Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 08:35
Behavioral task
behavioral1
Sample
2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240611-en
General
-
Target
2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
ca49fb20fa49816e96584d7adddb3817
-
SHA1
951d987784b1a910876565a2686eb5b14620cb3e
-
SHA256
4f0a05b9d9f8d68bb125eb81fc755342896b6fdd13c9beed6d56ef76a225fc63
-
SHA512
62125fc1871085368fd1a0d2da41b7fdce157f1f71e3068a8b72f0a063890cc894a0f914eb858d0cb77d42145f3cd8c77a5ff11a137daeb649e4092ce44af032
-
SSDEEP
98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lUN:Q+856utgpPF8u/7N
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule C:\Windows\system\yJoWqvB.exe cobalt_reflective_dll \Windows\system\XLwqWda.exe cobalt_reflective_dll \Windows\system\ssOoQBf.exe cobalt_reflective_dll \Windows\system\ZVOYllV.exe cobalt_reflective_dll C:\Windows\system\TpNKgEo.exe cobalt_reflective_dll C:\Windows\system\YQRCZml.exe cobalt_reflective_dll \Windows\system\VbvEPGj.exe cobalt_reflective_dll C:\Windows\system\OiTbabX.exe cobalt_reflective_dll C:\Windows\system\cKJgVYA.exe cobalt_reflective_dll C:\Windows\system\XXrZfZI.exe cobalt_reflective_dll C:\Windows\system\QyPgjhW.exe cobalt_reflective_dll \Windows\system\ZfXanDY.exe cobalt_reflective_dll C:\Windows\system\CwISQdD.exe cobalt_reflective_dll C:\Windows\system\UlVVpTS.exe cobalt_reflective_dll C:\Windows\system\ZsWRByj.exe cobalt_reflective_dll C:\Windows\system\AByGJle.exe cobalt_reflective_dll C:\Windows\system\DZPhaiZ.exe cobalt_reflective_dll C:\Windows\system\jyFeSmT.exe cobalt_reflective_dll C:\Windows\system\cnOrbYS.exe cobalt_reflective_dll C:\Windows\system\wOZkOkQ.exe cobalt_reflective_dll C:\Windows\system\BXxqwoO.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule C:\Windows\system\yJoWqvB.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\XLwqWda.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\ssOoQBf.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\ZVOYllV.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\TpNKgEo.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\YQRCZml.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\VbvEPGj.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\OiTbabX.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\cKJgVYA.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\XXrZfZI.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\QyPgjhW.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\ZfXanDY.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\CwISQdD.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\UlVVpTS.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\ZsWRByj.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\AByGJle.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\DZPhaiZ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\jyFeSmT.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\cnOrbYS.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\wOZkOkQ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\BXxqwoO.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 58 IoCs
Processes:
resource yara_rule behavioral1/memory/352-0-0x000000013F090000-0x000000013F3E4000-memory.dmp UPX C:\Windows\system\yJoWqvB.exe UPX \Windows\system\XLwqWda.exe UPX \Windows\system\ssOoQBf.exe UPX behavioral1/memory/3036-17-0x000000013F830000-0x000000013FB84000-memory.dmp UPX \Windows\system\ZVOYllV.exe UPX behavioral1/memory/2624-28-0x000000013FAE0000-0x000000013FE34000-memory.dmp UPX behavioral1/memory/2072-25-0x000000013F830000-0x000000013FB84000-memory.dmp UPX C:\Windows\system\TpNKgEo.exe UPX behavioral1/memory/2676-35-0x000000013F230000-0x000000013F584000-memory.dmp UPX behavioral1/memory/2752-41-0x000000013F900000-0x000000013FC54000-memory.dmp UPX C:\Windows\system\YQRCZml.exe UPX behavioral1/memory/2920-54-0x000000013F1C0000-0x000000013F514000-memory.dmp UPX behavioral1/memory/352-64-0x000000013F090000-0x000000013F3E4000-memory.dmp UPX \Windows\system\VbvEPGj.exe UPX C:\Windows\system\OiTbabX.exe UPX behavioral1/memory/2420-69-0x000000013F5C0000-0x000000013F914000-memory.dmp UPX C:\Windows\system\cKJgVYA.exe UPX behavioral1/memory/2576-84-0x000000013F480000-0x000000013F7D4000-memory.dmp UPX behavioral1/memory/2440-98-0x000000013F1A0000-0x000000013F4F4000-memory.dmp UPX C:\Windows\system\XXrZfZI.exe UPX C:\Windows\system\QyPgjhW.exe UPX \Windows\system\ZfXanDY.exe UPX C:\Windows\system\CwISQdD.exe UPX C:\Windows\system\UlVVpTS.exe UPX C:\Windows\system\ZsWRByj.exe UPX behavioral1/memory/2752-104-0x000000013F900000-0x000000013FC54000-memory.dmp UPX