Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
21-06-2024 01:36
Behavioral task
behavioral1
Sample
2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20231129-en
General
-
Target
2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
b2be1386ba28a14a1f7f8180c97af4fe
-
SHA1
fcdd4d082c71a4659e6d28984f5035e56d06d972
-
SHA256
56dfc01814e7c7bdbdd81479ca40e78c06cd17683643cac21d659d5841ba53f9
-
SHA512
82c1d4ac3cd226c54295efc4242a73566c7487706d6fb7327dc57e7b4084081a9365b7723fefbc96831350b2cecc9d2ef47900d0f92687e527653423752a673e
-
SSDEEP
98304:kPrrcBpddfE0pZVg56utgpPFotBER/mQ32lUa:i0BM56utgpPF8u/7a
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\nULzwrD.exe cobalt_reflective_dll \Windows\system\SCWeHXf.exe cobalt_reflective_dll C:\Windows\system\sofUqKr.exe cobalt_reflective_dll C:\Windows\system\SRJTwov.exe cobalt_reflective_dll \Windows\system\fpmtZnq.exe cobalt_reflective_dll C:\Windows\system\gdPJxCe.exe cobalt_reflective_dll \Windows\system\fczQVQG.exe cobalt_reflective_dll C:\Windows\system\XcvzPEg.exe cobalt_reflective_dll C:\Windows\system\nZuLhBn.exe cobalt_reflective_dll \Windows\system\CWkQHzg.exe cobalt_reflective_dll C:\Windows\system\xdthrvK.exe cobalt_reflective_dll C:\Windows\system\vLiEsEt.exe cobalt_reflective_dll C:\Windows\system\Vnthxen.exe cobalt_reflective_dll C:\Windows\system\DXnEuKX.exe cobalt_reflective_dll C:\Windows\system\mgNUSVL.exe cobalt_reflective_dll C:\Windows\system\yeKxVrs.exe cobalt_reflective_dll C:\Windows\system\eYOanaX.exe cobalt_reflective_dll C:\Windows\system\cmzVgHl.exe cobalt_reflective_dll C:\Windows\system\YqzfisS.exe cobalt_reflective_dll C:\Windows\system\lqAyVbH.exe cobalt_reflective_dll C:\Windows\system\OxUDfqu.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule \Windows\system\nULzwrD.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\SCWeHXf.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\sofUqKr.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\SRJTwov.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\fpmtZnq.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\gdPJxCe.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\fczQVQG.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\XcvzPEg.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\nZuLhBn.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\CWkQHzg.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\xdthrvK.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\vLiEsEt.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\Vnthxen.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\DXnEuKX.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\mgNUSVL.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\yeKxVrs.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\eYOanaX.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\cmzVgHl.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\YqzfisS.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\lqAyVbH.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\OxUDfqu.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 59 IoCs
Processes:
resource yara_rule behavioral1/memory/2784-0-0x000000013FC20000-0x000000013FF74000-memory.dmp UPX \Windows\system\nULzwrD.exe UPX \Windows\system\SCWeHXf.exe UPX behavioral1/memory/1940-21-0x000000013F2C0000-0x000000013F614000-memory.dmp UPX C:\Windows\system\sofUqKr.exe UPX behavioral1/memory/2552-29-0x000000013F400000-0x000000013F754000-memory.dmp UPX C:\Windows\system\SRJTwov.exe UPX behavioral1/memory/2984-19-0x000000013F3D0000-0x000000013F724000-memory.dmp UPX behavioral1/memory/2992-14-0x000000013F550000-0x000000013F8A4000-memory.dmp UPX \Windows\system\fpmtZnq.exe UPX C:\Windows\system\gdPJxCe.exe UPX behavioral1/memory/2744-41-0x000000013F680000-0x000000013F9D4000-memory.dmp UPX behavioral1/memory/2664-40-0x000000013FEC0000-0x0000000140214000-memory.dmp UPX \Windows\system\fczQVQG.exe UPX behavioral1/memory/2784-56-0x000000013FC20000-0x000000013FF74000-memory.dmp UPX behavioral1/memory/2792-58-0x000000013FF30000-0x0000000140284000-memory.dmp UPX C:\Windows\system\XcvzPEg.exe UPX behavioral1/memory/2452-71-0x000000013FB10000-0x000000013FE64000-memory.dmp UPX behavioral1/memory/2536-78-0x000000013FD20000-0x0000000140074000-memory.dmp UPX behavioral1/memory/2940-85-0x000000013F230000-0x000000013F584000-memory.dmp UPX behavioral1/memory/1940-83-0x000000013F2C0000-0x000000013F614000-memory.dmp UPX C:\Windows\system\nZuLhBn.exe UPX \Windows\system\CWkQHzg.exe UPX C:\Windows\system\xdthrvK.exe UPX C:\Windows\system\vLiEsEt.exe UPX C:\Windows\system\Vnthxen.exe UPX C:\Windows\system\DXnEuKX.exe UPX C:\Windows\system\mgNUSVL.exe UPX