e3f0bc5f772e46430434cb898c39926842c164c83a16e
SHA512de617a26cbd8a0119a48822eae1970b6f5d98d11da83df3b277957c7302b9164caa664a7800af0fb3580931455b9092acac79c3bce953d74835ca1edbd91249d
-
\Windows\system\JydbcQY.exeFilesize
5.9MB
MD5cd71c590ab04102c99376e12eaf0c37a
SHA1fc093af706b5ad263a60528b9e285b31b9c4b093
SHA256ab24554171ceb75cc522437e6a31f24a1c9cf028ade5ee0caaac6e1986fc7d53
SHA512f9658bbb642ebc2b21f1bc21ce5296d1a6996afdc21d86b0f9b3ef5efe2b1d1f78bd588b2c024409a28519b2060f08871a7bed69c2f60122779a914520307cb4
-
\Windows\system\VZChbQP.exeFilesize
5.9MB
MD5bcfe50a998742c14598344360de21fa4
SHA1dfedff6c00e7db0e2c4240c768b539acaea6fb1b
SHA2569a7829d6750d5976d8ef4f4b7a9df1871077220e1e7046c2949aef853af9b5c0
SHA51239be12820d8cb8eca6ddebd1c2ad590a42897b84dfaf129f4a3c87b3be11935fd03d71ceebe6f2492badd6e51920d64c26542d3705727e2d184f32dabf3c54f3
-
\Windows\system\XTmUcTV.exeFilesize
5.9MB
MD5c299686d8b66cfd5661f857115b53be8
SHA179f07dc2e6ad36299a544bf8b69509d0bc10dd10
SHA25681caa22c9b9c4ddd199a2e8ff60e36e451323bafff2ab83dbabb2263abeb21b2
SHA512fef2d0e6f72e643caa5b6f7de745db3b969bf798ff1e5ab186eeec55208239575c243a851b662886bae57644264b0254a5d591e8a68e88f5f0b94a8b575a2739
-
\Windows\system\bCstqHj.exeFilesize
5.9MB
MD5008799e38afa46aa45855d41966f12fa
SHA127fcdf2b5ebeb923b71f65794342514c999d3a4b
SHA256071bfd721742073eefc6c6c829c9bdd2da4221dc30ddfc65c174e856c622b112
SHA512a5757424d3a6ad545b19fa0ae5e5dcc56a45fa33d1b751b501689b1c900196bba9609182297314d023df7e00e09035bc26b2a75114165e22ed0eb82cec147a04
-
\Windows\system\hPPcDdo.exeFilesize
5.9MB
MD5ce54f5b86c782344aa30a37a178e976b
SHA18f13dd19e9fda0f8c969a28a3a93af2b51c3650e
SHA2562671b8590b1c2033a650f0fc1d30556e87e2780a3771a5c498304f8ccfa2a342
SHA512d111e8648713d16194352b1c596cce678e85c539077ece96b6563a4c943881c08f09b0ac008cab0b00557c30f9974a81bb3568dd06a4568cc51489e5f399920c
-
\Windows\system\lrIBkga.exeFilesize
5.9MB
MD501de430702ed3d064c6a6afc5e618779
SHA16b9dd660c4739b46c18aa54f3ade0185a9dcea44
SHA25623a18865de801dc81f365064a04b1bc90e9e1605e59c50f7bfe2197b900ab2c7
SHA512b3b274d07669b0aed5d87ec12dc940705744aafaf0bb8aeb9236fb2293c24ff890afd502b83381f61bf15bfaa449308190085c64501618913a9106688ef8de08
-
\Windows\system\saRVhFr.exeFilesize
5.9MB
MD59a8b06ecaa32be5bda4ec6a60754ad30
SHA10c0cff59d835b5eb40a575ccf5c36d3aaeb6be2a
SHA256f4bdc62186dac4d39eae09b5d02c1d0ded448a6a74a36f09e3abc1e35d3d9ccd
SHA5127d96a58e31d3bced85de69faf74b6ccadc54676797e065f1d31a7cc0376bcc6e82070d0ae392d922344e0bbc5833166228bfcae3d6b14143c823a54d04c27686
-
\Windows\system\wotwvRV.exeFilesize
5.9MB
MD5753f1753b1f61bbcbf9b52db4acc879c
SHA110a4d720d829f79f81beec327eba5965d6511a60
SHA25639557db3fd29a1bfef235e783c5c9060ce831caa253cb68fd8bd482ce8b4dc4e
SHA5123eb4129590abb8469916f43480f4b31aeab0472785bf936ebfe2f2954d5704bd9833971fc8fdf569c93167c98f2e0cdf1cfeba17533c0038810c3612ae6977ba
-
\Windows\system\zqCwHLC.exeFilesize
5.9MB
MD5929521fb4111597b0ac0270377e37a2c
SHA14917c9f497ff5d1cdf1a40fcbb44dcc7b0f787e1
SHA2561ed64b1e687a69af81c5ec2115f2170ed18cf8f75bc8d2f516c663b507489bf8
SHA512e13f0792a514e0d87c750d86acbc3ed5d3dd2d191a0b13323999d1ef74baa39d45bcc2ee9e3dd61bb446cfc50e1f30a2ec2df3d828d7cb9d002ceedc7d06c74f
-
memory/1880-14-0x000000013FB90000-0x000000013FEE4000-memory.dmpFilesize
3.3MB
-
memory/1880-145-0x000000013FB90000-0x000000013FEE4000-memory.dmpFilesize
3.3MB
-
memory/1880-60-0x000000013FB90000-0x000000013FEE4000-memory.dmpFilesize
3.3MB
-
memory/1900-88-0x000000013F0A0000-0x000000013F3F4000-memory.dmpFilesize
3.3MB
-
memory/1900-155-0x000000013F0A0000-0x000000013F3F4000-memory.dmpFilesize
3.3MB
-
memory/2296-8-0x000000013FFF0000-0x0000000140344000-memory.dmpFilesize
3.3MB
-
