Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
21-06-2024 07:35
Behavioral task
behavioral1
Sample
2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240611-en
General
-
Target
2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
c5f081743924ba163f3724fa356aaec8
-
SHA1
823656734c73e45fb6bee18553da178731c942de
-
SHA256
6583f892795061adb446ac99210138ed9e96a6862ab1726f6668e62a312a93ad
-
SHA512
04ba17b1b4803b667d65bf152afac52084d07115ac13ded5c0b0c2d14d3ff435b7f9c8969383dad028b82c826cee31d7267c269726c00ac172de6743c86e9dc1
-
SSDEEP
98304:ERNqrEXEdfE0pZOf56utgpPFotBER/mQ32lUN:QSEB56utgpPF8u/7N
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\ufaKoKG.exe cobalt_reflective_dll \Windows\system\AmZQosn.exe cobalt_reflective_dll C:\Windows\system\sZsdBRH.exe cobalt_reflective_dll \Windows\system\PfCPKFN.exe cobalt_reflective_dll \Windows\system\mTxMsDl.exe cobalt_reflective_dll C:\Windows\system\oNLLMWr.exe cobalt_reflective_dll C:\Windows\system\QcygqKS.exe cobalt_reflective_dll C:\Windows\system\UHSgdYa.exe cobalt_reflective_dll C:\Windows\system\CIzBuPG.exe cobalt_reflective_dll C:\Windows\system\CmSUQwy.exe cobalt_reflective_dll C:\Windows\system\jnMIZre.exe cobalt_reflective_dll \Windows\system\WxHaHiA.exe cobalt_reflective_dll C:\Windows\system\oTjrBqS.exe cobalt_reflective_dll \Windows\system\puugriO.exe cobalt_reflective_dll \Windows\system\hEGuXdk.exe cobalt_reflective_dll C:\Windows\system\XjjqyVh.exe cobalt_reflective_dll \Windows\system\zePVweQ.exe cobalt_reflective_dll C:\Windows\system\vPzBLnf.exe cobalt_reflective_dll \Windows\system\pVUQSHm.exe cobalt_reflective_dll \Windows\system\GJXsGJo.exe cobalt_reflective_dll \Windows\system\imlETjp.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule \Windows\system\ufaKoKG.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\AmZQosn.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\sZsdBRH.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\PfCPKFN.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\mTxMsDl.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\oNLLMWr.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\QcygqKS.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\UHSgdYa.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\CIzBuPG.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\CmSUQwy.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\jnMIZre.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\WxHaHiA.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\oTjrBqS.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\puugriO.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\hEGuXdk.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\XjjqyVh.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\zePVweQ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\vPzBLnf.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\pVUQSHm.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\GJXsGJo.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\imlETjp.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 60 IoCs
Processes:
resource yara_rule behavioral1/memory/2368-0-0x000000013FD60000-0x00000001400B4000-memory.dmp UPX \Windows\system\ufaKoKG.exe UPX behavioral1/memory/2160-8-0x000000013F140000-0x000000013F494000-memory.dmp UPX \Windows\system\AmZQosn.exe UPX behavioral1/memory/2260-14-0x000000013F7F0000-0x000000013FB44000-memory.dmp UPX C:\Windows\system\sZsdBRH.exe UPX \Windows\system\PfCPKFN.exe UPX behavioral1/memory/2844-27-0x000000013F030000-0x000000013F384000-memory.dmp UPX behavioral1/memory/2720-21-0x000000013F4B0000-0x000000013F804000-memory.dmp UPX \Windows\system\mTxMsDl.exe UPX behavioral1/memory/2900-33-0x000000013FAC0000-0x000000013FE14000-memory.dmp UPX behavioral1/memory/2064-42-0x000000013FBB0000-0x000000013FF04000-memory.dmp UPX C:\Windows\system\oNLLMWr.exe UPX behavioral1/memory/2932-49-0x000000013F260000-0x000000013F5B4000-memory.dmp UPX behavioral1/memory/2740-56-0x000000013F4C0000-0x000000013F814000-memory.dmp UPX C:\Windows\system\QcygqKS.exe UPX behavioral1/memory/2260-68-0x000000013F7F0000-0x000000013FB44000-memory.dmp UPX behavioral1/memory/2692-70-0x000000013FD40000-0x0000000140094000-memory.dmp UPX C:\Windows\system\UHSgdYa.exe UPX behavioral1/memory/2580-63-0x000000013F650000-0x000000013F9A4000-memory.dmp UPX C:\Windows\system\CIzBuPG.exe UPX behavioral1/memory/832-80-0x000000013FBB0000-0x000000013FF04000-memory.dmp UPX behavioral1/memory/2844-79-0x000000013F030000-0x000000013F384000-memory.dmp UPX behavioral1/memory/2720-76-0x000000013F4B0000-0x000000013F804000-memory.dmp UPX behavioral1/memory/2160-55-0x000000013F140000-0x000000013F494000-memory.dmp