Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 08:24
Behavioral task
behavioral1
Sample
2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240611-en
General
-
Target
2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
98740ad847e1ad61e596b0b4970769a7
-
SHA1
2190f54c81669f62fc2e4d17b98430f1a23d2b4b
-
SHA256
d30ce161be048f1e894a6b0b78fd821fcf65c56e50b30a55acb3f3cee81468af
-
SHA512
63d5e894da7dd0e39ba6b64b9ba09a8962957dbf7348bdf4fc6ebb387b3e55d1b8891dcda1ec715995ae9ab4c0dd776a177beb8ad7d6329c4d4ef7eb833102de
-
SSDEEP
98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lUF:Q+856utgpPF8u/7F
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\VbxyXjK.exe cobalt_reflective_dll \Windows\system\JDiAvuZ.exe cobalt_reflective_dll C:\Windows\system\dhOfEnY.exe cobalt_reflective_dll \Windows\system\dJiYnIp.exe cobalt_reflective_dll \Windows\system\VyiQVqm.exe cobalt_reflective_dll \Windows\system\wRXtwph.exe cobalt_reflective_dll C:\Windows\system\GDAzyQr.exe cobalt_reflective_dll \Windows\system\afsHVJx.exe cobalt_reflective_dll \Windows\system\UtfJBDl.exe cobalt_reflective_dll \Windows\system\qrMSKpm.exe cobalt_reflective_dll \Windows\system\XeMrglv.exe cobalt_reflective_dll C:\Windows\system\EJyjiyc.exe cobalt_reflective_dll C:\Windows\system\dDiURTJ.exe cobalt_reflective_dll C:\Windows\system\VbyBvXy.exe cobalt_reflective_dll \Windows\system\MXCNWll.exe cobalt_reflective_dll C:\Windows\system\PFswMFb.exe cobalt_reflective_dll \Windows\system\ezrvqZr.exe cobalt_reflective_dll C:\Windows\system\NuxPxEA.exe cobalt_reflective_dll C:\Windows\system\TKREwuk.exe cobalt_reflective_dll \Windows\system\jZplMBZ.exe cobalt_reflective_dll C:\Windows\system\fmkSAjn.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule \Windows\system\VbxyXjK.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\JDiAvuZ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\dhOfEnY.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\dJiYnIp.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\VyiQVqm.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\wRXtwph.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\GDAzyQr.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\afsHVJx.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\UtfJBDl.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\qrMSKpm.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\XeMrglv.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\EJyjiyc.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\dDiURTJ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\VbyBvXy.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\MXCNWll.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\PFswMFb.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\ezrvqZr.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\NuxPxEA.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\TKREwuk.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\jZplMBZ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\fmkSAjn.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 63 IoCs
Processes:
resource yara_rule behavioral1/memory/2124-0-0x000000013F270000-0x000000013F5C4000-memory.dmp UPX \Windows\system\VbxyXjK.exe UPX behavioral1/memory/2124-6-0x000000013F9E0000-0x000000013FD34000-memory.dmp UPX \Windows\system\JDiAvuZ.exe UPX behavioral1/memory/2988-16-0x000000013F840000-0x000000013FB94000-memory.dmp UPX C:\Windows\system\dhOfEnY.exe UPX \Windows\system\dJiYnIp.exe UPX behavioral1/memory/2704-22-0x000000013FCC0000-0x0000000140014000-memory.dmp UPX behavioral1/memory/2648-29-0x000000013F760000-0x000000013FAB4000-memory.dmp UPX \Windows\system\VyiQVqm.exe UPX behavioral1/memory/2760-37-0x000000013F500000-0x000000013F854000-memory.dmp UPX behavioral1/memory/2124-36-0x000000013F270000-0x000000013F5C4000-memory.dmp UPX behavioral1/memory/2236-9-0x000000013F9E0000-0x000000013FD34000-memory.dmp UPX \Windows\system\wRXtwph.exe UPX C:\Windows\system\GDAzyQr.exe UPX behavioral1/memory/2720-53-0x000000013FE50000-0x00000001401A4000-memory.dmp UPX \Windows\system\afsHVJx.exe UPX behavioral1/memory/2608-60-0x000000013FCC0000-0x0000000140014000-memory.dmp UPX behavioral1/memory/2988-64-0x000000013F840000-0x000000013FB94000-memory.dmp UPX behavioral1/memory/2536-66-0x000000013FB70000-0x000000013FEC4000-memory.dmp UPX \Windows\system\UtfJBDl.exe UPX behavioral1/memory/2512-67-0x000000013F700000-0x000000013FA54000-memory.dmp UPX behavioral1/memory/2236-58-0x000000013F9E0000-0x000000013FD34000-memory.dmp UPX \Windows\system\qrMSKpm.exe UPX behavioral1/memory/2704-70-0x000000013FCC0000-0x0000000140014000-memory.dmp UPX behavioral1/memory/2568-72-0x000000013FA00000-0x000000013FD54000-memory.dmp UPX \Windows\system\XeMrglv.exe UPX