behavioral1/memory/2924-136-0x000000013F660000-0x000000013F9B4000-memory.dmp UPX C:\Windows\system\AByGJle.exe UPX behavioral1/memory/3000-92-0x000000013FF60000-0x00000001402B4000-memory.dmp UPX behavioral1/memory/2072-90-0x000000013F830000-0x000000013FB84000-memory.dmp UPX C:\Windows\system\DZPhaiZ.exe UPX C:\Windows\system\jyFeSmT.exe UPX behavioral1/memory/2836-77-0x000000013F950000-0x000000013FCA4000-memory.dmp UPX C:\Windows\system\cnOrbYS.exe UPX behavioral1/memory/2888-61-0x000000013FF80000-0x00000001402D4000-memory.dmp UPX behavioral1/memory/2924-48-0x000000013F660000-0x000000013F9B4000-memory.dmp UPX C:\Windows\system\wOZkOkQ.exe UPX C:\Windows\system\BXxqwoO.exe UPX behavioral1/memory/900-13-0x000000013F450000-0x000000013F7A4000-memory.dmp UPX behavioral1/memory/2920-137-0x000000013F1C0000-0x000000013F514000-memory.dmp UPX behavioral1/memory/2888-138-0x000000013FF80000-0x00000001402D4000-memory.dmp UPX behavioral1/memory/2420-140-0x000000013F5C0000-0x000000013F914000-memory.dmp UPX behavioral1/memory/2440-145-0x000000013F1A0000-0x000000013F4F4000-memory.dmp UPX behavioral1/memory/900-147-0x000000013F450000-0x000000013F7A4000-memory.dmp UPX behavioral1/memory/3036-148-0x000000013F830000-0x000000013FB84000-memory.dmp UPX behavioral1/memory/2624-149-0x000000013FAE0000-0x000000013FE34000-memory.dmp UPX behavioral1/memory/2072-150-0x000000013F830000-0x000000013FB84000-memory.dmp UPX behavioral1/memory/2676-151-0x000000013F230000-0x000000013F584000-memory.dmp UPX behavioral1/memory/2752-152-0x000000013F900000-0x000000013FC54000-memory.dmp UPX behavioral1/memory/2924-153-0x000000013F660000-0x000000013F9B4000-memory.dmp UPX behavioral1/memory/2920-154-0x000000013F1C0000-0x000000013F514000-memory.dmp UPX behavioral1/memory/2888-155-0x000000013FF80000-0x00000001402D4000-memory.dmp UPX behavioral1/memory/2420-156-0x000000013F5C0000-0x000000013F914000-memory.dmp UPX behavioral1/memory/2836-157-0x000000013F950000-0x000000013FCA4000-memory.dmp UPX behavioral1/memory/2576-158-0x000000013F480000-0x000000013F7D4000-memory.dmp UPX behavioral1/memory/3000-159-0x000000013FF60000-0x00000001402B4000-memory.dmp UPX behavioral1/memory/2440-160-0x000000013F1A0000-0x000000013F4F4000-memory.dmp UPX -
XMRig Miner payload 62 IoCs
Processes:
resource yara_rule behavioral1/memory/352-0-0x000000013F090000-0x000000013F3E4000-memory.dmp xmrig C:\Windows\system\yJoWqvB.exe xmrig \Windows\system\XLwqWda.exe xmrig \Windows\system\ssOoQBf.exe xmrig behavioral1/memory/3036-17-0x000000013F830000-0x000000013FB84000-memory.dmp xmrig \Windows\system\ZVOYllV.exe xmrig behavioral1/memory/2624-28-0x000000013FAE0000-0x000000013FE34000-memory.dmp xmrig behavioral1/memory/2072-25-0x000000013F830000-0x000000013FB84000-memory.dmp xmrig C:\Windows\system\TpNKgEo.exe xmrig behavioral1/memory/2676-35-0x000000013F230000-0x000000013F584000-memory.dmp xmrig behavioral1/memory/2752-41-0x000000013F900000-0x000000013FC54000-memory.dmp xmrig C:\Windows\system\YQRCZml.exe xmrig behavioral1/memory/2920-54-0x000000013F1C0000-0x000000013F514000-memory.dmp xmrig behavioral1/memory/352-64-0x000000013F090000-0x000000013F3E4000-memory.dmp xmrig \Windows\system\VbvEPGj.exe xmrig C:\Windows\system\OiTbabX.exe xmrig behavioral1/memory/2420-69-0x000000013F5C0000-0x000000013F914000-memory.dmp xmrig C:\Windows\system\cKJgVYA.exe xmrig behavioral1/memory/2576-84-0x000000013F480000-0x000000013F7D4000-memory.dmp xmrig behavioral1/memory/2440-98-0x000000013F1A0000-0x000000013F4F4000-memory.dmp xmrig C:\Windows\system\XXrZfZI.exe xmrig C:\Windows\system\QyPgjhW.exe xmrig \Windows\system\ZfXanDY.exe xmrig C:\Windows\system\CwISQdD.exe xmrig C:\Windows\system\UlVVpTS.exe xmrig C:\Windows\system\ZsWRByj.exe xmrig behavioral1/memory/2752-104-0x000000013F900000-0x000000013FC54000-memory.dmp xmrig behavioral1/memory/2924-136-0x000000013F660000-0x000000013F9B4000-memory.dmp xmrig C:\Windows\system\AByGJle.exe xmrig behavioral1/memory/3000-92-0x000000013FF60000-0x00000001402B4000-memory.dmp xmrig behavioral1/memory/352-91-0x000000013FF60000-0x00000001402B4000-memory.dmp xmrig behavioral1/memory/2072-90-0x000000013F830000-0x000000013FB84000-memory.dmp xmrig C:\Windows\system\DZPhaiZ.exe xmrig C:\Windows\system\jyFeSmT.exe xmrig behavioral1/memory/2836-77-0x000000013F950000-0x000000013FCA4000-memory.dmp xmrig C:\Windows\system\cnOrbYS.exe xmrig behavioral1/memory/2888-61-0x000000013FF80000-0x00000001402D4000-memory.dmp xmrig behavioral1/memory/352-65-0x000000013F5C0000-0x000000013F914000-memory.dmp xmrig behavioral1/memory/2924-48-0x000000013F660000-0x000000013F9B4000-memory.dmp xmrig C:\Windows\system\wOZkOkQ.exe