UPX C:\Windows\system\CmSUQwy.exe UPX behavioral1/memory/2368-48-0x000000013FD60000-0x00000001400B4000-memory.dmp UPX C:\Windows\system\jnMIZre.exe UPX behavioral1/memory/2900-82-0x000000013FAC0000-0x000000013FE14000-memory.dmp UPX \Windows\system\WxHaHiA.exe UPX C:\Windows\system\oTjrBqS.exe UPX behavioral1/memory/2140-92-0x000000013FB60000-0x000000013FEB4000-memory.dmp UPX behavioral1/memory/2136-95-0x000000013FED0000-0x0000000140224000-memory.dmp UPX \Windows\system\puugriO.exe UPX \Windows\system\hEGuXdk.exe UPX C:\Windows\system\XjjqyVh.exe UPX behavioral1/memory/2692-132-0x000000013FD40000-0x0000000140094000-memory.dmp UPX \Windows\system\zePVweQ.exe UPX C:\Windows\system\vPzBLnf.exe UPX behavioral1/memory/2740-105-0x000000013F4C0000-0x000000013F814000-memory.dmp UPX \Windows\system\pVUQSHm.exe UPX \Windows\system\GJXsGJo.exe UPX behavioral1/memory/1656-114-0x000000013F150000-0x000000013F4A4000-memory.dmp UPX behavioral1/memory/2580-130-0x000000013F650000-0x000000013F9A4000-memory.dmp UPX \Windows\system\imlETjp.exe UPX behavioral1/memory/832-144-0x000000013FBB0000-0x000000013FF04000-memory.dmp UPX behavioral1/memory/2160-146-0x000000013F140000-0x000000013F494000-memory.dmp UPX behavioral1/memory/2260-147-0x000000013F7F0000-0x000000013FB44000-memory.dmp UPX behavioral1/memory/2720-148-0x000000013F4B0000-0x000000013F804000-memory.dmp UPX behavioral1/memory/2900-150-0x000000013FAC0000-0x000000013FE14000-memory.dmp UPX behavioral1/memory/2064-149-0x000000013FBB0000-0x000000013FF04000-memory.dmp UPX behavioral1/memory/2844-151-0x000000013F030000-0x000000013F384000-memory.dmp UPX behavioral1/memory/2932-152-0x000000013F260000-0x000000013F5B4000-memory.dmp UPX behavioral1/memory/2740-153-0x000000013F4C0000-0x000000013F814000-memory.dmp UPX behavioral1/memory/2692-154-0x000000013FD40000-0x0000000140094000-memory.dmp UPX behavioral1/memory/2580-155-0x000000013F650000-0x000000013F9A4000-memory.dmp UPX behavioral1/memory/832-156-0x000000013FBB0000-0x000000013FF04000-memory.dmp UPX behavioral1/memory/2140-157-0x000000013FB60000-0x000000013FEB4000-memory.dmp UPX behavioral1/memory/2136-158-0x000000013FED0000-0x0000000140224000-memory.dmp UPX behavioral1/memory/1656-159-0x000000013F150000-0x000000013F4A4000-memory.dmp UPX -
XMRig Miner payload 63 IoCs
Processes:
resource yara_rule behavioral1/memory/2368-0-0x000000013FD60000-0x00000001400B4000-memory.dmp xmrig \Windows\system\ufaKoKG.exe xmrig behavioral1/memory/2160-8-0x000000013F140000-0x000000013F494000-memory.dmp xmrig \Windows\system\AmZQosn.exe xmrig behavioral1/memory/2260-14-0x000000013F7F0000-0x000000013FB44000-memory.dmp xmrig C:\Windows\system\sZsdBRH.exe xmrig \Windows\system\PfCPKFN.exe xmrig behavioral1/memory/2844-27-0x000000013F030000-0x000000013F384000-memory.dmp xmrig behavioral1/memory/2720-21-0x000000013F4B0000-0x000000013F804000-memory.dmp xmrig \Windows\system\mTxMsDl.exe xmrig behavioral1/memory/2900-33-0x000000013FAC0000-0x000000013FE14000-memory.dmp xmrig behavioral1/memory/2064-42-0x000000013FBB0000-0x000000013FF04000-memory.dmp xmrig C:\Windows\system\oNLLMWr.exe xmrig behavioral1/memory/2932-49-0x000000013F260000-0x000000013F5B4000-memory.dmp xmrig behavioral1/memory/2740-56-0x000000013F4C0000-0x000000013F814000-memory.dmp xmrig C:\Windows\system\QcygqKS.exe xmrig behavioral1/memory/2260-68-0x000000013F7F0000-0x000000013FB44000-memory.dmp xmrig behavioral1/memory/2692-70-0x000000013FD40000-0x0000000140094000-memory.dmp xmrig C:\Windows\system\UHSgdYa.exe xmrig behavioral1/memory/2580-63-0x000000013F650000-0x000000013F9A4000-memory.dmp xmrig C:\Windows\system\CIzBuPG.exe xmrig behavioral1/memory/832-80-0x000000013FBB0000-0x000000013FF04000-memory.dmp xmrig behavioral1/memory/2844-79-0x000000013F030000-0x000000013F384000-memory.dmp xmrig behavioral1/memory/2720-76-0x000000013F4B0000-0x000000013F804000-memory.dmp xmrig behavioral1/memory/2160-55-0x000000013F140000-0x000000013F494000-memory.dmp xmrig C:\Windows\system\CmSUQwy.exe xmrig behavioral1/memory/2368-48-0x000000013FD60000-0x00000001400B4000-memory.dmp xmrig C:\Windows\system\jnMIZre.exe xmrig behavioral1/memory/2900-82-0x000000013FAC0000-0x000000013FE14000-memory.dmp xmrig \Windows\system\WxHaHiA.exe xmrig C:\Windows\system\oTjrBqS.exe xmrig behavioral1/memory/2140-92-0x000000013FB60000-0x000000013FEB4000-memory.dmp xmrig behavioral1/memory/2136-95-0x000000013FED0000-0x0000000140224000-memory.dmp xmrig \Windows\system\puugriO.exe xmrig \Windows\system\hEGuXdk.exe xmrig C:\Windows\system\XjjqyVh.exe xmrig behavioral1/memory/2692-132-0x000000013FD40000-0x0000000140094000-memory.dmp xmrig \Windows\system\zePVweQ.exe