behavioral1/memory/2648-85-0x000000013F760000-0x000000013FAB4000-memory.dmp UPX behavioral1/memory/552-87-0x000000013F0F0000-0x000000013F444000-memory.dmp UPX behavioral1/memory/2760-100-0x000000013F500000-0x000000013F854000-memory.dmp UPX behavioral1/memory/924-101-0x000000013F790000-0x000000013FAE4000-memory.dmp UPX behavioral1/memory/1332-95-0x000000013FA60000-0x000000013FDB4000-memory.dmp UPX C:\Windows\system\EJyjiyc.exe UPX C:\Windows\system\dDiURTJ.exe UPX C:\Windows\system\VbyBvXy.exe UPX behavioral1/memory/1080-79-0x000000013FE60000-0x00000001401B4000-memory.dmp UPX \Windows\system\MXCNWll.exe UPX C:\Windows\system\PFswMFb.exe UPX \Windows\system\ezrvqZr.exe UPX C:\Windows\system\NuxPxEA.exe UPX C:\Windows\system\TKREwuk.exe UPX \Windows\system\jZplMBZ.exe UPX C:\Windows\system\fmkSAjn.exe UPX behavioral1/memory/2512-140-0x000000013F700000-0x000000013FA54000-memory.dmp UPX behavioral1/memory/2568-141-0x000000013FA00000-0x000000013FD54000-memory.dmp UPX behavioral1/memory/1080-143-0x000000013FE60000-0x00000001401B4000-memory.dmp UPX behavioral1/memory/552-145-0x000000013F0F0000-0x000000013F444000-memory.dmp UPX behavioral1/memory/1332-147-0x000000013FA60000-0x000000013FDB4000-memory.dmp UPX behavioral1/memory/924-148-0x000000013F790000-0x000000013FAE4000-memory.dmp UPX behavioral1/memory/2236-149-0x000000013F9E0000-0x000000013FD34000-memory.dmp UPX behavioral1/memory/2988-150-0x000000013F840000-0x000000013FB94000-memory.dmp UPX behavioral1/memory/2704-151-0x000000013FCC0000-0x0000000140014000-memory.dmp UPX behavioral1/memory/2648-152-0x000000013F760000-0x000000013FAB4000-memory.dmp UPX behavioral1/memory/2720-153-0x000000013FE50000-0x00000001401A4000-memory.dmp UPX behavioral1/memory/2760-154-0x000000013F500000-0x000000013F854000-memory.dmp UPX behavioral1/memory/2608-155-0x000000013FCC0000-0x0000000140014000-memory.dmp UPX behavioral1/memory/2536-156-0x000000013FB70000-0x000000013FEC4000-memory.dmp UPX behavioral1/memory/2512-157-0x000000013F700000-0x000000013FA54000-memory.dmp UPX behavioral1/memory/2568-158-0x000000013FA00000-0x000000013FD54000-memory.dmp UPX behavioral1/memory/1080-159-0x000000013FE60000-0x00000001401B4000-memory.dmp UPX behavioral1/memory/552-160-0x000000013F0F0000-0x000000013F444000-memory.dmp UPX behavioral1/memory/1332-161-0x000000013FA60000-0x000000013FDB4000-memory.dmp UPX behavioral1/memory/924-162-0x000000013F790000-0x000000013FAE4000-memory.dmp UPX -
XMRig Miner payload 64 IoCs
Processes:
resource yara_rule behavioral1/memory/2124-0-0x000000013F270000-0x000000013F5C4000-memory.dmp xmrig \Windows\system\VbxyXjK.exe xmrig behavioral1/memory/2124-6-0x000000013F9E0000-0x000000013FD34000-memory.dmp xmrig \Windows\system\JDiAvuZ.exe xmrig behavioral1/memory/2988-16-0x000000013F840000-0x000000013FB94000-memory.dmp xmrig C:\Windows\system\dhOfEnY.exe xmrig \Windows\system\dJiYnIp.exe xmrig behavioral1/memory/2704-22-0x000000013FCC0000-0x0000000140014000-memory.dmp xmrig behavioral1/memory/2648-29-0x000000013F760000-0x000000013FAB4000-memory.dmp xmrig \Windows\system\VyiQVqm.exe xmrig behavioral1/memory/2760-37-0x000000013F500000-0x000000013F854000-memory.dmp xmrig behavioral1/memory/2124-36-0x000000013F270000-0x000000013F5C4000-memory.dmp xmrig behavioral1/memory/2236-9-0x000000013F9E0000-0x000000013FD34000-memory.dmp xmrig \Windows\system\wRXtwph.exe xmrig C:\Windows\system\GDAzyQr.exe xmrig behavioral1/memory/2720-53-0x000000013FE50000-0x00000001401A4000-memory.dmp xmrig \Windows\system\afsHVJx.exe xmrig behavioral1/memory/2608-60-0x000000013FCC0000-0x0000000140014000-memory.dmp xmrig behavioral1/memory/2988-64-0x000000013F840000-0x000000013FB94000-memory.dmp xmrig behavioral1/memory/2536-66-0x000000013FB70000-0x000000013FEC4000-memory.dmp xmrig \Windows\system\UtfJBDl.exe xmrig behavioral1/memory/2512-67-0x000000013F700000-0x000000013FA54000-memory.dmp xmrig behavioral1/memory/2236-58-0x000000013F9E0000-0x000000013FD34000-memory.dmp xmrig \Windows\system\qrMSKpm.exe xmrig behavioral1/memory/2704-70-0x000000013FCC0000-0x0000000140014000-memory.dmp xmrig behavioral1/memory/2568-72-0x000000013FA00000-0x000000013FD54000-memory.dmp xmrig \Windows\system\XeMrglv.exe xmrig behavioral1/memory/2648-85-0x000000013F760000-0x000000013FAB4000-memory.dmp xmrig behavioral1/memory/552-87-0x000000013F0F0000-0x000000013F444000-memory.dmp xmrig behavioral1/memory/2124-86-0x0000000002350000-0x00000000026A4000-memory.dmp xmrig behavioral1/memory/2760-100-0x000000013F500000-0x000000013F854000-memory.dmp xmrig behavioral1/memory/924-101-0x000000013F790000-0x000000013FAE4000-memory.dmp xmrig behavioral1/memory/1332-95-0x000000013FA60000-0x000000013FDB4000-memory.dmp xmrig C:\Windows\system\EJyjiyc.exe xmrig C:\Windows\system\dDiURTJ.exe xmrig