xmrig C:\Windows\system\BXxqwoO.exe xmrig behavioral1/memory/900-13-0x000000013F450000-0x000000013F7A4000-memory.dmp xmrig behavioral1/memory/2920-137-0x000000013F1C0000-0x000000013F514000-memory.dmp xmrig behavioral1/memory/2888-138-0x000000013FF80000-0x00000001402D4000-memory.dmp xmrig behavioral1/memory/352-139-0x000000013F5C0000-0x000000013F914000-memory.dmp xmrig behavioral1/memory/2420-140-0x000000013F5C0000-0x000000013F914000-memory.dmp xmrig behavioral1/memory/352-143-0x000000013FF60000-0x00000001402B4000-memory.dmp xmrig behavioral1/memory/2440-145-0x000000013F1A0000-0x000000013F4F4000-memory.dmp xmrig behavioral1/memory/900-147-0x000000013F450000-0x000000013F7A4000-memory.dmp xmrig behavioral1/memory/3036-148-0x000000013F830000-0x000000013FB84000-memory.dmp xmrig behavioral1/memory/2624-149-0x000000013FAE0000-0x000000013FE34000-memory.dmp xmrig behavioral1/memory/2072-150-0x000000013F830000-0x000000013FB84000-memory.dmp xmrig behavioral1/memory/2676-151-0x000000013F230000-0x000000013F584000-memory.dmp xmrig behavioral1/memory/2752-152-0x000000013F900000-0x000000013FC54000-memory.dmp xmrig behavioral1/memory/2924-153-0x000000013F660000-0x000000013F9B4000-memory.dmp xmrig behavioral1/memory/2920-154-0x000000013F1C0000-0x000000013F514000-memory.dmp xmrig behavioral1/memory/2888-155-0x000000013FF80000-0x00000001402D4000-memory.dmp xmrig behavioral1/memory/2420-156-0x000000013F5C0000-0x000000013F914000-memory.dmp xmrig behavioral1/memory/2836-157-0x000000013F950000-0x000000013FCA4000-memory.dmp xmrig behavioral1/memory/2576-158-0x000000013F480000-0x000000013F7D4000-memory.dmp xmrig behavioral1/memory/3000-159-0x000000013FF60000-0x00000001402B4000-memory.dmp xmrig behavioral1/memory/2440-160-0x000000013F1A0000-0x000000013F4F4000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
yJoWqvB.exeXLwqWda.exeZVOYllV.exessOoQBf.exeTpNKgEo.exeBXxqwoO.exewOZkOkQ.exeYQRCZml.exeOiTbabX.exeVbvEPGj.execKJgVYA.execnOrbYS.exejyFeSmT.exeDZPhaiZ.exeAByGJle.exeXXrZfZI.exeUlVVpTS.exeZsWRByj.exeCwISQdD.exeQyPgjhW.exeZfXanDY.exepid process 900 yJoWqvB.exe 3036 XLwqWda.exe 2072 ZVOYllV.exe 2624 ssOoQBf.exe 2676 TpNKgEo.exe 2752 BXxqwoO.exe 2924 wOZkOkQ.exe 2920 YQRCZml.exe 2888 OiTbabX.exe 2420 VbvEPGj.exe 2836 cKJgVYA.exe 2576 cnOrbYS.exe 3000 jyFeSmT.exe 2440 DZPhaiZ.exe 2772 AByGJle.exe 2044 XXrZfZI.exe 1872 UlVVpTS.exe 1620 ZsWRByj.exe 2792 CwISQdD.exe 1124 QyPgjhW.exe 1048 ZfXanDY.exe -
Loads dropped DLL 21 IoCs
Processes:
2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exepid process 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe -
Processes:
resource yara_rule behavioral1/memory/352-0-0x000000013F090000-0x000000013F3E4000-memory.dmp upx C:\Windows\system\yJoWqvB.exe upx \Windows\system\XLwqWda.exe upx \Windows\system\ssOoQBf.exe upx behavioral1/memory/3036-17-0x000000013F830000-0x000000013FB84000-memory.dmp upx \Windows\system\ZVOYllV.exe upx behavioral1/memory/2624-28-0x000000013FAE0000-0x000000013FE34000-memory.dmp upx behavioral1/memory/2072-25-0x000000013F830000-0x000000013FB84000-memory.dmp upx C:\Windows\system\TpNKgEo.exe upx behavioral1/memory/2676-35-0x000000013F230000-0x000000013F584000-memory.dmp upx behavioral1/memory/2752-41-0x000000013F900000-0x000000013FC54000-memory.dmp upx C:\Windows\system\YQRCZml.exe upx behavioral1/memory/2920-54-0x000000013F1C0000-0x000000013F514000-memory.dmp upx behavioral1/memory/352-64-0x000000013F090000-0x000000013F3E4000-memory.dmp upx \Windows\system\VbvEPGj.exe upx C:\Windows\system\OiTbabX.exe upx behavioral1/memory/2420-69-0x000000013F5C0000-0x000000013F914000-memory.dmp upx C:\Windows\system\cKJgVYA.exe upx behavioral1/memory/2576-84-0x000000013F480000-0x000000013F7D4000-memory.dmp upx behavioral1/memory/2440-98-0x000000013F1A0000-0x000000013F4F4000-memory.dmp upx C:\Windows\system\XXrZfZI.exe upx C:\Windows\system\QyPgjhW.exe upx \Windows\system\ZfXanDY.exe upx C:\Windows\system\CwISQdD.exe upx C:\Windows\system\UlVVpTS.exe upx C:\Windows\system\ZsWRByj.exe upx behavioral1/memory/2752-104-0x000000013F900000-0x000000013FC54000-memory.dmp upx behavioral1/memory/2924-136-0x000000013F660000-0x000000013F9B4000-memory.dmp upx C:\Windows\system\AByGJle.exe upx behavioral1/memory/3000-92-0x000000013FF60000-0x00000001402B4000-memory.dmp upx behavioral1/memory/2072-90-0x000000013F830000-0x000000013FB84000-memory.dmp upx C:\Windows\system\DZPhaiZ.exe upx C:\Windows\system\jyFeSmT.exe upx behavioral1/memory/2836-77-0x000000013F950000-0x000000013FCA4000-memory.dmp upx C:\Windows\system\cnOrbYS.exe upx behavioral1/memory/2888-61-0x000000013FF80000-0x00000001402D4000-memory.dmp