xmrig C:\Windows\system\vPzBLnf.exe xmrig behavioral1/memory/2740-105-0x000000013F4C0000-0x000000013F814000-memory.dmp xmrig \Windows\system\pVUQSHm.exe xmrig \Windows\system\GJXsGJo.exe xmrig behavioral1/memory/1656-114-0x000000013F150000-0x000000013F4A4000-memory.dmp xmrig behavioral1/memory/2580-130-0x000000013F650000-0x000000013F9A4000-memory.dmp xmrig behavioral1/memory/2368-109-0x000000013F150000-0x000000013F4A4000-memory.dmp xmrig \Windows\system\imlETjp.exe xmrig behavioral1/memory/2368-142-0x0000000002340000-0x0000000002694000-memory.dmp xmrig behavioral1/memory/832-144-0x000000013FBB0000-0x000000013FF04000-memory.dmp xmrig behavioral1/memory/2368-145-0x000000013F150000-0x000000013F4A4000-memory.dmp xmrig behavioral1/memory/2160-146-0x000000013F140000-0x000000013F494000-memory.dmp xmrig behavioral1/memory/2260-147-0x000000013F7F0000-0x000000013FB44000-memory.dmp xmrig behavioral1/memory/2720-148-0x000000013F4B0000-0x000000013F804000-memory.dmp xmrig behavioral1/memory/2900-150-0x000000013FAC0000-0x000000013FE14000-memory.dmp xmrig behavioral1/memory/2064-149-0x000000013FBB0000-0x000000013FF04000-memory.dmp xmrig behavioral1/memory/2844-151-0x000000013F030000-0x000000013F384000-memory.dmp xmrig behavioral1/memory/2932-152-0x000000013F260000-0x000000013F5B4000-memory.dmp xmrig behavioral1/memory/2740-153-0x000000013F4C0000-0x000000013F814000-memory.dmp xmrig behavioral1/memory/2692-154-0x000000013FD40000-0x0000000140094000-memory.dmp xmrig behavioral1/memory/2580-155-0x000000013F650000-0x000000013F9A4000-memory.dmp xmrig behavioral1/memory/832-156-0x000000013FBB0000-0x000000013FF04000-memory.dmp xmrig behavioral1/memory/2140-157-0x000000013FB60000-0x000000013FEB4000-memory.dmp xmrig behavioral1/memory/2136-158-0x000000013FED0000-0x0000000140224000-memory.dmp xmrig behavioral1/memory/1656-159-0x000000013F150000-0x000000013F4A4000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
ufaKoKG.exeAmZQosn.exesZsdBRH.exePfCPKFN.exejnMIZre.exemTxMsDl.exeoNLLMWr.exeCmSUQwy.exeUHSgdYa.exeQcygqKS.exeCIzBuPG.exeWxHaHiA.exeoTjrBqS.exepuugriO.exeimlETjp.exehEGuXdk.exeXjjqyVh.exevPzBLnf.exezePVweQ.exeGJXsGJo.exepVUQSHm.exepid process 2160 ufaKoKG.exe 2260 AmZQosn.exe 2720 sZsdBRH.exe 2844 PfCPKFN.exe 2900 jnMIZre.exe 2064 mTxMsDl.exe 2932 oNLLMWr.exe 2740 CmSUQwy.exe 2580 UHSgdYa.exe 2692 QcygqKS.exe 832 CIzBuPG.exe 2140 WxHaHiA.exe 2136 oTjrBqS.exe 1656 puugriO.exe 2828 imlETjp.exe 2912 hEGuXdk.exe 1748 XjjqyVh.exe 1884 vPzBLnf.exe 2016 zePVweQ.exe 2928 GJXsGJo.exe 1612 pVUQSHm.exe -
Loads dropped DLL 21 IoCs
Processes:
2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exepid process 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe -
Processes:
resource yara_rule behavioral1/memory/2368-0-0x000000013FD60000-0x00000001400B4000-memory.dmp upx \Windows\system\ufaKoKG.exe upx behavioral1/memory/2160-8-0x000000013F140000-0x000000013F494000-memory.dmp upx \Windows\system\AmZQosn.exe upx behavioral1/memory/2260-14-0x000000013F7F0000-0x000000013FB44000-memory.dmp upx C:\Windows\system\sZsdBRH.exe upx \Windows\system\PfCPKFN.exe upx behavioral1/memory/2844-27-0x000000013F030000-0x000000013F384000-memory.dmp upx behavioral1/memory/2720-21-0x000000013F4B0000-0x000000013F804000-memory.dmp upx \Windows\system\mTxMsDl.exe upx behavioral1/memory/2900-33-0x000000013FAC0000-0x000000013FE14000-memory.dmp upx behavioral1/memory/2064-42-0x000000013FBB0000-0x000000013FF04000-memory.dmp upx C:\Windows\system\oNLLMWr.exe upx behavioral1/memory/2932-49-0x000000013F260000-0x000000013F5B4000-memory.dmp upx behavioral1/memory/2740-56-0x000000013F4C0000-0x000000013F814000-memory.dmp upx C:\Windows\system\QcygqKS.exe upx behavioral1/memory/2260-68-0x000000013F7F0000-0x000000013FB44000-memory.dmp upx behavioral1/memory/2692-70-0x000000013FD40000-0x0000000140094000-memory.dmp upx C:\Windows\system\UHSgdYa.exe upx behavioral1/memory/2580-63-0x000000013F650000-0x000000013F9A4000-memory.dmp upx C:\Windows\system\CIzBuPG.exe upx behavioral1/memory/832-80-0x000000013FBB0000-0x000000013FF04000-memory.dmp upx behavioral1/memory/2844-79-0x000000013F030000-0x000000013F384000-memory.dmp upx behavioral1/memory/2720-76-0x000000013F4B0000-0x000000013F804000-memory.dmp upx behavioral1/memory/2160-55-0x000000013F140000-0x000000013F494000-memory.dmp upx C:\Windows\system\CmSUQwy.exe upx behavioral1/memory/2368-48-0x000000013FD60000-0x00000001400B4000-memory.dmp upx C:\Windows\system\jnMIZre.exe upx behavioral1/memory/2900-82-0x000000013FAC0000-0x000000013FE14000-memory.dmp upx \Windows\system\WxHaHiA.exe upx C:\Windows\system\oTjrBqS.exe upx behavioral1/memory/2140-92-0x000000013FB60000-0x000000013FEB4000-memory.dmp