C:\Windows\system\VbyBvXy.exe xmrig behavioral1/memory/1080-79-0x000000013FE60000-0x00000001401B4000-memory.dmp xmrig behavioral1/memory/2124-102-0x000000013FCC0000-0x0000000140014000-memory.dmp xmrig \Windows\system\MXCNWll.exe xmrig C:\Windows\system\PFswMFb.exe xmrig \Windows\system\ezrvqZr.exe xmrig C:\Windows\system\NuxPxEA.exe xmrig C:\Windows\system\TKREwuk.exe xmrig \Windows\system\jZplMBZ.exe xmrig C:\Windows\system\fmkSAjn.exe xmrig behavioral1/memory/2512-140-0x000000013F700000-0x000000013FA54000-memory.dmp xmrig behavioral1/memory/2568-141-0x000000013FA00000-0x000000013FD54000-memory.dmp xmrig behavioral1/memory/1080-143-0x000000013FE60000-0x00000001401B4000-memory.dmp xmrig behavioral1/memory/552-145-0x000000013F0F0000-0x000000013F444000-memory.dmp xmrig behavioral1/memory/1332-147-0x000000013FA60000-0x000000013FDB4000-memory.dmp xmrig behavioral1/memory/924-148-0x000000013F790000-0x000000013FAE4000-memory.dmp xmrig behavioral1/memory/2236-149-0x000000013F9E0000-0x000000013FD34000-memory.dmp xmrig behavioral1/memory/2988-150-0x000000013F840000-0x000000013FB94000-memory.dmp xmrig behavioral1/memory/2704-151-0x000000013FCC0000-0x0000000140014000-memory.dmp xmrig behavioral1/memory/2648-152-0x000000013F760000-0x000000013FAB4000-memory.dmp xmrig behavioral1/memory/2720-153-0x000000013FE50000-0x00000001401A4000-memory.dmp xmrig behavioral1/memory/2760-154-0x000000013F500000-0x000000013F854000-memory.dmp xmrig behavioral1/memory/2608-155-0x000000013FCC0000-0x0000000140014000-memory.dmp xmrig behavioral1/memory/2536-156-0x000000013FB70000-0x000000013FEC4000-memory.dmp xmrig behavioral1/memory/2512-157-0x000000013F700000-0x000000013FA54000-memory.dmp xmrig behavioral1/memory/2568-158-0x000000013FA00000-0x000000013FD54000-memory.dmp xmrig behavioral1/memory/1080-159-0x000000013FE60000-0x00000001401B4000-memory.dmp xmrig behavioral1/memory/552-160-0x000000013F0F0000-0x000000013F444000-memory.dmp xmrig behavioral1/memory/1332-161-0x000000013FA60000-0x000000013FDB4000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
VbxyXjK.exeJDiAvuZ.exedhOfEnY.exedJiYnIp.exeVyiQVqm.exewRXtwph.exeGDAzyQr.exeafsHVJx.exeUtfJBDl.exeqrMSKpm.exeXeMrglv.exeVbyBvXy.exeEJyjiyc.exedDiURTJ.exePFswMFb.exeMXCNWll.exeezrvqZr.exeNuxPxEA.exeTKREwuk.exefmkSAjn.exejZplMBZ.exepid process 2236 VbxyXjK.exe 2988 JDiAvuZ.exe 2704 dhOfEnY.exe 2648 dJiYnIp.exe 2760 VyiQVqm.exe 2720 wRXtwph.exe 2608 GDAzyQr.exe 2536 afsHVJx.exe 2512 UtfJBDl.exe 2568 qrMSKpm.exe 1080 XeMrglv.exe 552 VbyBvXy.exe 1332 EJyjiyc.exe 924 dDiURTJ.exe 2804 PFswMFb.exe 564 MXCNWll.exe 2812 ezrvqZr.exe 1968 NuxPxEA.exe 1912 TKREwuk.exe 2184 fmkSAjn.exe 1120 jZplMBZ.exe -
Loads dropped DLL 21 IoCs
Processes:
2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exepid process 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe -
Processes:
resource yara_rule behavioral1/memory/2124-0-0x000000013F270000-0x000000013F5C4000-memory.dmp upx \Windows\system\VbxyXjK.exe upx behavioral1/memory/2124-6-0x000000013F9E0000-0x000000013FD34000-memory.dmp upx \Windows\system\JDiAvuZ.exe upx behavioral1/memory/2988-16-0x000000013F840000-0x000000013FB94000-memory.dmp upx C:\Windows\system\dhOfEnY.exe upx \Windows\system\dJiYnIp.exe upx behavioral1/memory/2704-22-0x000000013FCC0000-0x0000000140014000-memory.dmp upx behavioral1/memory/2648-29-0x000000013F760000-0x000000013FAB4000-memory.dmp upx \Windows\system\VyiQVqm.exe upx behavioral1/memory/2760-37-0x000000013F500000-0x000000013F854000-memory.dmp upx behavioral1/memory/2124-36-0x000000013F270000-0x000000013F5C4000-memory.dmp upx behavioral1/memory/2236-9-0x000000013F9E0000-0x000000013FD34000-memory.dmp upx \Windows\system\wRXtwph.exe upx C:\Windows\system\GDAzyQr.exe upx behavioral1/memory/2720-53-0x000000013FE50000-0x00000001401A4000-memory.dmp upx \Windows\system\afsHVJx.exe upx behavioral1/memory/2608-60-0x000000013FCC0000-0x0000000140014000-memory.dmp upx behavioral1/memory/2988-64-0x000000013F840000-0x000000013FB94000-memory.dmp upx behavioral1/memory/2536-66-0x000000013FB70000-0x000000013FEC4000-memory.dmp upx \Windows\system\UtfJBDl.exe upx behavioral1/memory/2512-67-0x000000013F700000-0x000000013FA54000-memory.dmp upx behavioral1/memory/2236-58-0x000000013F9E0000-0x000000013FD34000-memory.dmp upx \Windows\system\qrMSKpm.exe upx behavioral1/memory/2704-70-0x000000013FCC0000-0x0000000140014000-memory.dmp upx behavioral1/memory/2568-72-0x000000013FA00000-0x000000013FD54000-memory.dmp upx \Windows\system\XeMrglv.exe upx behavioral1/memory/2648-85-0x000000013F760000-0x000000013FAB4000-memory.dmp upx behavioral1/memory/552-87-0x000000013F0F0000-0x000000013F444000-memory.dmp upx behavioral1/memory/2760-100-0x000000013F500000-0x000000013F854000-memory.dmp upx