upx behavioral1/memory/2924-48-0x000000013F660000-0x000000013F9B4000-memory.dmp upx C:\Windows\system\wOZkOkQ.exe upx C:\Windows\system\BXxqwoO.exe upx behavioral1/memory/900-13-0x000000013F450000-0x000000013F7A4000-memory.dmp upx behavioral1/memory/2920-137-0x000000013F1C0000-0x000000013F514000-memory.dmp upx behavioral1/memory/2888-138-0x000000013FF80000-0x00000001402D4000-memory.dmp upx behavioral1/memory/2420-140-0x000000013F5C0000-0x000000013F914000-memory.dmp upx behavioral1/memory/2440-145-0x000000013F1A0000-0x000000013F4F4000-memory.dmp upx behavioral1/memory/900-147-0x000000013F450000-0x000000013F7A4000-memory.dmp upx behavioral1/memory/3036-148-0x000000013F830000-0x000000013FB84000-memory.dmp upx behavioral1/memory/2624-149-0x000000013FAE0000-0x000000013FE34000-memory.dmp upx behavioral1/memory/2072-150-0x000000013F830000-0x000000013FB84000-memory.dmp upx behavioral1/memory/2676-151-0x000000013F230000-0x000000013F584000-memory.dmp upx behavioral1/memory/2752-152-0x000000013F900000-0x000000013FC54000-memory.dmp upx behavioral1/memory/2924-153-0x000000013F660000-0x000000013F9B4000-memory.dmp upx behavioral1/memory/2920-154-0x000000013F1C0000-0x000000013F514000-memory.dmp upx behavioral1/memory/2888-155-0x000000013FF80000-0x00000001402D4000-memory.dmp upx behavioral1/memory/2420-156-0x000000013F5C0000-0x000000013F914000-memory.dmp upx behavioral1/memory/2836-157-0x000000013F950000-0x000000013FCA4000-memory.dmp upx behavioral1/memory/2576-158-0x000000013F480000-0x000000013F7D4000-memory.dmp upx behavioral1/memory/3000-159-0x000000013FF60000-0x00000001402B4000-memory.dmp upx behavioral1/memory/2440-160-0x000000013F1A0000-0x000000013F4F4000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exedescription ioc process File created C:\Windows\System\cKJgVYA.exe 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\XXrZfZI.exe 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\UlVVpTS.exe 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\yJoWqvB.exe 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ZVOYllV.exe 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\TpNKgEo.exe 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\BXxqwoO.exe 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\wOZkOkQ.exe 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\jyFeSmT.exe 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\CwISQdD.exe 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\XLwqWda.exe 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\VbvEPGj.exe 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ZsWRByj.exe 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\QyPgjhW.exe 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ZfXanDY.exe 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ssOoQBf.exe 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\YQRCZml.exe 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\OiTbabX.exe 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\cnOrbYS.exe 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\DZPhaiZ.exe 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\AByGJle.exe 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process Token: SeLockMemoryPrivilege 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process target process PID 352 wrote to memory of 900 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe yJoWqvB.exe PID 352 wrote to memory of 900 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe yJoWqvB.exe PID 352 wrote to memory of 900 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe yJoWqvB.exe PID 352 wrote to memory of 3036 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe XLwqWda.exe PID 352 wrote to memory of 3036 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe XLwqWda.exe PID 352 wrote to memory of 3036 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe XLwqWda.exe PID 352 wrote to memory of 2072 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe ZVOYllV.exe PID 352 wrote to memory of 2072 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe ZVOYllV.exe PID 352 wrote to memory of 2072 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe ZVOYllV.exe PID 352 wrote to memory of 2624 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe ssOoQBf.exe PID 352 wrote to memory of 2624 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe ssOoQBf.exe PID 352 wrote to memory of 2624 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe ssOoQBf.exe PID 352 wrote to memory of 2676 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe TpNKgEo.exe PID 352 wrote to memory of 