upx behavioral1/memory/2136-95-0x000000013FED0000-0x0000000140224000-memory.dmp upx \Windows\system\puugriO.exe upx \Windows\system\hEGuXdk.exe upx C:\Windows\system\XjjqyVh.exe upx behavioral1/memory/2692-132-0x000000013FD40000-0x0000000140094000-memory.dmp upx \Windows\system\zePVweQ.exe upx C:\Windows\system\vPzBLnf.exe upx behavioral1/memory/2740-105-0x000000013F4C0000-0x000000013F814000-memory.dmp upx \Windows\system\pVUQSHm.exe upx \Windows\system\GJXsGJo.exe upx behavioral1/memory/1656-114-0x000000013F150000-0x000000013F4A4000-memory.dmp upx behavioral1/memory/2580-130-0x000000013F650000-0x000000013F9A4000-memory.dmp upx \Windows\system\imlETjp.exe upx behavioral1/memory/832-144-0x000000013FBB0000-0x000000013FF04000-memory.dmp upx behavioral1/memory/2160-146-0x000000013F140000-0x000000013F494000-memory.dmp upx behavioral1/memory/2260-147-0x000000013F7F0000-0x000000013FB44000-memory.dmp upx behavioral1/memory/2720-148-0x000000013F4B0000-0x000000013F804000-memory.dmp upx behavioral1/memory/2900-150-0x000000013FAC0000-0x000000013FE14000-memory.dmp upx behavioral1/memory/2064-149-0x000000013FBB0000-0x000000013FF04000-memory.dmp upx behavioral1/memory/2844-151-0x000000013F030000-0x000000013F384000-memory.dmp upx behavioral1/memory/2932-152-0x000000013F260000-0x000000013F5B4000-memory.dmp upx behavioral1/memory/2740-153-0x000000013F4C0000-0x000000013F814000-memory.dmp upx behavioral1/memory/2692-154-0x000000013FD40000-0x0000000140094000-memory.dmp upx behavioral1/memory/2580-155-0x000000013F650000-0x000000013F9A4000-memory.dmp upx behavioral1/memory/832-156-0x000000013FBB0000-0x000000013FF04000-memory.dmp upx behavioral1/memory/2140-157-0x000000013FB60000-0x000000013FEB4000-memory.dmp upx behavioral1/memory/2136-158-0x000000013FED0000-0x0000000140224000-memory.dmp upx behavioral1/memory/1656-159-0x000000013F150000-0x000000013F4A4000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exedescription ioc process File created C:\Windows\System\sZsdBRH.exe 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\jnMIZre.exe 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\mTxMsDl.exe 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\CIzBuPG.exe 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\WxHaHiA.exe 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\zePVweQ.exe 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ufaKoKG.exe 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\UHSgdYa.exe 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\oTjrBqS.exe 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\puugriO.exe 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\hEGuXdk.exe 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\GJXsGJo.exe 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\AmZQosn.exe 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\PfCPKFN.exe 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\oNLLMWr.exe 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\QcygqKS.exe 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\imlETjp.exe 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\vPzBLnf.exe 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\CmSUQwy.exe 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\XjjqyVh.exe 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\pVUQSHm.exe 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process Token: SeLockMemoryPrivilege 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process target process PID 2368 wrote to memory of 2160 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe ufaKoKG.exe PID 2368 wrote to memory of 2160 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe ufaKoKG.exe PID 2368 wrote to memory of 2160 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe ufaKoKG.exe PID 2368 wrote to memory of 2260 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe AmZQosn.exe PID 2368 wrote to memory of 2260 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe AmZQosn.exe PID 2368 wrote to memory of 2260 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe AmZQosn.exe PID 2368 wrote to memory of 2720 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe sZsdBRH.exe PID 2368 wrote to memory of 2720 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe sZsdBRH.exe PID 2368 wrote to memory of 2720 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe sZsdBRH.exe PID 2368 wrote to memory of 2844 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe PfCPKFN.exe PID 2368 wrote to memory of 2844 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe PfCPKFN.exe PID 2368 wrote to memory of 2844 