behavioral1/memory/924-101-0x000000013F790000-0x000000013FAE4000-memory.dmp upx behavioral1/memory/1332-95-0x000000013FA60000-0x000000013FDB4000-memory.dmp upx C:\Windows\system\EJyjiyc.exe upx C:\Windows\system\dDiURTJ.exe upx C:\Windows\system\VbyBvXy.exe upx behavioral1/memory/1080-79-0x000000013FE60000-0x00000001401B4000-memory.dmp upx \Windows\system\MXCNWll.exe upx C:\Windows\system\PFswMFb.exe upx \Windows\system\ezrvqZr.exe upx C:\Windows\system\NuxPxEA.exe upx C:\Windows\system\TKREwuk.exe upx \Windows\system\jZplMBZ.exe upx C:\Windows\system\fmkSAjn.exe upx behavioral1/memory/2512-140-0x000000013F700000-0x000000013FA54000-memory.dmp upx behavioral1/memory/2568-141-0x000000013FA00000-0x000000013FD54000-memory.dmp upx behavioral1/memory/1080-143-0x000000013FE60000-0x00000001401B4000-memory.dmp upx behavioral1/memory/552-145-0x000000013F0F0000-0x000000013F444000-memory.dmp upx behavioral1/memory/1332-147-0x000000013FA60000-0x000000013FDB4000-memory.dmp upx behavioral1/memory/924-148-0x000000013F790000-0x000000013FAE4000-memory.dmp upx behavioral1/memory/2236-149-0x000000013F9E0000-0x000000013FD34000-memory.dmp upx behavioral1/memory/2988-150-0x000000013F840000-0x000000013FB94000-memory.dmp upx behavioral1/memory/2704-151-0x000000013FCC0000-0x0000000140014000-memory.dmp upx behavioral1/memory/2648-152-0x000000013F760000-0x000000013FAB4000-memory.dmp upx behavioral1/memory/2720-153-0x000000013FE50000-0x00000001401A4000-memory.dmp upx behavioral1/memory/2760-154-0x000000013F500000-0x000000013F854000-memory.dmp upx behavioral1/memory/2608-155-0x000000013FCC0000-0x0000000140014000-memory.dmp upx behavioral1/memory/2536-156-0x000000013FB70000-0x000000013FEC4000-memory.dmp upx behavioral1/memory/2512-157-0x000000013F700000-0x000000013FA54000-memory.dmp upx behavioral1/memory/2568-158-0x000000013FA00000-0x000000013FD54000-memory.dmp upx behavioral1/memory/1080-159-0x000000013FE60000-0x00000001401B4000-memory.dmp upx behavioral1/memory/552-160-0x000000013F0F0000-0x000000013F444000-memory.dmp upx behavioral1/memory/1332-161-0x000000013FA60000-0x000000013FDB4000-memory.dmp upx behavioral1/memory/924-162-0x000000013F790000-0x000000013FAE4000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exedescription ioc process File created C:\Windows\System\UtfJBDl.exe 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\qrMSKpm.exe 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\XeMrglv.exe 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\PFswMFb.exe 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\wRXtwph.exe 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\afsHVJx.exe 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\GDAzyQr.exe 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\MXCNWll.exe 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ezrvqZr.exe 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\jZplMBZ.exe 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\VyiQVqm.exe 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\JDiAvuZ.exe 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\dhOfEnY.exe 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\dJiYnIp.exe 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\EJyjiyc.exe 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\TKREwuk.exe 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\fmkSAjn.exe 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\VbxyXjK.exe 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\dDiURTJ.exe 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\NuxPxEA.exe 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\VbyBvXy.exe 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process Token: SeLockMemoryPrivilege 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process target process PID 2124 wrote to memory of 2236 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe VbxyXjK.exe PID 2124 wrote to memory of 2236 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe VbxyXjK.exe PID 2124 wrote to memory of 2236 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe VbxyXjK.exe PID 2124 wrote to memory of 2988 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe JDiAvuZ.exe PID 2124 wrote to memory of 2988 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe JDiAvuZ.exe PID 2124 wrote to memory of 2988 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe JDiAvuZ.exe PID 2124 wrote to memory of 2704 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe dhOfEnY.exe PID 2124 wrote to memory of 2704 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe dhOfEnY.exe PID 2124 wrote to memory of 2704 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe dhOfEnY.exe PID 2124 wrote to memory of 2648 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe dJiYnIp.exe PID 2124 wrote to memory of 2648 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe dJiYnIp.exe PID 2124 wrote to memory of 2648 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe dJiYnIp.exe PID 2124 wrote to memory of 2760 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe VyiQVqm.exe PID 2124 wrote to memory of 2760 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe VyiQVqm.exe PID 2124 wrote to memory of 2760 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe VyiQVqm.exe PID 2124 wrote to memory of 2720 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe wRXtwph.exe PID 2124 wrote to memory of 2720 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe wRXtwph.exe PID 2124 wrote to memory of 2720 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe wRXtwph.exe PID 2124 wrote to memory of 2536 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe afsHVJx.exe PID 2124 wrote to memory of 2536 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe afsHVJx.exe PID 2124 wrote to memory of 2536 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe afsHVJx.exe PID 2124 wrote to memory of 2608 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe GDAzyQr.exe PID 2124 wrote to memory of 2608 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe GDAzyQr.exe PID 2124 wrote to memory of 2608 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe GDAzyQr.exe PID 2124 wrote to memory of 2512 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe UtfJBDl.exe PID 2124 wrote to memory of 2512 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe UtfJBDl.exe PID 2124 wrote to memory of 2512 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe UtfJBDl.exe PID 2124 wrote to memory of 2568 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe qrMSKpm.exe PID 2124 wrote to memory of 2568 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe qrMSKpm.exe PID 2124 wrote to memory of 2568 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe qrMSKpm.exe PID 2124 wrote to memory of 1080 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe XeMrglv.exe PID 2124 wrote to memory of 1080 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe XeMrglv.exe PID 2124 wrote to memory of 1080 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe XeMrglv.exe PID 2124 wrote to memory of 552 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe VbyBvXy.exe PID 2124 wrote to memory of 552 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe VbyBvXy.exe PID 2124 wrote to memory of 552 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe VbyBvXy.exe PID 2124 wrote to memory of 1332 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe EJyjiyc.exe PID 2124 wrote to memory of 1332 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe EJyjiyc.exe PID 2124 wrote to memory of 1332 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe EJyjiyc.exe PID 2124 wrote to memory of 924 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe dDiURTJ.exe PID 2124 wrote to memory of 924 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe dDiURTJ.exe PID 2124 wrote to memory of 924 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe dDiURTJ.exe PID 2124 wrote to memory of 2804 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe PFswMFb.exe PID 2124 wrote to memory of 2804 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe PFswMFb.exe PID 2124 wrote to memory of 2804 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe PFswMFb.exe PID 2124 wrote to memory of 564 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe MXCNWll.exe PID 2124 wrote to memory of 564 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe MXCNWll.exe PID 2124 wrote to memory of 564 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe MXCNWll.exe PID 2124 wrote to memory of 2812 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe ezrvqZr.exe PID 2124 wrote to memory of 2812 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe ezrvqZr.exe PID 2124 wrote to memory of 2812 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe ezrvqZr.exe PID 2124 wrote to memory of 1968 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe NuxPxEA.exe PID 2124 wrote to memory of 1968 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe NuxPxEA.exe PID 2124 wrote to memory of 1968 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe NuxPxEA.exe PID 2124 wrote to memory of 1912 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe TKREwuk.exe PID 2124 wrote to memory of 1912 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe TKREwuk.exe PID 2124 wrote to memory of 1912 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe TKREwuk.exe PID 2124 wrote to memory of 2184 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe fmkSAjn.exe PID 2124 wrote to memory of 2184 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe fmkSAjn.exe PID 2124 wrote to memory of 2184 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe fmkSAjn.exe PID 2124 wrote to memory of 1120 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe jZplMBZ.exe PID 2124 wrote to memory of 1120 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe jZplMBZ.exe PID 2124 wrote to memory of 1120 2124 2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe jZplMBZ.