2676 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe TpNKgEo.exe PID 352 wrote to memory of 2676 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe TpNKgEo.exe PID 352 wrote to memory of 2752 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe BXxqwoO.exe PID 352 wrote to memory of 2752 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe BXxqwoO.exe PID 352 wrote to memory of 2752 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe BXxqwoO.exe PID 352 wrote to memory of 2924 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe wOZkOkQ.exe PID 352 wrote to memory of 2924 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe wOZkOkQ.exe PID 352 wrote to memory of 2924 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe wOZkOkQ.exe PID 352 wrote to memory of 2920 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe YQRCZml.exe PID 352 wrote to memory of 2920 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe YQRCZml.exe PID 352 wrote to memory of 2920 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe YQRCZml.exe PID 352 wrote to memory of 2888 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe OiTbabX.exe PID 352 wrote to memory of 2888 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe OiTbabX.exe PID 352 wrote to memory of 2888 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe OiTbabX.exe PID 352 wrote to memory of 2420 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe VbvEPGj.exe PID 352 wrote to memory of 2420 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe VbvEPGj.exe PID 352 wrote to memory of 2420 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe VbvEPGj.exe PID 352 wrote to memory of 2836 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe cKJgVYA.exe PID 352 wrote to memory of 2836 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe cKJgVYA.exe PID 352 wrote to memory of 2836 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe cKJgVYA.exe PID 352 wrote to memory of 2576 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe cnOrbYS.exe PID 352 wrote to memory of 2576 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe cnOrbYS.exe PID 352 wrote to memory of 2576 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe cnOrbYS.exe PID 352 wrote to memory of 3000 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe jyFeSmT.exe PID 352 wrote to memory of 3000 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe jyFeSmT.exe PID 352 wrote to memory of 3000 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe jyFeSmT.exe PID 352 wrote to memory of 2440 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe DZPhaiZ.exe PID 352 wrote to memory of 2440 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe DZPhaiZ.exe PID 352 wrote to memory of 2440 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe DZPhaiZ.exe PID 352 wrote to memory of 2772 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe AByGJle.exe PID 352 wrote to memory of 2772 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe AByGJle.exe PID 352 wrote to memory of 2772 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe AByGJle.exe PID 352 wrote to memory of 2044 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe XXrZfZI.exe PID 352 wrote to memory of 2044 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe XXrZfZI.exe PID 352 wrote to memory of 2044 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe XXrZfZI.exe PID 352 wrote to memory of 1872 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe UlVVpTS.exe PID 352 wrote to memory of 1872 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe UlVVpTS.exe PID 352 wrote to memory of 1872 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe UlVVpTS.exe PID 352 wrote to memory of 1620 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe ZsWRByj.exe PID 352 wrote to memory of 1620 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe ZsWRByj.exe PID 352 wrote to memory of 1620 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe ZsWRByj.exe PID 352 wrote to memory of 2792 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe CwISQdD.exe PID 352 wrote to memory of 2792 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe CwISQdD.exe PID 352 wrote to memory of 2792 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe CwISQdD.exe PID 352 wrote to memory of 1124 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe QyPgjhW.exe PID 352 wrote to memory of 1124 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe QyPgjhW.exe PID 352 wrote to memory of 1124 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe QyPgjhW.exe PID 352 wrote to memory of 1048 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe ZfXanDY.exe PID 352 wrote to memory of 1048 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe ZfXanDY.exe PID 352 wrote to memory of 1048 352 2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe ZfXanDY.