behavioral1/memory/2812-100-0x000000013F330000-0x000000013F684000-memory.dmp UPX C:\Windows\system\yeKxVrs.exe UPX behavioral1/memory/2956-93-0x000000013FCE0000-0x0000000140034000-memory.dmp UPX behavioral1/memory/2552-91-0x000000013F400000-0x000000013F754000-memory.dmp UPX C:\Windows\system\eYOanaX.exe UPX C:\Windows\system\cmzVgHl.exe UPX C:\Windows\system\YqzfisS.exe UPX C:\Windows\system\lqAyVbH.exe UPX behavioral1/memory/2624-65-0x000000013F380000-0x000000013F6D4000-memory.dmp UPX behavioral1/memory/2992-57-0x000000013F550000-0x000000013F8A4000-memory.dmp UPX behavioral1/memory/3036-49-0x000000013F490000-0x000000013F7E4000-memory.dmp UPX C:\Windows\system\OxUDfqu.exe UPX behavioral1/memory/2452-140-0x000000013FB10000-0x000000013FE64000-memory.dmp UPX behavioral1/memory/2536-141-0x000000013FD20000-0x0000000140074000-memory.dmp UPX behavioral1/memory/2940-143-0x000000013F230000-0x000000013F584000-memory.dmp UPX behavioral1/memory/2956-144-0x000000013FCE0000-0x0000000140034000-memory.dmp UPX behavioral1/memory/2812-146-0x000000013F330000-0x000000013F684000-memory.dmp UPX behavioral1/memory/2992-148-0x000000013F550000-0x000000013F8A4000-memory.dmp UPX behavioral1/memory/2984-149-0x000000013F3D0000-0x000000013F724000-memory.dmp UPX behavioral1/memory/1940-150-0x000000013F2C0000-0x000000013F614000-memory.dmp UPX behavioral1/memory/2552-151-0x000000013F400000-0x000000013F754000-memory.dmp UPX behavioral1/memory/2664-152-0x000000013FEC0000-0x0000000140214000-memory.dmp UPX behavioral1/memory/2744-153-0x000000013F680000-0x000000013F9D4000-memory.dmp UPX behavioral1/memory/3036-154-0x000000013F490000-0x000000013F7E4000-memory.dmp UPX behavioral1/memory/2792-155-0x000000013FF30000-0x0000000140284000-memory.dmp UPX behavioral1/memory/2624-156-0x000000013F380000-0x000000013F6D4000-memory.dmp UPX behavioral1/memory/2452-157-0x000000013FB10000-0x000000013FE64000-memory.dmp UPX behavioral1/memory/2536-158-0x000000013FD20000-0x0000000140074000-memory.dmp UPX behavioral1/memory/2940-159-0x000000013F230000-0x000000013F584000-memory.dmp UPX behavioral1/memory/2956-160-0x000000013FCE0000-0x0000000140034000-memory.dmp UPX behavioral1/memory/2812-161-0x000000013F330000-0x000000013F684000-memory.dmp UPX -
XMRig Miner payload 64 IoCs
Processes:
resource yara_rule behavioral1/memory/2784-0-0x000000013FC20000-0x000000013FF74000-memory.dmp xmrig \Windows\system\nULzwrD.exe xmrig \Windows\system\SCWeHXf.exe xmrig behavioral1/memory/1940-21-0x000000013F2C0000-0x000000013F614000-memory.dmp xmrig C:\Windows\system\sofUqKr.exe xmrig behavioral1/memory/2552-29-0x000000013F400000-0x000000013F754000-memory.dmp xmrig C:\Windows\system\SRJTwov.exe xmrig behavioral1/memory/2984-19-0x000000013F3D0000-0x000000013F724000-memory.dmp xmrig behavioral1/memory/2992-14-0x000000013F550000-0x000000013F8A4000-memory.dmp xmrig \Windows\system\fpmtZnq.exe xmrig C:\Windows\system\gdPJxCe.exe xmrig behavioral1/memory/2744-41-0x000000013F680000-0x000000013F9D4000-memory.dmp xmrig behavioral1/memory/2784-42-0x000000013F680000-0x000000013F9D4000-memory.dmp xmrig behavioral1/memory/2664-40-0x000000013FEC0000-0x0000000140214000-memory.dmp xmrig \Windows\system\fczQVQG.exe xmrig behavioral1/memory/2784-56-0x000000013FC20000-0x000000013FF74000-memory.dmp xmrig behavioral1/memory/2792-58-0x000000013FF30000-0x0000000140284000-memory.dmp xmrig C:\Windows\system\XcvzPEg.exe xmrig behavioral1/memory/2452-71-0x000000013FB10000-0x000000013FE64000-memory.dmp xmrig behavioral1/memory/2536-78-0x000000013FD20000-0x0000000140074000-memory.dmp xmrig behavioral1/memory/2940-85-0x000000013F230000-0x000000013F584000-memory.dmp xmrig behavioral1/memory/2784-84-0x000000013F230000-0x000000013F584000-memory.dmp xmrig behavioral1/memory/1940-83-0x000000013F2C0000-0x000000013F614000-memory.dmp xmrig C:\Windows\system\nZuLhBn.exe xmrig \Windows\system\CWkQHzg.exe xmrig C:\Windows\system\xdthrvK.exe xmrig C:\Windows\system\vLiEsEt.exe xmrig C:\Windows\system\Vnthxen.exe xmrig C:\Windows\system\DXnEuKX.exe xmrig C:\Windows\system\mgNUSVL.exe xmrig behavioral1/memory/2812-100-0x000000013F330000-0x000000013F684000-memory.dmp xmrig behavioral1/memory/2784-99-0x000000013F330000-0x000000013F684000-memory.dmp xmrig C:\Windows\system\yeKxVrs.exe xmrig behavioral1/memory/2956-93-0x000000013FCE0000-0x0000000140034000-memory.dmp xmrig behavioral1/memory/2552-91-0x000000013F400000-0x000000013F754000-memory.dmp xmrig C:\Windows\system\eYOanaX.exe xmrig C:\Windows\system\cmzVgHl.exe xmrig C:\Windows\system\YqzfisS.exe xmrig C:\Windows\system\lqAyVbH.exe xmrig behavioral1/memory/2624-65-0x000000013F380000-0x000000013F6D4000-memory.dmp xmrig