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe PfCPKFN.exe PID 2368 wrote to memory of 2900 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe jnMIZre.exe PID 2368 wrote to memory of 2900 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe jnMIZre.exe PID 2368 wrote to memory of 2900 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe jnMIZre.exe PID 2368 wrote to memory of 2064 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe mTxMsDl.exe PID 2368 wrote to memory of 2064 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe mTxMsDl.exe PID 2368 wrote to memory of 2064 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe mTxMsDl.exe PID 2368 wrote to memory of 2932 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe oNLLMWr.exe PID 2368 wrote to memory of 2932 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe oNLLMWr.exe PID 2368 wrote to memory of 2932 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe oNLLMWr.exe PID 2368 wrote to memory of 2740 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe CmSUQwy.exe PID 2368 wrote to memory of 2740 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe CmSUQwy.exe PID 2368 wrote to memory of 2740 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe CmSUQwy.exe PID 2368 wrote to memory of 2580 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe UHSgdYa.exe PID 2368 wrote to memory of 2580 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe UHSgdYa.exe PID 2368 wrote to memory of 2580 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe UHSgdYa.exe PID 2368 wrote to memory of 2692 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe QcygqKS.exe PID 2368 wrote to memory of 2692 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe QcygqKS.exe PID 2368 wrote to memory of 2692 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe QcygqKS.exe PID 2368 wrote to memory of 832 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe CIzBuPG.exe PID 2368 wrote to memory of 832 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe CIzBuPG.exe PID 2368 wrote to memory of 832 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe CIzBuPG.exe PID 2368 wrote to memory of 2140 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe WxHaHiA.exe PID 2368 wrote to memory of 2140 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe WxHaHiA.exe PID 2368 wrote to memory of 2140 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe WxHaHiA.exe PID 2368 wrote to memory of 2136 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe oTjrBqS.exe PID 2368 wrote to memory of 2136 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe oTjrBqS.exe PID 2368 wrote to memory of 2136 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe oTjrBqS.exe PID 2368 wrote to memory of 1656 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe puugriO.exe PID 2368 wrote to memory of 1656 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe puugriO.exe PID 2368 wrote to memory of 1656 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe puugriO.exe PID 2368 wrote to memory of 2828 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe imlETjp.exe PID 2368 wrote to memory of 2828 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe imlETjp.exe PID 2368 wrote to memory of 2828 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe imlETjp.exe PID 2368 wrote to memory of 2912 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe hEGuXdk.exe PID 2368 wrote to memory of 2912 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe hEGuXdk.exe PID 2368 wrote to memory of 2912 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe hEGuXdk.exe PID 2368 wrote to memory of 2016 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe zePVweQ.exe PID 2368 wrote to memory of 2016 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe zePVweQ.exe PID 2368 wrote to memory of 2016 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe zePVweQ.exe PID 2368 wrote to memory of 1748 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe XjjqyVh.exe PID 2368 wrote to memory of 1748 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe XjjqyVh.exe PID 2368 wrote to memory of 1748 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe XjjqyVh.exe PID 2368 wrote to memory of 2928 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe GJXsGJo.exe PID 2368 wrote to memory of 2928 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe GJXsGJo.exe PID 2368 wrote to memory of 2928 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe GJXsGJo.exe PID 2368 wrote to memory of 1884 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe vPzBLnf.exe PID 2368 wrote to memory of 1884 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe vPzBLnf.exe PID 2368 wrote to memory of 1884 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe vPzBLnf.exe PID 2368 wrote to memory of 1612 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe pVUQSHm.exe PID 2368 wrote to memory of 1612 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe pVUQSHm.exe PID 2368 wrote to memory of 1612 2368 2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe pVUQSHm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-21_c5f081743924ba163f3724fa356aaec8_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\ufaKoKG.exeC:\Windows\System\ufaKoKG.