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-24_ca49fb20fa49816e96584d7adddb3817_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\yJoWqvB.exeC:\Windows\System\yJoWqvB.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\XLwqWda.exeC:\Windows\System\XLwqWda.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ZVOYllV.exeC:\Windows\System\ZVOYllV.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ssOoQBf.exeC:\Windows\System\ssOoQBf.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\TpNKgEo.exeC:\Windows\System\TpNKgEo.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\BXxqwoO.exeC:\Windows\System\BXxqwoO.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wOZkOkQ.exeC:\Windows\System\wOZkOkQ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YQRCZml.exeC:\Windows\System\YQRCZml.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\OiTbabX.exeC:\Windows\System\OiTbabX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\VbvEPGj.exeC:\Windows\System\VbvEPGj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\cKJgVYA.exeC:\Windows\System\cKJgVYA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\cnOrbYS.exeC:\Windows\System\cnOrbYS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\jyFeSmT.exeC:\Windows\System\jyFeSmT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\DZPhaiZ.exeC:\Windows\System\DZPhaiZ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\AByGJle.exeC:\Windows\System\AByGJle.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\XXrZfZI.exeC:\Windows\System\XXrZfZI.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\UlVVpTS.exeC:\Windows\System\UlVVpTS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ZsWRByj.exeC:\Windows\System\ZsWRByj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CwISQdD.exeC:\Windows\System\CwISQdD.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\QyPgjhW.exeC:\Windows\System\QyPgjhW.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ZfXanDY.exeC:\Windows\System\ZfXanDY.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\AByGJle.exeFilesize
5.9MB
MD5bf52c114cc499c86faafc38653f08d0b
SHA162cc2b1466c072fa6fee1586a5dc082b4f21fc4d
SHA2561d8ccf8f576ec92d301b5af225efb57975f33f6ccd642d08e942d2bc375bca80
SHA51222aaf4b9c38599865bb18052cb65a3afa7e6bd562c4a0871c00820615ac1d06f51ad482c0c0ffc3ee640232c12cb1c3c0c3e220c0446af761715433c56e1b73f
-
C:\Windows\system\BXxqwoO.exeFilesize
5.9MB
MD506deff317b5533f8e1b4fc01f4d19fb0
SHA1fe04c16024b4831b6fc6f6e4b4c067608915484e
SHA25697e8b34f8106fe4ff17f7865ed0845af3092f6f21a2bc2cf0a0c47b4d18a49e9
SHA5123a1e538de7e177a59d546a5d62f732506665bb5ba236b9d546d53ea14fb2ea03c3c6c343c89a528a91c4d314fa6edf7418903229e9a50c8cab2513e3af62e9a1
-
C:\Windows\system\CwISQdD.exeFilesize
5.9MB
MD59e7648ba3f3e8e22ccbc7a8feb596205
SHA199e3184f18153de0711275e1f75f5c54b69994e0
SHA2568b53b21ae0b2f0ab54ec3f54089ce9970dbd69e501175b8eac47c8757de4ace9
SHA512ae458833e512028b45d1d8157411e89d8c20683c9373477204c3a4cc76fa6d8f644a661b4cb735c2356959c5779ebac23264fb4aa9c5ad31f449cd134a85f946
-
C:\Windows\system\DZPhaiZ.exeFilesize
5.9MB
MD5715475f704cff375dc13f9fdfdca190e
SHA1cc916793ef49cb2a1aed3fa01f21d6cf9c0b3e3e
SHA256b803e742b10cea46c3819cd012aab02f97cd3b1a1516e6a8e735b8db3d5519a7
SHA51252b992a2980c2ada555a7aeb4e2ef165eb545a6fd1c8fd646754096ee1362f98234d12d514cad6fa3ba6249016a7836abe33d8fc367d5bfd9a666ed39e83a7bf
-
C:\Windows\system\OiTbabX.exeFilesize
5.9MB
MD5e5fbe3a965ded8312c6fa80eda302269
SHA13852872b6d6223646c0492dfed9316a1ba0054c5
SHA256936ec7e1d30716e8210ba4ab5f3cd737fdd5a29968c05ac5f384bf600b5b03bb
SHA5125eb2265c5fa230cb5ae66caceb940e84f6001b4ea8689d583115c55a6734eb702c49151825f3db9c1a931b54665c3ef7e879d3db4ab20a084b84ef452208f154
-
C:\Windows\system\QyPgjhW.exeFilesize
5.9MB
MD5d007e0b351844b8e4edfcd6f86e5b041
SHA1c4fae1c0840a5fa5f5be949b5dd0a922afc93dc4
SHA256171a5530110b49b8386d51a8a9235a0671472214d046fb2d32208ff0dc6ec02f
SHA512778839829780b3e6ffaa3205181367e7ac97203c81829bbea142e47f038e9aec1d6454d54a5de85cec8ee9572936261c36e5e5cf4e79226d46a011761f0bb12e
-
C:\Windows\system\TpNKgEo.exeFilesize
5.9MB
MD5e56581b835d848aade8d234e04ba26d3
SHA12e8922a2dbe4f27f7efb68459342a2bdd3b303cc
SHA256171d405b273f23f8d1c577164aae0374c1d090e3d183c5698e0137137e432df9