behavioral1/memory/2992-57-0x000000013F550000-0x000000013F8A4000-memory.dmp xmrig behavioral1/memory/3036-49-0x000000013F490000-0x000000013F7E4000-memory.dmp xmrig C:\Windows\system\OxUDfqu.exe xmrig behavioral1/memory/2452-140-0x000000013FB10000-0x000000013FE64000-memory.dmp xmrig behavioral1/memory/2536-141-0x000000013FD20000-0x0000000140074000-memory.dmp xmrig behavioral1/memory/2784-142-0x000000013F230000-0x000000013F584000-memory.dmp xmrig behavioral1/memory/2940-143-0x000000013F230000-0x000000013F584000-memory.dmp xmrig behavioral1/memory/2956-144-0x000000013FCE0000-0x0000000140034000-memory.dmp xmrig behavioral1/memory/2784-145-0x000000013F330000-0x000000013F684000-memory.dmp xmrig behavioral1/memory/2812-146-0x000000013F330000-0x000000013F684000-memory.dmp xmrig behavioral1/memory/2992-148-0x000000013F550000-0x000000013F8A4000-memory.dmp xmrig behavioral1/memory/2984-149-0x000000013F3D0000-0x000000013F724000-memory.dmp xmrig behavioral1/memory/1940-150-0x000000013F2C0000-0x000000013F614000-memory.dmp xmrig behavioral1/memory/2552-151-0x000000013F400000-0x000000013F754000-memory.dmp xmrig behavioral1/memory/2664-152-0x000000013FEC0000-0x0000000140214000-memory.dmp xmrig behavioral1/memory/2744-153-0x000000013F680000-0x000000013F9D4000-memory.dmp xmrig behavioral1/memory/3036-154-0x000000013F490000-0x000000013F7E4000-memory.dmp xmrig behavioral1/memory/2792-155-0x000000013FF30000-0x0000000140284000-memory.dmp xmrig behavioral1/memory/2624-156-0x000000013F380000-0x000000013F6D4000-memory.dmp xmrig behavioral1/memory/2452-157-0x000000013FB10000-0x000000013FE64000-memory.dmp xmrig behavioral1/memory/2536-158-0x000000013FD20000-0x0000000140074000-memory.dmp xmrig behavioral1/memory/2940-159-0x000000013F230000-0x000000013F584000-memory.dmp xmrig behavioral1/memory/2956-160-0x000000013FCE0000-0x0000000140034000-memory.dmp xmrig behavioral1/memory/2812-161-0x000000013F330000-0x000000013F684000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
nULzwrD.exeSCWeHXf.exeSRJTwov.exesofUqKr.exefpmtZnq.exegdPJxCe.exeOxUDfqu.exefczQVQG.exeXcvzPEg.exelqAyVbH.exeYqzfisS.execmzVgHl.exeeYOanaX.exeyeKxVrs.exemgNUSVL.exeDXnEuKX.exeVnthxen.exevLiEsEt.exexdthrvK.exenZuLhBn.exeCWkQHzg.exepid process 2992 nULzwrD.exe 2984 SCWeHXf.exe 1940 SRJTwov.exe 2552 sofUqKr.exe 2664 fpmtZnq.exe 2744 gdPJxCe.exe 3036 OxUDfqu.exe 2792 fczQVQG.exe 2624 XcvzPEg.exe 2452 lqAyVbH.exe 2536 YqzfisS.exe 2940 cmzVgHl.exe 2956 eYOanaX.exe 2812 yeKxVrs.exe 1192 mgNUSVL.exe 2832 DXnEuKX.exe 2936 Vnthxen.exe 1956 vLiEsEt.exe 1688 xdthrvK.exe 1616 nZuLhBn.exe 1204 CWkQHzg.exe -
Loads dropped DLL 21 IoCs
Processes:
2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exepid process 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe -
Processes:
resource yara_rule behavioral1/memory/2784-0-0x000000013FC20000-0x000000013FF74000-memory.dmp upx \Windows\system\nULzwrD.exe upx \Windows\system\SCWeHXf.exe upx behavioral1/memory/1940-21-0x000000013F2C0000-0x000000013F614000-memory.dmp upx C:\Windows\system\sofUqKr.exe upx behavioral1/memory/2552-29-0x000000013F400000-0x000000013F754000-memory.dmp upx C:\Windows\system\SRJTwov.exe upx behavioral1/memory/2984-19-0x000000013F3D0000-0x000000013F724000-memory.dmp upx behavioral1/memory/2992-14-0x000000013F550000-0x000000013F8A4000-memory.dmp upx \Windows\system\fpmtZnq.exe upx C:\Windows\system\gdPJxCe.exe upx behavioral1/memory/2744-41-0x000000013F680000-0x000000013F9D4000-memory.dmp upx behavioral1/memory/2664-40-0x000000013FEC0000-0x0000000140214000-memory.dmp upx \Windows\system\fczQVQG.exe upx behavioral1/memory/2784-56-0x000000013FC20000-0x000000013FF74000-memory.dmp upx behavioral1/memory/2792-58-0x000000013FF30000-0x0000000140284000-memory.dmp upx C:\Windows\system\XcvzPEg.exe upx behavioral1/memory/2452-71-0x000000013FB10000-0x000000013FE64000-memory.dmp upx behavioral1/memory/2536-78-0x000000013FD20000-0x0000000140074000-memory.dmp upx behavioral1/memory/2940-85-0x000000013F230000-0x000000013F584000-memory.dmp upx behavioral1/memory/1940-83-0x000000013F2C0000-0x000000013F614000-memory.dmp upx C:\Windows\system\nZuLhBn.exe upx \Windows\system\CWkQHzg.exe upx C:\Windows\system\xdthrvK.exe upx C:\Windows\system\vLiEsEt.exe upx C:\Windows\system\Vnthxen.exe upx C:\Windows\system\DXnEuKX.exe upx C:\Windows\system\mgNUSVL.exe upx behavioral1/memory/2812-100-0x000000013F330000-0x000000013F684000-memory.dmp upx C:\Windows\system\yeKxVrs.exe upx behavioral1/memory/2956-93-0x000000013FCE0000-0x0000000140034000-memory.dmp upx behavioral1/memory/2552-91-0x000000013F400000-0x000000013F754000-memory.dmp upx C:\Windows\system\eYOanaX.exe upx C:\Windows\system\cmzVgHl.exe upx