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-24_98740ad847e1ad61e596b0b4970769a7_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\VbxyXjK.exeC:\Windows\System\VbxyXjK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\JDiAvuZ.exeC:\Windows\System\JDiAvuZ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\dhOfEnY.exeC:\Windows\System\dhOfEnY.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\dJiYnIp.exeC:\Windows\System\dJiYnIp.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\VyiQVqm.exeC:\Windows\System\VyiQVqm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wRXtwph.exeC:\Windows\System\wRXtwph.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\afsHVJx.exeC:\Windows\System\afsHVJx.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\GDAzyQr.exeC:\Windows\System\GDAzyQr.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\UtfJBDl.exeC:\Windows\System\UtfJBDl.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\qrMSKpm.exeC:\Windows\System\qrMSKpm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\XeMrglv.exeC:\Windows\System\XeMrglv.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\VbyBvXy.exeC:\Windows\System\VbyBvXy.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\EJyjiyc.exeC:\Windows\System\EJyjiyc.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\dDiURTJ.exeC:\Windows\System\dDiURTJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\PFswMFb.exeC:\Windows\System\PFswMFb.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\MXCNWll.exeC:\Windows\System\MXCNWll.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ezrvqZr.exeC:\Windows\System\ezrvqZr.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\NuxPxEA.exeC:\Windows\System\NuxPxEA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\TKREwuk.exeC:\Windows\System\TKREwuk.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\fmkSAjn.exeC:\Windows\System\fmkSAjn.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\jZplMBZ.exeC:\Windows\System\jZplMBZ.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\EJyjiyc.exeFilesize
5.9MB
MD51fc1dfd7205bc02228c4cbd4310203a7
SHA10e40fe8f6dd7b31d27b346af2fc2360ff39c7f23
SHA256b40fa7e89f050c19c1edb6b135a7025b4ab37a02e77131a4e4d66bd308f1c69d
SHA512ba0d6d8bd365ed40dd5ef843a63c695486eb8a2dce1c5ef4ca5a7c6af9b7cfa3f460a69bc20ff31c3f39cc2445deaf7a3fa57363b6e9efd4f411b2ab073ed025
-
C:\Windows\system\GDAzyQr.exeFilesize
5.9MB
MD5fd12eff5542b260fab384ce96731ee2f
SHA19adb64b7f231acacd0c6fc56a4258d3649d5acb2
SHA2565747b55da3e580dea76999fef3c2a12c3af1801a2ba013d22ab955c0b9777732
SHA5125c95a40f74456c6ff289ff7944399036810be7b3b33871bc033f376cc0a6726a4e3f2aa61aec2b434074bf308c211572bd55f833455516b55a5126effd9de659
-
C:\Windows\system\NuxPxEA.exeFilesize
5.9MB
MD5e84f750dc6d68abf8936017a0e33aaad
SHA1a6643e59eba3864ac27d333109da4d9661270690
SHA2566d03f0faa892c16aafb897a872f99ca81cdb14b499f0afa5eabdcbc3ef0c7fcc
SHA512684a642d23d85f479addce642c476a9651e57b038f7b3baee3bdfd8a33e3d4a8d7f70c6067084c608e6a522bc8d788a63cfddf6ddb3f6b4c64c3c687e757b7f1
-
C:\Windows\system\PFswMFb.exeFilesize
5.9MB
MD52f89c4507955c911121bf3b19a289e31
SHA19a8224bb9f11cf8b7ea8366ec87a0a0299fa8160
SHA25697a120817378ef1bd7ce3da7e1abb17b179cfd4c8fedc3fe67e0aef0692a7932
SHA512ecd558d33a8387c104fcf99eb898876784e71b5fa3f33225e620f6c8867d0b97924213ea41c7fc6cc018a4be67992dd16b2bad1434f36ce18b920168c21d9a4c
-
C:\Windows\system\TKREwuk.exeFilesize
5.9MB
MD59ada91d0d2eb922610e9be57c0ff7e1d
SHA1827fb14d10a9807fc327e677317d419cb8607e10
SHA2561d9380f899ab798a3967e838fed509662a2c3fef9fc8bc7d7471d2fcd8b4ffee
SHA512e84173215282c0e55f36d7d5d119eb51cdbe47cd84fb91214f69e7ac1baab4bc5b237eb4e734ac27f730a41bdc08907b910f1bd452433d886488b7b1b29d6c2b
-
C:\Windows\system\VbyBvXy.exeFilesize
5.9MB
MD5ad6edd81fa18ac00361021baba10c472
SHA1004fc820175ea00a0c66d4b80b1812841f7b0352
SHA25669c5c491252e03192eedc34f24857e056e2991bcda4135b5f72eb5c2cc79b197
SHA51219722572673d534aba79f62a2aa97c1c0e75bab2d96ec7ee09b29a9aeffb42fbcfd7bced2c0af78c75ad8280a165ab212354217e7850b7a1527625f6cca3dba3
-
C:\Windows\system\dDiURTJ.exeFilesize
5.9MB
MD5867ed3ff5d98435c9cc26eecbba6f504
SHA18e1d5c6df388599dacc7852e295d38f85bb5e363