SHA5124c465d574b692131703d17b9965438badbf90d446c7f3068f234d91ed30ffabff037a705833044214ad4302f05a60eeb8b534c53b0c1d64f5efcae61cd0a8933
-
C:\Windows\system\UlVVpTS.exeFilesize
5.9MB
MD540c85b7f4eb66c87e3ab17ce053afe69
SHA1b69b06d7a8ecaeb2ad60b3bfcaa4010e8b4b0276
SHA256af844c8f3f2c516a9931ed0357a526a4d46afa142059f03d9743ebdd528195d2
SHA512bdafa9396217ff3fa83fd65c23b2b96f507548bcb07b26b2eaff37e4d4c425caa50990e68399f0a1ccba0f585e3675582e46e2334d707c7161e7372d8720da89
-
C:\Windows\system\XXrZfZI.exeFilesize
5.9MB
MD572d310a4086b28453018f823b00b5f0f
SHA1de56f2c35d14f7c0619eb70e616cd6fb5cda41e8
SHA256020729f3c7a6bec8bf6de165ad7f02a392c455f56555ae8112ce4afed83da5a4
SHA51215ffdc0016b6d7c4b334b4130b62edbbc0715818a1a906c0a7eaf8f68a1a910d2cb4ea0accad12b5668e9e937d699169bfdd82a18152fc33b86e91404d2d8bd5
-
C:\Windows\system\YQRCZml.exeFilesize
5.9MB
MD540663eee5e7995ea92819758db0ba47d
SHA1e9a61bcbcf15f7bc5380b296cf642160fb5153e9
SHA256ec4aab7470ff52db1da07766710bdd76ded62fff95983a9207dd8c52aa322aa4
SHA512eaaab6c6d88b9229ee892e5bbae1b213c0fbd71885d042427482aa630b3d39d18b81cad619b6a696311e931d9c60454abed386e6bd9ac1dac44ad0fbf214b2a8
-
C:\Windows\system\ZsWRByj.exeFilesize
5.9MB
MD58ca8f8cf85327c05c5b86aa476496aa3
SHA1c6595e5019b28d0d104eaf3aa1295de9f3724105
SHA2565055773cf7b9c8f6cf52feab0977eec148aa90d05ec881abbd25bb99546dbed3
SHA51236e94e5b17aadbabe4ba687af862ad2e4880cdf426911cd239be74e042782068e221210974843ac1abe6e800a36ab259598411e69594b32beb64c9209e67980f
-
C:\Windows\system\cKJgVYA.exeFilesize
5.9MB
MD54ac5745dc393891565f53262d6c1a795
SHA177d1d1f7e392c143806ff13c4a628980c96b80a3
SHA256318d14db3d59f5f068a50c3e99bc2118c0e9a4d00c6219e1ec795c67b95de463
SHA512927384b8020e3f88caa255356ce2eb5a3c89151936060757a665fabca5068f802297254dbda0b8e5a162d037c87266a0c5438d0f563a38abc14ce970604f3d64
-
C:\Windows\system\cnOrbYS.exeFilesize
5.9MB
MD52420148c4ea0cb622207a5583e6e6bfd
SHA10c7a4585cc7cacfaf92b4672636ccd7974c689fd
SHA2565a8dd54b641c2c01fd5f9e51c0c9821ea3ccb1814caec9a29a90b749f01b6f15
SHA512ca8f7e4c9463acf542429c686a9b2b6a87bf60682fc1c625eb57926df5214fd271eda44a61e1da7a70b110f25e5d93cec608599ba76240744a6a5d88f3425a55
-
C:\Windows\system\jyFeSmT.exeFilesize
5.9MB
MD527b60ab47d2aaec8eb7f5565b4f7e839
SHA1331ed18b7e6e24b86626fe05a8bb71d57f5bd3e5
SHA25664b22cdcbcb7550f13edcf800b22561cff456112832cfeb66475b07281a831a3
SHA5120b10cead993103a6642e17b11bbde88c87d18fd25b64d1367b21c3f755e781b3d88b2a06a33a653204da6aed45e246e9d5ce2b2c185bde0cd352d3338ef010c1
-
C:\Windows\system\wOZkOkQ.exeFilesize
5.9MB
MD5de2da66327d78afd42e927989d167f9c
SHA16322c86629a939aa1bd7ebb557f4ba4fdaf7c738
SHA2561c4822e0819a1f1861aee51a88f355f5bd779669acb050ed901802b6eedfacaf
SHA512ac482c16255adf9103eaaebd9c2a0dc57f409753376a2d0fe96f61ecc5c2549ff22af83e37b5139f29ec06a6bfe3ee9d43f9ee0b298ec2acf62256a39b2929a1
-
C:\Windows\system\yJoWqvB.exeFilesize
5.9MB
MD52b371ef86e01b0abce2abf1289fb1c5d
SHA16f1d77244a5b4eeb7929779f9fb6d9b3d4e5cd64
SHA25688bb0d387dc8b12f7bd3cee7b5371123220d4f7ab8c3198c5dc83c3e7e7e13d8
SHA512174121f32f245eb337b9628f4e1bb591e307ede36dc484d85a70199ac935a8f3192dd45837749b7b5d03ceda04651f5e0e094e30389acf681596a0fe2581b35b
-
\Windows\system\VbvEPGj.exeFilesize
5.9MB
MD5d9ef621e61477b291e8c9aaa72021f3a
SHA1278c84ffc1af1010ee454be3a2e570f65ea920eb
SHA256605f32eee276149062fb0a25a3cb819349f415080ae449f96749d65b34ad50ca
SHA512b2abb07722de6b56c4c715a433ae23a5fb426cd9354e5ae55c2ed48fd99f191a83603b90a8219f75c0ae9cca0710e5cd17becc2ee42d1bb6deb3892ef3a70296
-
\Windows\system\XLwqWda.exeFilesize
5.9MB
MD5132f31fca63a05d3457c9e253f9b94c9
SHA1690a1102f81e59fff5a911e21a9b3de9456be0e7
SHA25697d3c59acc710c3b3f03a84cab4c05b25486bd4ff1a818efe33654c1fce1a88c
SHA5122ada01add7df658423dca3d3d1fffadbec976febbecd339ff7080b255da53a9110248ca7c06cd771450f60fe772718256152b38653f86e3315e87a024d279cab
-
\Windows\system\ZVOYllV.exeFilesize
5.9MB
MD5ff0d6d6936f13aa2b13fb6ac1b5f9ec7
SHA1d82ed78bceac7e0127292347c25cd39606c05f55
SHA2567bbf72955bb48742b2108018b1c2b6e72e7363f43060f57289139641820ca6f6
SHA5128ca2843dd6a1cd42266404ded884824d04fd7471006e4380e9079415c963b3ec3fa482c01af8083e8f5a9599aaa2846b42cf1862953c3e93196da6ddbf756531
-
\Windows\system\ZfXanDY.exeFilesize
5.9MB
MD5213aaa695178c930036b499802787d50
SHA1a9a8de7949de3e99c8977d6d116ebfa33f942b3a
SHA256ac89af2c746d007a05c6739863555f3d8027af23f5522d59800187813b096050
SHA512497a20d660c8abebb73d465f72ad6af551e779281360ddd781f7c665c97bed7578e7fda1b6021fa11dd0c94507e241d055a8bead56a07e05181ee39a5a14c368
-
\Windows\system\ssOoQBf.exeFilesize
5.9MB
MD544369eeff6612f90209034a8596b2cb1
SHA199016747f86fa2d85c76d01e81cf2686e40ac5cc
SHA256f1a1206a7e950b188c5ad586df94bddbe7c60cfaa21b35353b29723f4815d3f0