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\AmZQosn.exeC:\Windows\System\AmZQosn.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\sZsdBRH.exeC:\Windows\System\sZsdBRH.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\PfCPKFN.exeC:\Windows\System\PfCPKFN.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\jnMIZre.exeC:\Windows\System\jnMIZre.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\mTxMsDl.exeC:\Windows\System\mTxMsDl.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\oNLLMWr.exeC:\Windows\System\oNLLMWr.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CmSUQwy.exeC:\Windows\System\CmSUQwy.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\UHSgdYa.exeC:\Windows\System\UHSgdYa.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\QcygqKS.exeC:\Windows\System\QcygqKS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CIzBuPG.exeC:\Windows\System\CIzBuPG.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\WxHaHiA.exeC:\Windows\System\WxHaHiA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\oTjrBqS.exeC:\Windows\System\oTjrBqS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\puugriO.exeC:\Windows\System\puugriO.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\imlETjp.exeC:\Windows\System\imlETjp.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\hEGuXdk.exeC:\Windows\System\hEGuXdk.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zePVweQ.exeC:\Windows\System\zePVweQ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\XjjqyVh.exeC:\Windows\System\XjjqyVh.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\GJXsGJo.exeC:\Windows\System\GJXsGJo.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\vPzBLnf.exeC:\Windows\System\vPzBLnf.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\pVUQSHm.exeC:\Windows\System\pVUQSHm.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\CIzBuPG.exeFilesize
5.9MB
MD5156840b1206d1ffaf6a91b44a0a09f52
SHA1116fa0f9d3eda00a68f95d7c3a06d6620b1cf577
SHA256a6de1e78a2b7608a3334aabaaf67650e54019f1fcbd632415a6100e898f5da34
SHA512f454c1a19363c8bbba816b4f7f3fd5311a5fca269f5b0fad5bffb75a3b3c5dcba58bfab38a3895f61bad759a82874c7776d6ce578fd4f07a39e4d21d8bd0131a
-
C:\Windows\system\CmSUQwy.exeFilesize
5.9MB
MD592906aa9f26e2961b42301b88dfba0c4
SHA119da26be3c5322e8c1a4b422241ad2c1ad791694
SHA2560a4175e9f5aad2bd84b9450dee887222c11b51a540c78f5df4dba0fcf077d9ae
SHA512a81c2219d084332e064139b4745967e60042582e16e0240599f3f5dc35a873d95d7221764af4a345d9fb6d8ee48f7fe88ce0bad357241edd465ed7f691c91f75
-
C:\Windows\system\QcygqKS.exeFilesize
5.9MB
MD59adb934f12380e4f4c308951c6fd0dc6
SHA1a373ec981abbff82a12dd5998582b329ad5c589a
SHA2567ecf73e23a43a67370f1c7d4a08e38d556d9ba0757245c5d833674528f937207
SHA512b57f73ea774a04dfa264fd20e48fcc8a319c32816060054773374d1dab31794f4af2359c49ed1ad7ecdae1b4893ebca1f6001ea81c1910bd1cd8f37aa2b92997
-
C:\Windows\system\UHSgdYa.exeFilesize
5.9MB
MD5d91dd02de645efdeb1d8f7992e454297
SHA1096ca513a42af17b20ad0d9bd4aabe067c8bafa1
SHA256ce1fcf2b28eab5193893af49b1fc67121f8f628c9ac8ef7e2e55ae6737d38dbb
SHA5124183f549d6609e2685f2511175ae4eb498c3375dda9d47423781b994949036b60d9029623ff5146fe3d0d4b3be3ec3f8932a1509a9cda6cf202016819746a321
-
C:\Windows\system\XjjqyVh.exeFilesize
5.9MB
MD536f63bbe4aaf24b4a07f7644678994e5
SHA14bcc6f93af054c29bcc0c5ecc56e791fe8d5a40f
SHA25656517a1a5d73b4e36ac8d95e107ba1a93c1437067a8f5565052cb45f86a04c89
SHA512f65b9a44ecd4a518a79ee13b40fabf905c5ab09f5144a196655602d994fa7134276b24673d1a7466ff08f7d6e821259c81db180d3a324c4832ab469aa1f5cf11
-
C:\Windows\system\jnMIZre.exeFilesize
5.9MB
MD5badc3081569f890f605ff8dc44c73d1a
SHA1bb9a1f3be80e1f2510dc42904c6433c687a1619e
SHA2566e887bef5384e9c6339dfdfecd7a204759f7998523ed86aebf6a975e08fd107b
SHA512ba350fd8b91454bba3811219551e32de323449ef941199161e7e1ad7bf3bd2e44631f0a816a6f147a392a12dfc7b85ec9c67ff8e3805fad9ec8a45eda8df22aa
-
C:\Windows\system\oNLLMWr.exeFilesize
5.9MB
MD526b51143c2a7048c1cee0d43ed7faafe