SHA2562ec7d4b9f8df43b9df6d4a5fed898c026e533997bd47a8a042d8c5cd8d83089a
SHA5127aeaaa2f6948873f35abd3c104acc69c666d246af33b1158075988d54a2057c2e934b033d1e14cc7ce6c1d2bb39bfd81470a5562031c78a57079f642d25c8d55
-
C:\Windows\system\dhOfEnY.exeFilesize
5.9MB
MD5b21a3dd178f0df4eb6bada645f4605a5
SHA1e346cdb4e5aa9874f7d29b4f0e32522d030c1312
SHA256ac647ff4ab120afa55c3ce6e3f920e34bd605ba719884519a25fadaf14da6420
SHA5128228e9e3149b579a4f56651d3d81cd90ae04c1d800460871b837d40975628d6c195aa6bb582746f4e310c761a52a7d15eacd16b7b691a8df52038d706a11cefa
-
C:\Windows\system\fmkSAjn.exeFilesize
5.9MB
MD51955775f0afa4bae993cfc62e1270e66
SHA1ba5f83d45924d0d00d4602c30e388d20a63ab30a
SHA2569569c46f7c3407f16c81f4d57aaa1759ae9dbf8b54f1d8219809192a744e72d1
SHA5125d4d1806ac90a4f93fbfec1ddf715aba6fd87782064af3bf0e417527e4f7b48d1231d0aa4e6328366c61412cfaece2a65b99e70ecc4666e53a047ab5427856e5
-
\Windows\system\JDiAvuZ.exeFilesize
5.9MB
MD55540b3927dbf87943c80e521844b37c1
SHA1f8f1a69d5bade8ceb2661684320725230d1da0a2
SHA25668bafeedcd88e1de7bbde52d932bed1ff5700e064a14a300ef964cbc7f4275ef
SHA5127a34908bdca20007d99d91ddec8c0f622f9d8a91aa1755a96fc2081ac4752a129e02f7c22416b04585d27c200e8f7713765cdc0eab5371496ad7014e5bcadf7f
-
\Windows\system\MXCNWll.exeFilesize
5.9MB
MD52eb31f076a565e46f3cd6249f73a1bb6
SHA13d261a864cbefab293f71dce7749a68a418bc5c0
SHA25620b738482675073de4131bd5ee800a51caf5ccf414aab3ff69afdfe9ff9e25cf
SHA5129dccec54e70752c2784518a6fbf10f133cb31535d7c0a40f7184f5432b9c69bea2715bd687e5e91140e2a22cfd2c1daed9b1389dd99eb5204e1fc1c281c34731
-
\Windows\system\UtfJBDl.exeFilesize
5.9MB
MD5204ae8add3c97011e62fc20adf78197a
SHA12ab3cc06731acd682c386943744560bf8f0b05cb
SHA256e361d62fed07d60a70b5787a5a9db7de227c49631301518bc256c48b1d0922c4
SHA5128678ad55232dcc49b751172f08a2745b4d46526194fad80d1a5e6a6bdcedb3386c2aa9706174370a9f6e1b7e1aa3ba6489ba32e350381b6e6614b9093d5a1822
-
\Windows\system\VbxyXjK.exeFilesize
5.9MB
MD55279f5210b8a1afc43dd02f61161416e
SHA1c74944ee35ad5303ce94a439fe3aacd47c5c52e3
SHA256c49a1738a38f88ae9f136e26c10fb9d53ec1effe554d752aa92e7b9769fcdf3d
SHA5128733da7a9cdce273460414032a8a0a6de760e7941f560749a16db7d0e87110a2946b58bf49c73867fd6eaa38dd85264930265758e2dda12132a47483c107366b
-
\Windows\system\VyiQVqm.exeFilesize
5.9MB
MD52c5ff7f214e9dfeb9390c9d00a743d2b
SHA1bf7a54c1556da08f8199f798d689515aff10f6fa
SHA256debbf7b1f4f0583726cc0bb2fb42b0314220120daad7836e1a02db93fd1d9e63
SHA5122063e9a295cc696e8e7a3ad29a41873fe7f522b6b5064163f5de9f26114150a36d451b3a8daa3c20a88b87d1bd0c3cf77de2468d217a8c0772da1a305f25c398
-
\Windows\system\XeMrglv.exeFilesize
5.9MB
MD567076dcf73634c4a1671aafb2d6f5b1e
SHA1e4a27385f38d66c324d76067bdf8e681efcaa5f5
SHA256db3ed9427027ce480718c82d3fd7bb1d400ed7f2094658b879e0187fc15d5690
SHA5124a3a5bd92375a85d508a3fce6b34f1883f9911dcea0e1ccce7ff06297c34ff45f99d5245eb6d47c8dc8a7b1f76a51fc1b29a87b83d1f5290f07568a1fc8075ba
-
\Windows\system\afsHVJx.exeFilesize
5.9MB
MD5f98d26eb92abca290d815fecba4da70b
SHA17ad63c7919ec0ba6aa6f4a7a956fa66dab457f7f
SHA256dc5d882feec393ba815924d02c9ee8003ffaea8f395ff671cf0e4c66413531ae
SHA512656f277c88d43f982e9e32ad9110f879bc8ab16069e18e5e247592fda02a8077f3006af3b0a29579856bdb6c2f2aa482c1ae9e514213d815aa37cb1c10eae693
-
\Windows\system\dJiYnIp.exeFilesize
5.9MB
MD5aea938efeb7f6365bbe6e6fcf0a3af05
SHA107f4633cb1ea7739f0cb838d1448cc8cd6e4e4f2
SHA256bfd950cee509babc8c133eda29bcfa2dde02b91f876ba0735257f99521e6c76f
SHA512cfb55eec34ed8cc61642fbade2ed5e82ef041743fa1b51adffa265ecf59c76103becf24fea89cdf626a656ca7ef5ef5a3b5284dd0ef4eb731f32ad1d62f1d318
-
\Windows\system\ezrvqZr.exeFilesize
5.9MB
MD5266ebd946ca7e2303e144d5028b6f1bd
SHA163046d369b920501ae893b1bd439522e23e11a96
SHA256184ccc0a1cd904f15850da9b6ce64fc25c1c61574deb5b58b5a246341d9b0406
SHA5126e0338ab88d2f5bbd670f2c94951912d6e8c20b36a80e6e1f45787c32179261df423c45466dfbdf3eda7f9bef74258d0f4f635766738a39b57c3d340ea3cfddd
-
\Windows\system\jZplMBZ.exeFilesize
5.9MB
MD5fcb993f01e592dc025ef27651f87859a
SHA17dc330979de9e617603b816e0aeb4c66a2e780c2
SHA256ced3a1c21ed41b474e3945209f1fc542fe9370ea88000ddf1a1403a56538983e
SHA5125a73f9a2d243896b6ffb64d09301f619613945f325769e78c199e4c24d5d68d5afea5c714545c89cf0714d9099343e3e47617eea607e1de1d6053db350ffaa0a
-
\Windows\system\qrMSKpm.exeFilesize
5.9MB
MD58fede38e602e6f41118c68af62af7e0a
SHA180a110bdbe2c809ff26c7c0482c3c0a28e08dd09
SHA256ab433753f5b9f3ada19146ff8f122ad1880d67af4f0c590d3490a236cfc19897
SHA512ce479da55da820cf07d60ce45227347f063944e93ef0980aa7e4e350a24aa9f3fd6acade08dc47d1a0d9d89c1972ac5df4db2451777584c6d9247dc5ed479c4e
-
\Windows\system\wRXtwph.exeFilesize
5.9MB
MD53996d0020ddc98e5f137f891ddc62d16
SHA1dccacfaadf8b18010d1e7a8678c0d0a3e999d717
SHA25653857a9dca867ecac58e42e777de27397468ec62d45480f496a77b92ba4087a4
