Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 08:34
Behavioral task
behavioral1
Sample
2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240611-en
General
-
Target
2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
bf60ad052d5f63d8736b1912510dd97b
-
SHA1
ed691bccd2df3615b232dbcbbe13e9a4db4a52bc
-
SHA256
1464a8ba6974bad190976248944b5944f9cfe193e65f55d0a64105d980aa76fd
-
SHA512
3f6093ccdba2008c647a227d3a20a46e654819d3fb3f391c36029fb9d7ff28954caee77d1b19c3c217c8df67b0f86caf89257a351d2150ced8e5d872803ea70c
-
SSDEEP
98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lUg:Q+856utgpPF8u/7g
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\eHznHEh.exe cobalt_reflective_dll \Windows\system\DbgMBXX.exe cobalt_reflective_dll C:\Windows\system\AmIyOeC.exe cobalt_reflective_dll C:\Windows\system\abrMSJj.exe cobalt_reflective_dll C:\Windows\system\KoFNVAE.exe cobalt_reflective_dll C:\Windows\system\WuRNXYp.exe cobalt_reflective_dll C:\Windows\system\viSILFz.exe cobalt_reflective_dll C:\Windows\system\ODvvDxb.exe cobalt_reflective_dll C:\Windows\system\AcfohZV.exe cobalt_reflective_dll C:\Windows\system\DcqJvgy.exe cobalt_reflective_dll \Windows\system\VKBfJwD.exe cobalt_reflective_dll C:\Windows\system\HQXispL.exe cobalt_reflective_dll C:\Windows\system\ZWbhnwp.exe cobalt_reflective_dll \Windows\system\UrNlbSS.exe cobalt_reflective_dll C:\Windows\system\sPAxfnm.exe cobalt_reflective_dll C:\Windows\system\cjgLRRQ.exe cobalt_reflective_dll C:\Windows\system\kzahflZ.exe cobalt_reflective_dll C:\Windows\system\HwfgJvK.exe cobalt_reflective_dll C:\Windows\system\xAhvOkk.exe cobalt_reflective_dll C:\Windows\system\zPCUVRH.exe cobalt_reflective_dll C:\Windows\system\swfOfSV.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule \Windows\system\eHznHEh.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\DbgMBXX.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\AmIyOeC.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\abrMSJj.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\KoFNVAE.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\WuRNXYp.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\viSILFz.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\ODvvDxb.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\AcfohZV.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\DcqJvgy.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\VKBfJwD.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\HQXispL.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\ZWbhnwp.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\UrNlbSS.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\sPAxfnm.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\cjgLRRQ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\kzahflZ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\HwfgJvK.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\xAhvOkk.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\zPCUVRH.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\swfOfSV.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 59 IoCs
Processes:
resource yara_rule behavioral1/memory/1876-1-0x000000013F2C0000-0x000000013F614000-memory.dmp UPX \Windows\system\eHznHEh.exe UPX behavioral1/memory/3012-9-0x000000013F670000-0x000000013F9C4000-memory.dmp UPX \Windows\system\DbgMBXX.exe UPX C:\Windows\system\AmIyOeC.exe UPX behavioral1/memory/2648-21-0x000000013F020000-0x000000013F374000-memory.dmp UPX behavioral1/memory/2556-19-0x000000013FF10000-0x0000000140264000-memory.dmp UPX C:\Windows\system\abrMSJj.exe UPX C:\Windows\system\KoFNVAE.exe UPX C:\Windows\system\WuRNXYp.exe UPX C:\Windows\system\viSILFz.exe UPX