SHA512cc00b529b3dace67d2ff4f89322d5a39d0468aede18e0d598418ce72e717bdf040d3f76c473add0d39366ec2f24272e1ea201d9d0327d77f00cc1aa1dc3ad174
-
memory/352-27-0x000000013FAE0000-0x000000013FE34000-memory.dmpFilesize
3.3MB
-
memory/352-1-0x00000000000F0000-0x0000000000100000-memory.dmpFilesize
64KB
-
memory/352-142-0x000000013F480000-0x000000013F7D4000-memory.dmpFilesize
3.3MB
-
memory/352-97-0x00000000024F0000-0x0000000002844000-memory.dmpFilesize
3.3MB
-
memory/352-40-0x000000013F900000-0x000000013FC54000-memory.dmpFilesize
3.3MB
-
memory/352-141-0x000000013F950000-0x000000013FCA4000-memory.dmpFilesize
3.3MB
-
memory/352-144-0x00000000024F0000-0x0000000002844000-memory.dmpFilesize
3.3MB
-
memory/352-139-0x000000013F5C0000-0x000000013F914000-memory.dmpFilesize
3.3MB
-
memory/352-76-0x000000013F830000-0x000000013FB84000-memory.dmpFilesize
3.3MB
-
memory/352-34-0x00000000024F0000-0x0000000002844000-memory.dmpFilesize
3.3MB
-
memory/352-105-0x000000013F470000-0x000000013F7C4000-memory.dmpFilesize
3.3MB
-
memory/352-143-0x000000013FF60000-0x00000001402B4000-memory.dmpFilesize
3.3MB
-
memory/352-146-0x000000013F470000-0x000000013F7C4000-memory.dmpFilesize
3.3MB
-
memory/352-64-0x000000013F090000-0x000000013F3E4000-memory.dmpFilesize
3.3MB
-
memory/352-47-0x000000013F660000-0x000000013F9B4000-memory.dmpFilesize
3.3MB
-
memory/352-91-0x000000013FF60000-0x00000001402B4000-memory.dmpFilesize
3.3MB
-
memory/352-53-0x00000000024F0000-0x0000000002844000-memory.dmpFilesize
3.3MB
-
memory/352-65-0x000000013F5C0000-0x000000013F914000-memory.dmpFilesize
3.3MB
-
memory/352-0-0x000000013F090000-0x000000013F3E4000-memory.dmpFilesize
3.3MB
-
memory/352-83-0x000000013F480000-0x000000013F7D4000-memory.dmpFilesize
3.3MB
-
memory/352-14-0x000000013F830000-0x000000013FB84000-memory.dmpFilesize
3.3MB
-
memory/900-147-0x000000013F450000-0x000000013F7A4000-memory.dmpFilesize
3.3MB
-
memory/900-13-0x000000013F450000-0x000000013F7A4000-memory.dmpFilesize
3.3MB
-
memory/2072-25-0x000000013F830000-0x000000013FB84000-memory.dmpFilesize
3.3MB
-
memory/2072-90-0x000000013F830000-0x000000013FB84000-memory.dmpFilesize
3.3MB
-
memory/2072-150-0x000000013F830000-0x000000013FB84000-memory.dmpFilesize
3.3MB
-
memory/2420-156-0x000000013F5C0000-0x000000013F914000-memory.dmpFilesize
3.3MB
-
memory/2420-69-0x000000013F5C0000-0x000000013F914000-memory.dmpFilesize
3.3MB
-
memory/2420-140-0x000000013F5C0000-0x000000013F914000-memory.dmpFilesize
3.3MB
-
memory/2440-160-0x000000013F1A0000-0x000000013F4F4000-memory.dmpFilesize
3.3MB
-
memory/2440-145-0x000000013F1A0000-0x000000013F4F4000-memory.dmpFilesize
3.3MB
-
memory/2440-98-0x000000013F1A0000-0x000000013F4F4000-memory.dmpFilesize
3.3MB
-
memory/2576-158-0x000000013F480000-0x000000013F7D4000-memory.dmpFilesize
3.3MB
-
memory/2576-84-0x000000013F480000-0x000000013F7D4000-memory.dmpFilesize
3.3MB
-
memory/2624-28-0x000000013FAE0000-0x000000013FE34000-memory.dmpFilesize
3.3MB
-
memory/2624-149-0x000000013FAE0000-0x000000013FE34000-memory.dmpFilesize
3.3MB
-
memory/2676-35-0x000000013F230000-0x000000013F584000-memory.dmpFilesize
3.3MB
-
memory/2676-151-0x000000013F230000-0x000000013F584000-memory.dmpFilesize
3.3MB
-
memory/2752-41-0x000000013F900000-0x000000013FC54000-memory.dmpFilesize
3.3MB
-
memory/2752-104-0x000000013F900000-0x000000013FC54000-memory.dmpFilesize
3.3MB
-
memory/2752-152-0x000000013F900000-0x000000013FC54000-memory.dmpFilesize
3.3MB
-
memory/2836-157-0x000000013F950000-0x000000013FCA4000-memory.dmpFilesize
3.3MB
-
memory/2836-77-0x000000013F950000-0x000000013FCA4000-memory.dmpFilesize
3.3MB
-
memory/2888-155-0x000000013FF80000-0x00000001402D4000-memory.dmpFilesize
3.3MB
-
memory/2888-138-0x000000013FF80000-0x00000001402D4000-memory.dmpFilesize
3.3MB
-
memory/2888-61-0x000000013FF80000-0x00000001402D4000-memory.dmpFilesize
3.3MB
-
memory/2920-54-0x000000013F1C0000-0x000000013F514000-memory.dmpFilesize
3.3MB
-
memory/2920-154-0x000000013F1C0000-0x000000013F514000-memory.dmpFilesize
3.3MB
-
memory/2920-137-0x000000013F1C0000-0x000000013F514000-memory.dmpFilesize
3.3MB
-
memory/2924-136-0x000000013F660000-0x000000013F9B4000-memory.dmpFilesize
3.3MB
-
memory/2924-153-0x000000013F660000-0x000000013F9B4000-memory.dmpFilesize
3.3MB
-
memory/2924-48-0x000000013F660000-0x000000013F9B4000-memory.dmpFilesize
3.3MB
-
memory/3000-92-0x000000013FF60000-0x00000001402B4000-memory.dmpFilesize
3.3MB
-
memory/3000-159-0x000000013FF60000-0x00000001402B4000-memory.dmpFilesize
3.3MB
-
memory/3036-148-0x000000013F830000-0x000000013FB84000-memory.dmpFilesize
3.3MB
-
memory/3036-17-0x000000013F830000-0x000000013FB84000-memory.dmpFilesize
3.3MB