C:\Windows\system\YqzfisS.exe upx C:\Windows\system\lqAyVbH.exe upx behavioral1/memory/2624-65-0x000000013F380000-0x000000013F6D4000-memory.dmp upx behavioral1/memory/2992-57-0x000000013F550000-0x000000013F8A4000-memory.dmp upx behavioral1/memory/3036-49-0x000000013F490000-0x000000013F7E4000-memory.dmp upx C:\Windows\system\OxUDfqu.exe upx behavioral1/memory/2452-140-0x000000013FB10000-0x000000013FE64000-memory.dmp upx behavioral1/memory/2536-141-0x000000013FD20000-0x0000000140074000-memory.dmp upx behavioral1/memory/2940-143-0x000000013F230000-0x000000013F584000-memory.dmp upx behavioral1/memory/2956-144-0x000000013FCE0000-0x0000000140034000-memory.dmp upx behavioral1/memory/2812-146-0x000000013F330000-0x000000013F684000-memory.dmp upx behavioral1/memory/2992-148-0x000000013F550000-0x000000013F8A4000-memory.dmp upx behavioral1/memory/2984-149-0x000000013F3D0000-0x000000013F724000-memory.dmp upx behavioral1/memory/1940-150-0x000000013F2C0000-0x000000013F614000-memory.dmp upx behavioral1/memory/2552-151-0x000000013F400000-0x000000013F754000-memory.dmp upx behavioral1/memory/2664-152-0x000000013FEC0000-0x0000000140214000-memory.dmp upx behavioral1/memory/2744-153-0x000000013F680000-0x000000013F9D4000-memory.dmp upx behavioral1/memory/3036-154-0x000000013F490000-0x000000013F7E4000-memory.dmp upx behavioral1/memory/2792-155-0x000000013FF30000-0x0000000140284000-memory.dmp upx behavioral1/memory/2624-156-0x000000013F380000-0x000000013F6D4000-memory.dmp upx behavioral1/memory/2452-157-0x000000013FB10000-0x000000013FE64000-memory.dmp upx behavioral1/memory/2536-158-0x000000013FD20000-0x0000000140074000-memory.dmp upx behavioral1/memory/2940-159-0x000000013F230000-0x000000013F584000-memory.dmp upx behavioral1/memory/2956-160-0x000000013FCE0000-0x0000000140034000-memory.dmp upx behavioral1/memory/2812-161-0x000000013F330000-0x000000013F684000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exedescription ioc process File created C:\Windows\System\lqAyVbH.exe 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\xdthrvK.exe 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\SCWeHXf.exe 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\fczQVQG.exe 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\sofUqKr.exe 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\OxUDfqu.exe 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\XcvzPEg.exe 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\eYOanaX.exe 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\yeKxVrs.exe 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\DXnEuKX.exe 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\nULzwrD.exe 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\SRJTwov.exe 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\vLiEsEt.exe 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\CWkQHzg.exe 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\gdPJxCe.exe 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\Vnthxen.exe 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\cmzVgHl.exe 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\mgNUSVL.exe 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\nZuLhBn.exe 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\fpmtZnq.exe 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\YqzfisS.exe 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process Token: SeLockMemoryPrivilege 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process target process PID 2784 wrote to memory of 2992 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe nULzwrD.exe PID 2784 wrote to memory of 2992 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe nULzwrD.exe PID 2784 wrote to memory of 2992 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe nULzwrD.exe PID 2784 wrote to memory of 2984 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe SCWeHXf.exe PID 2784 wrote to memory of 2984 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe SCWeHXf.exe PID 2784 wrote to memory of 2984 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe SCWeHXf.exe PID 2784 wrote to memory of 1940 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe SRJTwov.exe PID 2784 wrote to memory of 1940 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe SRJTwov.exe PID 2784 wrote to memory of 1940 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe SRJTwov.exe PID 2784 wrote to memory of 2552 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe sofUqKr.exe PID 2784 wrote to memory of 2552 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe sofUqKr.exe PID 2784 wrote to memory of 2552 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe sofUqKr.exe PID 2784 wrote to memory of 2664 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe fpmtZnq.exe PID 2784 wrote to memory of 2664 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe fpmtZnq.exe PID 2784 wrote to memory of 2664 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe fpmtZnq.exe PID 2784 wrote to memory of 2744 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe gdPJxCe.exe PID 2784 wrote to memory of 2744 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe gdPJxCe.exe PID 2784 wrote to memory of 2744 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe gdPJxCe.exe PID 2784 wrote to memory of 3036 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe OxUDfqu.exe PID 2784 wrote to memory of 3036 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe OxUDfqu.exe PID 2784 wrote to memory of 3036 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe OxUDfqu.exe PID 2784 wrote to memory of 2792 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe fczQVQG.exe PID 2784 wrote to memory of 2792 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe fczQVQG.exe PID 2784 wrote to memory of 2792 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe fczQVQG.exe PID 2784 wrote to memory of 2624 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe XcvzPEg.exe PID 2784 wrote to memory of 2624 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe XcvzPEg.exe PID 2784 wrote to memory of 2624 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe XcvzPEg.exe PID 2784 wrote to memory of 2452 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe lqAyVbH.exe PID 2784 wrote to memory of 2452 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe lqAyVbH.exe PID 2784 wrote to memory of 2452 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe lqAyVbH.exe PID 2784 wrote to memory of 2536 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe YqzfisS.exe PID 2784 wrote to memory of 2536 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe YqzfisS.exe PID 2784 wrote to memory of 2536 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe YqzfisS.exe PID 2784 wrote to memory of 2940 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe cmzVgHl.exe PID 2784 wrote to memory of 2940 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe cmzVgHl.exe PID 2784 wrote to memory of 2940 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe cmzVgHl.exe PID 2784 wrote to memory of 2956 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe eYOanaX.exe PID 2784 wrote to memory of 2956 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe eYOanaX.exe PID 2784 wrote to memory of 2956 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe eYOanaX.exe PID 2784 wrote to memory of 2812 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe yeKxVrs.exe PID 2784 wrote to memory of 2812 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe yeKxVrs.exe PID 2784 wrote to memory of 2812 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe yeKxVrs.exe PID 2784 wrote to memory of 1192 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe mgNUSVL.exe PID 2784 wrote to memory of 1192 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe mgNUSVL.exe PID 2784 wrote to memory of 1192 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe mgNUSVL.exe PID 2784 wrote to memory of 2832 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe DXnEuKX.exe PID 2784 wrote to memory of 2832 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe DXnEuKX.exe PID 2784 wrote to memory of 2832 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe DXnEuKX.exe PID 2784 wrote to memory of 2936 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe Vnthxen.exe PID 2784 wrote to memory of 2936 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe Vnthxen.exe PID 2784 wrote to memory of 2936 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe Vnthxen.exe PID 2784 wrote to memory of 1956 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe vLiEsEt.exe PID 2784 wrote to memory of 1956 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe vLiEsEt.exe PID 2784 wrote to memory of 1956 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe vLiEsEt.exe PID 2784 wrote to memory of 1688 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe xdthrvK.exe PID 2784 wrote to memory of 1688 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe xdthrvK.exe PID 2784 wrote to memory of 1688 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe xdthrvK.exe PID 2784 wrote to memory of 1616 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe nZuLhBn.exe PID 2784 wrote to memory of 1616 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe nZuLhBn.exe PID 2784 wrote to memory of 1616 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe nZuLhBn.exe PID 2784 wrote to memory of 1204 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe CWkQHzg.exe PID 2784 wrote to memory of 1204 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe CWkQHzg.exe PID 2784 wrote to memory of 1204 2784 2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe CWkQHzg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\nULzwrD.exeC:\Windows\System\nULzwrD.