SHA119f7178929b9718a4b239358e8be8687e29dd4fe
SHA256f7ca6943ef973a3422901440f45c383dcae706d2765ef777616d3764c631a3d7
SHA512f968adb30034d5110b2517ee952143c2c0e1c2403e0d6e929351692731d4a8a66c8a97bd1bef3c5e2fa5aa19b07449bb48b80f21ecfce622515251c3bc816947
-
C:\Windows\system\oTjrBqS.exeFilesize
5.9MB
MD58f77c8f339b5050edab98ab03417677f
SHA1af483d694caef45b988994b9bf82fa7c17c64ab6
SHA256b6ccf21a91a426ef8e866635817a608941886fadd7c6fd22b646290ed906483a
SHA512cc13ee94b778dabe0bde40f0d5ed712327c7ea30deaca4f4c0f86cbbbddbbfd694ad3b9377c7443467ec93e84fa8dfe6fc220e72b08dfdf8f22393377bc2fe70
-
C:\Windows\system\sZsdBRH.exeFilesize
5.9MB
MD587e83095ef932087f0bf8f37bf4f442b
SHA131943f63953f759bca9a8fbf7e2ebc237bdbdc2d
SHA256b36474406d4a4b759c770302277f419a562eaeebede171fb76777305aacce22c
SHA512612989de2af1a63cea93d702e2d5dfc82acc6b80c13f77a556c19b3f5a13d2ae878a74617aa57b517e8868a49f1e00247d6e0d54a97da1f0699412d8c87bd887
-
C:\Windows\system\vPzBLnf.exeFilesize
5.9MB
MD5353b1f6d075b0f422701ee3052ee7ad2
SHA1daf413dc5a0192b984f15074bf403a743e62b86e
SHA256186889cb06a3fe9f8c4b16c76825075f690c8d124f3150bd0ce9c62dcc1d0d1b
SHA5128ee401b1501c417f5e8fef9fdaff2f94701f1140184fd7dbf2b74450547556b107868e36acf7457419c4613892a7536a219b6cdab969e42ef779ddb22b94a430
-
\Windows\system\AmZQosn.exeFilesize
5.9MB
MD5c3dc02de628920ba46ef439156c9e922
SHA16852d58b6dee98e31bf96513b513a3342b2d43ac
SHA256db5f905004590b642c9221fd156cff9df80dd096063bf52b5d59e4d56e159b6a
SHA51233bed356ae431de19f8f8d1e664870673b5f41d300d98a101e1eab02f48fe844aae661b0243e7ce4a449ca2f04f552789982fa7953520798ec2cdc4c26929610
-
\Windows\system\GJXsGJo.exeFilesize
5.9MB
MD5995f8eb091c8355479b0d280b57a0954
SHA185d56a5bb460e2776c4eacc632d751d3419ae95b
SHA256322ca59476ed66bb2a2a8b2e0ec17da74f67ae4423e969ac1b72c67f37d8b07e
SHA512c3c37265ed8cbc5a82728c125597f8a7f7eee855b8376003ef5a5a95b412e2abb8277e9779971c3e8b874259ac6f9742e6d10b9a49d22f6879ba426584d0d6ab
-
\Windows\system\PfCPKFN.exeFilesize
5.9MB
MD5a66e7b62002af76e9960925573564b6f
SHA1c90513a86cb61146d99dff83761d366ea3930e70
SHA2564c1ce7a2229e781aeddc6e0262e01cfbcf39cb314db470e87817158e6d79b8b8
SHA5126a5fc471b2b9a082135a5d33e7214c5047d775c2a74d05760ac4820acdd9f274199ccf2997a9cc41856230aab23bb8f6908e18603a2c57ac42e253b8bcde8089
-
\Windows\system\WxHaHiA.exeFilesize
5.9MB
MD5f2049629f8870615bf4fee3f96960d60
SHA145a1cd8e7bef573e089b81ce06498b16c52aa461
SHA2564562f1f723c5bc50959ea98f8653f474004f95d3acebc63b805dbf8af7c4da29
SHA512dce0536f4ca5f6e36a2d5a00aa5ad2d658f04c02143a180f56c047b32fbf51e3e9302ce4f74ea3af72d3dc011a4edf60a52b34cec821f6016746ecbc255f7e13
-
\Windows\system\hEGuXdk.exeFilesize
5.9MB
MD577728666db076462ca87ed56ba2d6e56
SHA1e16598da176407f931bd36125b7b31908615891a
SHA2568fa2a0e07703dbcc1185963d9678e0da4609125b6a144afcd13865ccf940e6f7
SHA51252bdd65a9fcc686e6fe4a9ccd759d572d65c415a3e229e90fa36c98fce8d5935ddd873550251e0d367647c316d7741bdfa559b873e2635619f9a33043cedf086
-
\Windows\system\imlETjp.exeFilesize
5.9MB
MD5a97d9a7dd4b5ac6a115834adfe4e8391
SHA10cae1aa754067844646832019aae6bd4ee121da4
SHA2566b21d46f69debb79ddaf0eed707b6ad56a47c0893741b813be295615b81a969e
SHA51219cefe28f03199c61b2e04a261d2cc1e31f74752abd1feeaec7a8dace9512c00a16ed31f9b3a6f94ba0ae3e838b05739fc0443438b0ef0c21ecb9bf80bbf365f
-
\Windows\system\mTxMsDl.exeFilesize
5.9MB
MD5357aa0e2b171a15e9538597b526ca634
SHA1642c21490ed075b75fd477d8e94f6992d7f295aa
SHA2567e7a670c0210ec1432c230059a0533750dc842f0e592a598d57410724cd02c4f
SHA512d87d5816a817bae0f8d5c8a096987c28176faaba32d2e48507465439131d7e605ffc150df27908f6c8448ec1203f9da84efae6ab1765d8fb7bfa259062734c40
-
\Windows\system\pVUQSHm.exeFilesize
5.9MB
MD589c61cb5b40c495513afd06b18f9cfd8
SHA1037f7ebb497f9fb20decebfeac6b807eec54e1af
SHA256b9acf970644378c1c16eca6f1ddf18a1fc9435f08757a579a1ac11c2b0793a38
SHA512cfbfd9ca2facc70626714071308a738186f68326953c8b3381b579e3193b7a245bae051865c6257190b52edad4b90ad830e8ff4c623b44fdad5c958a8ba1ec42
-
\Windows\system\puugriO.exeFilesize
5.9MB
MD552cb2fffff5d2c98aaee5c4b7311bec0
SHA11c80c034c261c705279a23033548d4af65dc6a8b
SHA2564a8df24d3c055319271201620f8b180a10143a9f68078eddb9b36b594f8abf04
SHA512d382932fab03f44534a8794bbe3156a7d5f9b1f9003f17e80e157ac723236a7ae912b187d5f4819bcca1e70d40737eca53b4293d99cd4463adb727181a842cb0
-
\Windows\system\ufaKoKG.exeFilesize
5.9MB
MD5c1a4125160f278d3176f6c78d9d2d3bd
SHA1d475d5d22f1bfba92dcddcd130ba368263c53711
SHA256b9ec6c685dfc1359e8576f3805fbc7e29fd00b539f2c0ee0b9bc10efe7b4989d
SHA5126987158e2aeeef13e62c229672fc42fe504f380c3db883089b0868cd4b7797e8a2b44798566a56c513a8609d7bdb9586e06e52ba4536c4c4a429aaca281a5f41
-
\Windows\system\zePVweQ.exeFilesize
5.9MB
MD5bf119f14b6a0a562223e64db4b0f9c03
SHA10e74b7dbe69b9b5bc2272507f54f03e9f543eb36