SHA512992adad9120d26634287ebd5fb4048afad130c23226f5222f40302fd36d57b87f8bb3999380be3a079c1dcc70775af5dfb40245e3e5c763ee06a301e4a1d3039
-
memory/552-87-0x000000013F0F0000-0x000000013F444000-memory.dmpFilesize
3.3MB
-
memory/552-145-0x000000013F0F0000-0x000000013F444000-memory.dmpFilesize
3.3MB
-
memory/552-160-0x000000013F0F0000-0x000000013F444000-memory.dmpFilesize
3.3MB
-
memory/924-162-0x000000013F790000-0x000000013FAE4000-memory.dmpFilesize
3.3MB
-
memory/924-101-0x000000013F790000-0x000000013FAE4000-memory.dmpFilesize
3.3MB
-
memory/924-148-0x000000013F790000-0x000000013FAE4000-memory.dmpFilesize
3.3MB
-
memory/1080-159-0x000000013FE60000-0x00000001401B4000-memory.dmpFilesize
3.3MB
-
memory/1080-79-0x000000013FE60000-0x00000001401B4000-memory.dmpFilesize
3.3MB
-
memory/1080-143-0x000000013FE60000-0x00000001401B4000-memory.dmpFilesize
3.3MB
-
memory/1332-161-0x000000013FA60000-0x000000013FDB4000-memory.dmpFilesize
3.3MB
-
memory/1332-95-0x000000013FA60000-0x000000013FDB4000-memory.dmpFilesize
3.3MB
-
memory/1332-147-0x000000013FA60000-0x000000013FDB4000-memory.dmpFilesize
3.3MB
-
memory/2124-86-0x0000000002350000-0x00000000026A4000-memory.dmpFilesize
3.3MB
-
memory/2124-146-0x000000013FA60000-0x000000013FDB4000-memory.dmpFilesize
3.3MB
-
memory/2124-1-0x0000000000080000-0x0000000000090000-memory.dmpFilesize
64KB
-
memory/2124-6-0x000000013F9E0000-0x000000013FD34000-memory.dmpFilesize
3.3MB
-
memory/2124-0-0x000000013F270000-0x000000013F5C4000-memory.dmpFilesize
3.3MB
-
memory/2124-14-0x000000013F840000-0x000000013FB94000-memory.dmpFilesize
3.3MB
-
memory/2124-49-0x000000013FE50000-0x00000001401A4000-memory.dmpFilesize
3.3MB
-
memory/2124-57-0x000000013FB70000-0x000000013FEC4000-memory.dmpFilesize
3.3MB
-
memory/2124-94-0x000000013FA60000-0x000000013FDB4000-memory.dmpFilesize
3.3MB
-
memory/2124-27-0x000000013F760000-0x000000013FAB4000-memory.dmpFilesize
3.3MB
-
memory/2124-20-0x000000013FCC0000-0x0000000140014000-memory.dmpFilesize
3.3MB
-
memory/2124-34-0x0000000002350000-0x00000000026A4000-memory.dmpFilesize
3.3MB
-
memory/2124-63-0x000000013FA00000-0x000000013FD54000-memory.dmpFilesize
3.3MB
-
memory/2124-78-0x000000013FE60000-0x00000001401B4000-memory.dmpFilesize
3.3MB
-
memory/2124-102-0x000000013FCC0000-0x0000000140014000-memory.dmpFilesize
3.3MB
-
memory/2124-144-0x0000000002350000-0x00000000026A4000-memory.dmpFilesize
3.3MB
-
memory/2124-112-0x000000013FF60000-0x00000001402B4000-memory.dmpFilesize
3.3MB
-
memory/2124-142-0x000000013FE60000-0x00000001401B4000-memory.dmpFilesize
3.3MB
-
memory/2124-36-0x000000013F270000-0x000000013F5C4000-memory.dmpFilesize
3.3MB
-
memory/2236-9-0x000000013F9E0000-0x000000013FD34000-memory.dmpFilesize
3.3MB
-
memory/2236-149-0x000000013F9E0000-0x000000013FD34000-memory.dmpFilesize
3.3MB
-
memory/2236-58-0x000000013F9E0000-0x000000013FD34000-memory.dmpFilesize
3.3MB
-
memory/2512-140-0x000000013F700000-0x000000013FA54000-memory.dmpFilesize
3.3MB
-
memory/2512-67-0x000000013F700000-0x000000013FA54000-memory.dmpFilesize
3.3MB
-
memory/2512-157-0x000000013F700000-0x000000013FA54000-memory.dmpFilesize
3.3MB
-
memory/2536-156-0x000000013FB70000-0x000000013FEC4000-memory.dmpFilesize
3.3MB
-
memory/2536-66-0x000000013FB70000-0x000000013FEC4000-memory.dmpFilesize
3.3MB
-
memory/2568-141-0x000000013FA00000-0x000000013FD54000-memory.dmpFilesize
3.3MB
-
memory/2568-72-0x000000013FA00000-0x000000013FD54000-memory.dmpFilesize
3.3MB
-
memory/2568-158-0x000000013FA00000-0x000000013FD54000-memory.dmpFilesize
3.3MB
-
memory/2608-60-0x000000013FCC0000-0x0000000140014000-memory.dmpFilesize
3.3MB
-
memory/2608-155-0x000000013FCC0000-0x0000000140014000-memory.dmpFilesize
3.3MB
-
memory/2648-152-0x000000013F760000-0x000000013FAB4000-memory.dmpFilesize
3.3MB
-
memory/2648-29-0x000000013F760000-0x000000013FAB4000-memory.dmpFilesize
3.3MB
-
memory/2648-85-0x000000013F760000-0x000000013FAB4000-memory.dmpFilesize
3.3MB
-
memory/2704-70-0x000000013FCC0000-0x0000000140014000-memory.dmpFilesize
3.3MB
-
memory/2704-151-0x000000013FCC0000-0x0000000140014000-memory.dmpFilesize
3.3MB
-
memory/2704-22-0x000000013FCC0000-0x0000000140014000-memory.dmpFilesize
3.3MB
-
memory/2720-153-0x000000013FE50000-0x00000001401A4000-memory.dmpFilesize
3.3MB
-
memory/2720-53-0x000000013FE50000-0x00000001401A4000-memory.dmpFilesize
3.3MB
-
memory/2760-37-0x000000013F500000-0x000000013F854000-memory.dmpFilesize
3.3MB
-
memory/2760-154-0x000000013F500000-0x000000013F854000-memory.dmpFilesize
3.3MB
-
memory/2760-100-0x000000013F500000-0x000000013F854000-memory.dmpFilesize
3.3MB
-
memory/2988-16-0x000000013F840000-0x000000013FB94000-memory.dmpFilesize
3.3MB
-
memory/2988-150-0x000000013F840000-0x000000013FB94000-memory.dmpFilesize
3.3MB
-
memory/2988-64-0x000000013F840000-0x000000013FB94000-memory.dmpFilesize
3.3MB