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\SCWeHXf.exeC:\Windows\System\SCWeHXf.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\SRJTwov.exeC:\Windows\System\SRJTwov.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\sofUqKr.exeC:\Windows\System\sofUqKr.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\fpmtZnq.exeC:\Windows\System\fpmtZnq.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\gdPJxCe.exeC:\Windows\System\gdPJxCe.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\OxUDfqu.exeC:\Windows\System\OxUDfqu.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\fczQVQG.exeC:\Windows\System\fczQVQG.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\XcvzPEg.exeC:\Windows\System\XcvzPEg.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lqAyVbH.exeC:\Windows\System\lqAyVbH.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YqzfisS.exeC:\Windows\System\YqzfisS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\cmzVgHl.exeC:\Windows\System\cmzVgHl.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\eYOanaX.exeC:\Windows\System\eYOanaX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\yeKxVrs.exeC:\Windows\System\yeKxVrs.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\mgNUSVL.exeC:\Windows\System\mgNUSVL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\DXnEuKX.exeC:\Windows\System\DXnEuKX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\Vnthxen.exeC:\Windows\System\Vnthxen.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\vLiEsEt.exeC:\Windows\System\vLiEsEt.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\xdthrvK.exeC:\Windows\System\xdthrvK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\nZuLhBn.exeC:\Windows\System\nZuLhBn.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CWkQHzg.exeC:\Windows\System\CWkQHzg.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\DXnEuKX.exeFilesize
5.9MB
MD5a3cd559c73256ca98fb24c336c86c00d
SHA122f3ad808573fc56ab2f6f718756b086cff265e3
SHA25684c6508bdf92e675fb53e5829783b5e007053986775867264017166717faf638
SHA5122972fcd47c229f3e8b5ed85169fadd52a22ea3716a23369625aa63d41dee1308e8412fd1efccf8a40f0ab58e5632e5601b1c42fb8c41ae1cb002c4dd8a498714
-
C:\Windows\system\OxUDfqu.exeFilesize
5.9MB
MD53b41d49db473e4a68f18324362e90df8
SHA12e3679b59351deb52ea8fc2ca768917e0885d621
SHA2564ce2560c37f8fc76bae034531d1a41e0531494d7d59970b3788e462cbbe2c426
SHA512bb151aa8a980d6756bdac428acc7223d0831000d5f370d961b6d764277624fdb488d4f391901c0df4898e1f07cbfc6efc46ce8d835f35a976eb94892c56a725c
-
C:\Windows\system\SRJTwov.exeFilesize
5.9MB
MD5e2d168c29981513209264e1272fdd695
SHA12b0840766f38e9a42e294f60d1145cf444f5e027
SHA256d8ff2e84d40ef0a2ae8ee3eb6c4d40b71af77bcd82e455210478c8e992394063
SHA512512e646ba73a862547a2a1a1fab6efa58e0fa02b97c2456206dfe66fdd38d03dbce83435b8d627aba6d362915f6a7134b9687aaa386404237b41b248bfc9a569
-
C:\Windows\system\Vnthxen.exeFilesize
5.9MB
MD57c8a962124f2663ab520b43917f17aa9
SHA138ca8d9eaf612b92c9619c9a2b24828a1db9a5cd
SHA2560bac200e3d6e60b9eb97450f2d442c8e2e8b0cb61131bc017d7477e29237e9be
SHA512bc7ec0753f7d702e5a512967ee87a6b4463f57a3b0d21220625ecb5a0e5b12d590fbe770cd5a1cf584ff3d0b6d67360800dcbd22efba3fa3036a7746ece7d153
-
C:\Windows\system\XcvzPEg.exeFilesize
5.9MB
MD55cdf9c01b98fe2af086fe4b3ec4a0ac2
SHA1c5029abb3dd19f0e47cb6dcdd38fa7ffca134961
SHA2561a7f5dbe78b26f3e832999d4eab497b3d6f27f596ffa38a669e7753c1e23de96
SHA512132d763d6604b03dc5b6d9c00e342b73efadaa1741d3db05bbcbb8b01a2a4a4a1070007d1b8ebe5347ac81861e41ac31e7fcd0d303b80fdb8d191fa728fdb6eb
-
C:\Windows\system\YqzfisS.exeFilesize
5.9MB
MD589c4f75335c8a7045671efb82d13ccf8
SHA1ce535489e137298ae334e14d4bf7fb5de2dcf75c
SHA2561482a5ee74bdacfdbb92cda6c55cda56d2fbd327ceeb2d5133931f0ffc6ba4d5
SHA51230544c9b25a7d6228e0ecf477a9a5f2f00541b0c3a73f29117e2645b0544ce7db282a4f2477800824a52a9c88be8c000ae566ecbead72a24d4ab059d7b7d7a64
-
C:\Windows\system\cmzVgHl.exeFilesize
5.9MB
MD54da1a038a3abf73953cff1343e5459cf
SHA101ef5d9a3f890853085c0531d48648c10e00c6f4
SHA2566dc33d97bf81e4f8b25c26025d0d5d9822fc3bde470fa6a44a104d57ca835902