SHA256a7687b8ae01cdb014c3b739e5510b1c082bb072a81fbc5fcb89e9c9609567c17
SHA51287b78ec23c3560fb49aca23d18c3b2d76d32abe39d84fa3a54b822a052b8387ce667690da597dfd9861849f5bfbd41eb4d6eae87a31892b97af47372cab756ef
-
memory/832-80-0x000000013FBB0000-0x000000013FF04000-memory.dmpFilesize
3.3MB
-
memory/832-144-0x000000013FBB0000-0x000000013FF04000-memory.dmpFilesize
3.3MB
-
memory/832-156-0x000000013FBB0000-0x000000013FF04000-memory.dmpFilesize
3.3MB
-
memory/1656-114-0x000000013F150000-0x000000013F4A4000-memory.dmpFilesize
3.3MB
-
memory/1656-159-0x000000013F150000-0x000000013F4A4000-memory.dmpFilesize
3.3MB
-
memory/2064-42-0x000000013FBB0000-0x000000013FF04000-memory.dmpFilesize
3.3MB
-
memory/2064-149-0x000000013FBB0000-0x000000013FF04000-memory.dmpFilesize
3.3MB
-
memory/2136-158-0x000000013FED0000-0x0000000140224000-memory.dmpFilesize
3.3MB
-
memory/2136-95-0x000000013FED0000-0x0000000140224000-memory.dmpFilesize
3.3MB
-
memory/2140-157-0x000000013FB60000-0x000000013FEB4000-memory.dmpFilesize
3.3MB
-
memory/2140-92-0x000000013FB60000-0x000000013FEB4000-memory.dmpFilesize
3.3MB
-
memory/2160-55-0x000000013F140000-0x000000013F494000-memory.dmpFilesize
3.3MB
-
memory/2160-8-0x000000013F140000-0x000000013F494000-memory.dmpFilesize
3.3MB
-
memory/2160-146-0x000000013F140000-0x000000013F494000-memory.dmpFilesize
3.3MB
-
memory/2260-68-0x000000013F7F0000-0x000000013FB44000-memory.dmpFilesize
3.3MB
-
memory/2260-14-0x000000013F7F0000-0x000000013FB44000-memory.dmpFilesize
3.3MB
-
memory/2260-147-0x000000013F7F0000-0x000000013FB44000-memory.dmpFilesize
3.3MB
-
memory/2368-109-0x000000013F150000-0x000000013F4A4000-memory.dmpFilesize
3.3MB
-
memory/2368-37-0x0000000002340000-0x0000000002694000-memory.dmpFilesize
3.3MB
-
memory/2368-19-0x000000013F4B0000-0x000000013F804000-memory.dmpFilesize
3.3MB
-
memory/2368-91-0x0000000002340000-0x0000000002694000-memory.dmpFilesize
3.3MB
-
memory/2368-48-0x000000013FD60000-0x00000001400B4000-memory.dmpFilesize
3.3MB
-
memory/2368-62-0x000000013F650000-0x000000013F9A4000-memory.dmpFilesize
3.3MB
-
memory/2368-26-0x000000013F030000-0x000000013F384000-memory.dmpFilesize
3.3MB
-
memory/2368-77-0x0000000002340000-0x0000000002694000-memory.dmpFilesize
3.3MB
-
memory/2368-32-0x0000000002340000-0x0000000002694000-memory.dmpFilesize
3.3MB
-
memory/2368-145-0x000000013F150000-0x000000013F4A4000-memory.dmpFilesize
3.3MB
-
memory/2368-51-0x000000013F140000-0x000000013F494000-memory.dmpFilesize
3.3MB
-
memory/2368-143-0x0000000002340000-0x0000000002694000-memory.dmpFilesize
3.3MB
-
memory/2368-142-0x0000000002340000-0x0000000002694000-memory.dmpFilesize
3.3MB
-
memory/2368-69-0x0000000002340000-0x0000000002694000-memory.dmpFilesize
3.3MB
-
memory/2368-1-0x0000000000180000-0x0000000000190000-memory.dmpFilesize
64KB
-
memory/2368-0-0x000000013FD60000-0x00000001400B4000-memory.dmpFilesize
3.3MB
-
memory/2368-128-0x000000013F650000-0x000000013F9A4000-memory.dmpFilesize
3.3MB
-
memory/2368-119-0x000000013F090000-0x000000013F3E4000-memory.dmpFilesize
3.3MB
-
memory/2580-130-0x000000013F650000-0x000000013F9A4000-memory.dmpFilesize
3.3MB
-
memory/2580-63-0x000000013F650000-0x000000013F9A4000-memory.dmpFilesize
3.3MB
-
memory/2580-155-0x000000013F650000-0x000000013F9A4000-memory.dmpFilesize
3.3MB
-
memory/2692-154-0x000000013FD40000-0x0000000140094000-memory.dmpFilesize
3.3MB
-
memory/2692-70-0x000000013FD40000-0x0000000140094000-memory.dmpFilesize
3.3MB
-
memory/2692-132-0x000000013FD40000-0x0000000140094000-memory.dmpFilesize
3.3MB
-
memory/2720-76-0x000000013F4B0000-0x000000013F804000-memory.dmpFilesize
3.3MB
-
memory/2720-21-0x000000013F4B0000-0x000000013F804000-memory.dmpFilesize
3.3MB
-
memory/2720-148-0x000000013F4B0000-0x000000013F804000-memory.dmpFilesize
3.3MB
-
memory/2740-105-0x000000013F4C0000-0x000000013F814000-memory.dmpFilesize
3.3MB
-
memory/2740-153-0x000000013F4C0000-0x000000013F814000-memory.dmpFilesize
3.3MB
-
memory/2740-56-0x000000013F4C0000-0x000000013F814000-memory.dmpFilesize
3.3MB
-
memory/2844-27-0x000000013F030000-0x000000013F384000-memory.dmpFilesize
3.3MB
-
memory/2844-151-0x000000013F030000-0x000000013F384000-memory.dmpFilesize
3.3MB
-
memory/2844-79-0x000000013F030000-0x000000013F384000-memory.dmpFilesize
3.3MB
-
memory/2900-33-0x000000013FAC0000-0x000000013FE14000-memory.dmpFilesize
3.3MB
-
memory/2900-82-0x000000013FAC0000-0x000000013FE14000-memory.dmpFilesize
3.3MB
-
memory/2900-150-0x000000013FAC0000-0x000000013FE14000-memory.dmpFilesize
3.3MB
-
memory/2932-152-0x000000013F260000-0x000000013F5B4000-memory.dmpFilesize
3.3MB
-
memory/2932-49-0x000000013F260000-0x000000013F5B4000-memory.dmpFilesize
3.3MB