memory/2296-144-0x000000013FFF0000-0x0000000140344000-memory.dmpFilesize
3.3MB
-
memory/2380-146-0x000000013F640000-0x000000013F994000-memory.dmpFilesize
3.3MB
-
memory/2380-21-0x000000013F640000-0x000000013F994000-memory.dmpFilesize
3.3MB
-
memory/2592-80-0x000000013F2A0000-0x000000013F5F4000-memory.dmpFilesize
3.3MB
-
memory/2592-154-0x000000013F2A0000-0x000000013F5F4000-memory.dmpFilesize
3.3MB
-
memory/2652-148-0x000000013FF10000-0x0000000140264000-memory.dmpFilesize
3.3MB
-
memory/2652-43-0x000000013FF10000-0x0000000140264000-memory.dmpFilesize
3.3MB
-
memory/2736-64-0x000000013F940000-0x000000013FC94000-memory.dmpFilesize
3.3MB
-
memory/2736-147-0x000000013F940000-0x000000013FC94000-memory.dmpFilesize
3.3MB
-
memory/2736-31-0x000000013F940000-0x000000013FC94000-memory.dmpFilesize
3.3MB
-
memory/2780-149-0x000000013F2B0000-0x000000013F604000-memory.dmpFilesize
3.3MB
-
memory/2780-34-0x000000013F2B0000-0x000000013F604000-memory.dmpFilesize
3.3MB
-
memory/2780-77-0x000000013F2B0000-0x000000013F604000-memory.dmpFilesize
3.3MB
-
memory/2784-87-0x000000013F140000-0x000000013F494000-memory.dmpFilesize
3.3MB
-
memory/2784-49-0x000000013F140000-0x000000013F494000-memory.dmpFilesize
3.3MB
-
memory/2784-150-0x000000013F140000-0x000000013F494000-memory.dmpFilesize
3.3MB
-
memory/2792-65-0x000000013F830000-0x000000013FB84000-memory.dmpFilesize
3.3MB
-
memory/2792-151-0x000000013F830000-0x000000013FB84000-memory.dmpFilesize
3.3MB
-
memory/2804-79-0x000000013F510000-0x000000013F864000-memory.dmpFilesize
3.3MB
-
memory/2804-41-0x000000013FA30000-0x000000013FD84000-memory.dmpFilesize
3.3MB
-
memory/2804-123-0x000000013F330000-0x000000013F684000-memory.dmpFilesize
3.3MB
-
memory/2804-0-0x000000013FA30000-0x000000013FD84000-memory.dmpFilesize
3.3MB
-
memory/2804-119-0x00000000022F0000-0x0000000002644000-memory.dmpFilesize
3.3MB
-
memory/2804-118-0x00000000022F0000-0x0000000002644000-memory.dmpFilesize
3.3MB
-
memory/2804-1-0x00000000000F0000-0x0000000000100000-memory.dmpFilesize
64KB
-
memory/2804-19-0x000000013F640000-0x000000013F994000-memory.dmpFilesize
3.3MB
-
memory/2804-26-0x00000000022F0000-0x0000000002644000-memory.dmpFilesize
3.3MB
-
memory/2804-138-0x000000013F2A0000-0x000000013F5F4000-memory.dmpFilesize
3.3MB
-
memory/2804-139-0x000000013F510000-0x000000013F864000-memory.dmpFilesize
3.3MB
-
memory/2804-140-0x000000013F2F0000-0x000000013F644000-memory.dmpFilesize
3.3MB
-
memory/2804-141-0x000000013FD90000-0x00000001400E4000-memory.dmpFilesize
3.3MB
-
memory/2804-142-0x00000000022F0000-0x0000000002644000-memory.dmpFilesize
3.3MB
-
memory/2804-143-0x000000013F330000-0x000000013F684000-memory.dmpFilesize
3.3MB
-
memory/2804-48-0x000000013F140000-0x000000013F494000-memory.dmpFilesize
3.3MB
-
memory/2804-61-0x00000000022F0000-0x0000000002644000-memory.dmpFilesize
3.3MB
-
memory/2804-53-0x00000000022F0000-0x0000000002644000-memory.dmpFilesize
3.3MB
-
memory/2804-32-0x000000013F2B0000-0x000000013F604000-memory.dmpFilesize
3.3MB
-
memory/2804-73-0x000000013F2A0000-0x000000013F5F4000-memory.dmpFilesize
3.3MB
-
memory/2804-42-0x000000013FFF0000-0x0000000140344000-memory.dmpFilesize
3.3MB
-
memory/2828-108-0x000000013FD90000-0x00000001400E4000-memory.dmpFilesize
3.3MB
-
memory/2828-156-0x000000013FD90000-0x00000001400E4000-memory.dmpFilesize
3.3MB
-
memory/2964-81-0x000000013F510000-0x000000013F864000-memory.dmpFilesize
3.3MB
-
memory/2964-153-0x000000013F510000-0x000000013F864000-memory.dmpFilesize
3.3MB
-
memory/3012-56-0x000000013F860000-0x000000013FBB4000-memory.dmpFilesize
3.3MB
-
memory/3012-152-0x000000013F860000-0x000000013FBB4000-memory.dmpFilesize
3.3MB
-
memory/3012-99-0x000000013F860000-0x000000013FBB4000-memory.dmpFilesize
3.3MB