SHA5129d18e096b91834308a0e19402bf63de151e6f928d759f68723ecf0d0b229af5624776ca2d8fbeba46f9605225fdaf34fa5f721f86ff58af504605c13b01eca97
-
C:\Windows\system\eYOanaX.exeFilesize
5.9MB
MD51539e39756ae79c527c43a777fb014c9
SHA1ca72c32935021feb31b6fdbe70cc52cf5d02578e
SHA256183200d0dee75e4aa94cbe9db7a345ed4ab2927362494021876b33b5d006212e
SHA5121308c167a46346680b560e88ae6b014f91c9dbda3030e0ddadfc9bc4be26193f28db884c430db89519cd8aed52396078f7055d78e36a008e9b50ddb35b040209
-
C:\Windows\system\gdPJxCe.exeFilesize
5.9MB
MD52ebf76c31731bb8441281fe65df888ce
SHA12751dc8c6b0c2984c2e62f6e5ee5ee710940ed37
SHA256568633dedac88ca85dd2170769cc3ebe3b86c6145fbcbaf7a25a15e2fedf7d1e
SHA512398dcfd800aaa182fc1676a55251e444643d33fa6b90fc610cdabe64876d04c076219bcfe01cd7abe4fcb10b69c6d69e679f3bcc360fcc14c29d777771e95f94
-
C:\Windows\system\lqAyVbH.exeFilesize
5.9MB
MD52dd23647b01d77dfbee269729c72f13c
SHA1c01d59b461dd76de9055f3523e7108b35fa8cae3
SHA25636f3ea89b9aeafcf5b2abb072a2f99537f921eb4add670453d11d0d8c19fc16a
SHA512406469b1fbd6559e66df6c6346571259d8f2242168c1d713138ee1527ec048e1918b6a4c856a95dc8cf67d9fe5fc391eff552891ee2ac47eb4112669cef7451f
-
C:\Windows\system\mgNUSVL.exeFilesize
5.9MB
MD517a7de3940f3e3b44c6667dcdbb62136
SHA13649a88fd22d1845ade606c851b98107839365b1
SHA256bf902d28b900209d3802bb33d590c8248378a830bd3b0bfccd31f366fdb48137
SHA5121db4446176ff555a56438a333b3033a1da6ac5dc85b3244dfb76eb04a38652e6f1cbc6443bf0cff1d840bee189e83b5548310d9a84d6ba743ccf0049940eb4fc
-
C:\Windows\system\nZuLhBn.exeFilesize
5.9MB
MD5ad786f6e1836609ff6707bd5ee8ff443
SHA15c36ec578cbac3eb51d8575d87e268f48dbdc370
SHA256bc6bd781b70e66af5061a0ee856a2e9a27e3246102ca8920e0a2d9776e1f49aa
SHA5122e95cbf79775ab83720717a84c112e64bdb2533470865fc4ab500559ba76d588a023a14f4c64cdc8252e5b37d24f99cf86c654d4b976410baf4e9f7e8a7890fd
-
C:\Windows\system\sofUqKr.exeFilesize
5.9MB
MD5de89208acdab77a5c0adb6bc9c8f4128
SHA1b71c52685667d52a30e7fed6bfbec17199591a8b
SHA256c2320b3f671470610e82deeae0123bdb4f0644170adcb85ccec8ba81694792c7
SHA512df2ff599083978f65e62ba208abc90ff9162163bdf17e5c7dc7951edc3fea6c386f251f1c9b770e73307e07ff32820e91c9903e39610e000fdb15280f4ab231e
-
C:\Windows\system\vLiEsEt.exeFilesize
5.9MB
MD5d0e83a06bb48bb01912f9e790ab39e31
SHA1c5db61e2985e8ab9dc071183e86216b0c09cec38
SHA2564c0be562a9060668b83e4069ce1fa6cb43227bf59224026a89c82a5030936c06
SHA512115159529ca626d2eec9f964c6851b990de9c1a2379e08ccf2badc0975cc94f6135de48ef5eabf680c0b2973490f358ebb41ca2ce2e23b4f98551463afbaf47c
-
C:\Windows\system\xdthrvK.exeFilesize
5.9MB
MD5e2a5d2a19286967b5a191f30b400d0e5
SHA1ca0bd25e4e7ad4ff3ba18c9cbf974a08f7115849
SHA256dcba4bb931027ee13cd3b47d1d5a6bb7aeadb9e7c1dd410d8a45400030cbbdfe
SHA5124617eab9b319413ea98e160612e87955a360d67f8d53387f0c026ea2b4732e9721df3dcfbf39caf97ffe946ed39e867e3dfb38f6446f9bf6ac104ba5b188e2cb
-
C:\Windows\system\yeKxVrs.exeFilesize
5.9MB
MD519bc362cf89d2b3a4b2ca15ab4c000e5
SHA1f091a6595ebcbd185717693144d9def4f1def97b
SHA256347c81fa864a5adb5a965e9f013501144db85504fd0f4204606bc6032a11acc4
SHA512334a00f39565e7f4913861e559fcb40922b413351782960eee6d03b8bc03d84766d3efaa368b420ca4e6d9ee4986b1bf9cd1baeb942263d90e96eb35009d9fe3
-
\Windows\system\CWkQHzg.exeFilesize
5.9MB
MD5e6b1ab9b366fd73080e64637fb4c8221
SHA17994b9209d27c8559762ca8e512c0d7d5cee6e75
SHA256089613cfc5d1dedb48183b745ded1f50327a9e1a4ed7664840a18863c7bfb968
SHA5120dfd2834683ca7ed6d13659faed604adac772e0d947faea8241eab9516ba34f93708bbcd656a68229ac2fd14160c7ed0bc901d210901b77891b2d882265e8333
-
\Windows\system\SCWeHXf.exeFilesize
5.9MB
MD5ffa2412dfa428865dd5e5ee04bb371cd
SHA1bec1bb0ef4f453476650185a8ea24e140b43f5ed
SHA2560852a094a96cce90620317dbf01e89480c8412be72d5897ba2f4ab2f6ed38809
SHA512679f47c2be5b74d8662b8c66c6c507014547d00ab6aef9ff859417b9f05f16cdaf5386e0c1e2be1188bd684ca9e01c536db814cdfa6f41b8b33b3191221de84d
-
\Windows\system\fczQVQG.exeFilesize
5.9MB
MD53acebc991b05a3c34309d7419c57ca29
SHA1edc05ad5a2d44966106cf2201129c21486fac967
SHA256c5dc65d71fd75d938142bc65765615f1235960935c54298280125b95c1c96458
SHA512d3164f36c7f0f1004e28089cab6240153819c014b2709b284b497325c5d29e2ae6d1018af4970a8e150f9259d1172d2f7f12cec590e40499a6f42fd67be6cc46
-
\Windows\system\fpmtZnq.exeFilesize
5.9MB
MD597887263ba7041d490736913d1de2e22
SHA1246bfad6b27cece6d533186143274dfeba645472
SHA2560663fc8cbc0b31a3c6d13c468b0ad4915591ebe0d460f26c536e2458afd68e9e
SHA512161ab963c1dbb9699f1ebac2adc509ff1c7b28596c89fb699bca6d7f0adb9f6922a5675b9f9489db97ce0814bbff8f1c064e15296b44d1503df193ff991a6d4d
-
\Windows\system\nULzwrD.exeFilesize
5.9MB
MD5c9757740a5d098729a2672faed77b7be
SHA13062add4ebc529d45f6b109ecfdde41fba7b51c0
SHA2564bc2db89d0a8ed13fc8e281688a9e8ea9dec1c5b7312d8f048230ad89125d829
SHA51253c09508bd0aad7a0db953047118dcad3eb185231d97a9bb8f52239efe63ef4b4f86d275b9a87662989830e7e408f8dcb23248c8980b57b84e286020cf1597e7
-
memory/1940-83-0x000000013F2C0000-0x000000013F614000-memory.dmpFilesize
3.3MB
-
memory/1940-21-0x000000013F2C0000-0x000000013F614000-memory.dmpFilesize
3.3MB
-
memory/1940-150-0x000000013F2C0000-0x000000013F614000-memory.dmpFilesize
3.3MB
-
memory/2452-71-0x000000013FB10000-0x000000013FE64000-memory.dmpFilesize
3.3MB
-
memory/2452-140-0x000000013FB10000-0x000000013FE64000-memory.dmpFilesize
3.3MB
-
memory/2452-157-0x000000013FB10000-0x000000013FE64000-memory.dmpFilesize
3.3MB
-
memory/2536-78-0x000000013FD20000-0x0000000140074000-memory.dmpFilesize
3.3MB
-
memory/2536-158-0x000000013FD20000-0x0000000140074000-memory.dmpFilesize
3.3MB
-
memory/2536-141-0x000000013FD20000-0x0000000140074000-memory.dmpFilesize
3.3MB
-
memory/2552-91-0x000000013F400000-0x000000013F754000-memory.dmpFilesize
3.3MB
-
memory/2552-29-0x000000013F400000-0x000000013F754000-memory.dmpFilesize
3.3MB
-
memory/2552-151-0x000000013F400000-0x000000013F754000-memory.dmpFilesize
3.3MB
-
memory/2624-156-0x000000013F380000-0x000000013F6D4000-memory.dmpFilesize
3.3MB
-
memory/2624-65-0x000000013F380000-0x000000013F6D4000-memory.dmpFilesize
3.3MB
-
memory/2664-152-0x000000013FEC0000-0x0000000140214000-memory.dmpFilesize
3.3MB
-
memory/2664-40-0x000000013FEC0000-0x0000000140214000-memory.dmpFilesize
3.3MB
-
memory/2744-153-0x000000013F680000-0x000000013F9D4000-memory.dmpFilesize
3.3MB
-
memory/2744-41-0x000000013F680000-0x000000013F9D4000-memory.dmpFilesize
3.3MB
-
memory/2784-56-0x000000013FC20000-0x000000013FF74000-memory.dmpFilesize
3.3MB
-
memory/2784-7-0x000000013F550000-0x000000013F8A4000-memory.dmpFilesize
3.3MB
-
memory/2784-1-0x0000000001B20000-0x0000000001B30000-memory.dmpFilesize
64KB
-
memory/2784-99-0x000000013F330000-0x000000013F684000-memory.dmpFilesize
3.3MB
-
memory/2784-27-0x000000013F400000-0x000000013F754000-memory.dmpFilesize
3.3MB
-
memory/2784-77-0x0000000002340000-0x0000000002694000-memory.dmpFilesize
3.3MB
-
memory/2784-107-0x000000013F550000-0x000000013F8A4000-memory.dmpFilesize
3.3MB
-
memory/2784-84-0x000000013F230000-0x000000013F584000-memory.dmpFilesize
3.3MB
-
memory/2784-18-0x000000013F2C0000-0x000000013F614000-memory.dmpFilesize
3.3MB
-
memory/2784-64-0x000000013F380000-0x000000013F6D4000-memory.dmpFilesize
3.3MB
-
memory/2784-92-0x0000000002340000-0x0000000002694000-memory.dmpFilesize
3.3MB
-
memory/2784-51-0x0000000002340000-0x0000000002694000-memory.dmpFilesize
3.3MB
-
memory/2784-42-0x000000013F680000-0x000000013F9D4000-memory.dmpFilesize
3.3MB
-
memory/2784-48-0x000000013F490000-0x000000013F7E4000-memory.dmpFilesize
3.3MB
-
memory/2784-70-0x0000000002340000-0x0000000002694000-memory.dmpFilesize
3.3MB
-
memory/2784-138-0x000000013F380000-0x000000013F6D4000-memory.dmpFilesize
3.3MB
-
memory/2784-139-0x0000000002340000-0x0000000002694000-memory.dmpFilesize
3.3MB
-
memory/2784-147-0x000000013F550000-0x000000013F8A4000-memory.dmpFilesize
3.3MB
-
memory/2784-0-0x000000013FC20000-0x000000013FF74000-memory.dmpFilesize
3.3MB
-
memory/2784-142-0x000000013F230000-0x000000013F584000-memory.dmpFilesize
3.3MB
-
memory/2784-145-0x000000013F330000-0x000000013F684000-memory.dmpFilesize
3.3MB
-
memory/2792-58-0x000000013FF30000-0x0000000140284000-memory.dmpFilesize
3.3MB
-
memory/2792-155-0x000000013FF30000-0x0000000140284000-memory.dmpFilesize
3.3MB
-
memory/2812-161-0x000000013F330000-0x000000013F684000-memory.dmpFilesize
3.3MB
-
memory/2812-146-0x000000013F330000-0x000000013F684000-memory.dmpFilesize
3.3MB
-
memory/2812-100-0x000000013F330000-0x000000013F684000-memory.dmpFilesize
3.3MB
-
memory/2940-159-0x000000013F230000-0x000000013F584000-memory.dmpFilesize
3.3MB
-
memory/2940-85-0x000000013F230000-0x000000013F584000-memory.dmpFilesize
3.3MB
-
memory/2940-143-0x000000013F230000-0x000000013F584000-memory.dmpFilesize
3.3MB
-
memory/2956-144-0x000000013FCE0000-0x0000000140034000-memory.dmpFilesize
3.3MB
-
memory/2956-160-0x000000013FCE0000-0x0000000140034000-memory.dmpFilesize
3.3MB
-
memory/2956-93-0x000000013FCE0000-0x0000000140034000-memory.dmpFilesize
3.3MB
-
memory/2984-149-0x000000013F3D0000-0x000000013F724000-memory.dmpFilesize
3.3MB
-
memory/2984-19-0x000000013F3D0000-0x000000013F724000-memory.dmpFilesize
3.3MB
-
memory/2992-148-0x000000013F550000-0x000000013F8A4000-memory.dmpFilesize
3.3MB
-
memory/2992-14-0x000000013F550000-0x000000013F8A4000-memory.dmpFilesize
3.3MB
-
memory/2992-57-0x000000013F550000-0x000000013F8A4000-memory.dmpFilesize
3.3MB
-
memory/3036-154-0x000000013F490000-0x000000013F7E4000-memory.dmpFilesize
3.3MB
-
memory/3036-49-0x000000013F490000-0x000000013F7E4000-memory.dmpFilesize
3.3MB