C:\Windows\system\ODvvDxb.exe UPX C:\Windows\system\AcfohZV.exe UPX C:\Windows\system\DcqJvgy.exe UPX behavioral1/memory/2748-70-0x000000013F780000-0x000000013FAD4000-memory.dmp UPX behavioral1/memory/1836-83-0x000000013FAE0000-0x000000013FE34000-memory.dmp UPX behavioral1/memory/2752-75-0x000000013FA40000-0x000000013FD94000-memory.dmp UPX \Windows\system\VKBfJwD.exe UPX behavioral1/memory/1384-91-0x000000013FEE0000-0x0000000140234000-memory.dmp UPX behavioral1/memory/1420-97-0x000000013FC40000-0x000000013FF94000-memory.dmp UPX C:\Windows\system\HQXispL.exe UPX C:\Windows\system\ZWbhnwp.exe UPX \Windows\system\UrNlbSS.exe UPX C:\Windows\system\sPAxfnm.exe UPX C:\Windows\system\cjgLRRQ.exe UPX C:\Windows\system\kzahflZ.exe UPX behavioral1/memory/2648-103-0x000000013F020000-0x000000013F374000-memory.dmp UPX C:\Windows\system\HwfgJvK.exe UPX behavioral1/memory/3012-90-0x000000013F670000-0x000000013F9C4000-memory.dmp UPX C:\Windows\system\xAhvOkk.exe UPX C:\Windows\system\zPCUVRH.exe UPX behavioral1/memory/1876-74-0x000000013F2C0000-0x000000013F614000-memory.dmp UPX C:\Windows\system\swfOfSV.exe UPX behavioral1/memory/1964-63-0x000000013FCE0000-0x0000000140034000-memory.dmp UPX behavioral1/memory/2520-58-0x000000013F380000-0x000000013F6D4000-memory.dmp UPX behavioral1/memory/1968-56-0x000000013F480000-0x000000013F7D4000-memory.dmp UPX behavioral1/memory/2644-54-0x000000013F2C0000-0x000000013F614000-memory.dmp UPX behavioral1/memory/2568-52-0x000000013F970000-0x000000013FCC4000-memory.dmp UPX behavioral1/memory/2872-51-0x000000013F940000-0x000000013FC94000-memory.dmp UPX behavioral1/memory/1964-137-0x000000013FCE0000-0x0000000140034000-memory.dmp UPX behavioral1/memory/2748-138-0x000000013F780000-0x000000013FAD4000-memory.dmp UPX behavioral1/memory/2752-139-0x000000013FA40000-0x000000013FD94000-memory.dmp UPX behavioral1/memory/1836-140-0x000000013FAE0000-0x000000013FE34000-memory.dmp UPX behavioral1/memory/1384-141-0x000000013FEE0000-0x0000000140234000-memory.dmp UPX behavioral1/memory/1420-143-0x000000013FC40000-0x000000013FF94000-memory.dmp UPX behavioral1/memory/3012-145-0x000000013F670000-0x000000013F9C4000-memory.dmp UPX behavioral1/memory/2556-146-0x000000013FF10000-0x0000000140264000-memory.dmp UPX behavioral1/memory/2872-147-0x000000013F940000-0x000000013FC94000-memory.dmp UPX behavioral1/memory/2568-148-0x000000013F970000-0x000000013FCC4000-memory.dmp UPX behavioral1/memory/2644-149-0x000000013F2C0000-0x000000013F614000-memory.dmp UPX behavioral1/memory/2520-151-0x000000013F380000-0x000000013F6D4000-memory.dmp UPX behavioral1/memory/1968-150-0x000000013F480000-0x000000013F7D4000-memory.dmp UPX behavioral1/memory/2648-152-0x000000013F020000-0x000000013F374000-memory.dmp UPX behavioral1/memory/1964-153-0x000000013FCE0000-0x0000000140034000-memory.dmp UPX behavioral1/memory/2748-155-0x000000013F780000-0x000000013FAD4000-memory.dmp UPX behavioral1/memory/2752-154-0x000000013FA40000-0x000000013FD94000-memory.dmp UPX behavioral1/memory/1836-156-0x000000013FAE0000-0x000000013FE34000-memory.dmp UPX behavioral1/memory/1384-157-0x000000013FEE0000-0x0000000140234000-memory.dmp UPX behavioral1/memory/1420-158-0x000000013FC40000-0x000000013FF94000-memory.dmp UPX -
XMRig Miner payload 62 IoCs
Processes:
resource yara_rule behavioral1/memory/1876-1-0x000000013F2C0000-0x000000013F614000-memory.dmp xmrig \Windows\system\eHznHEh.exe xmrig behavioral1/memory/3012-9-0x000000013F670000-0x000000013F9C4000-memory.dmp xmrig \Windows\system\DbgMBXX.exe xmrig C:\Windows\system\AmIyOeC.exe xmrig behavioral1/memory/2648-21-0x000000013F020000-0x000000013F374000-memory.dmp xmrig behavioral1/memory/2556-19-0x000000013FF10000-0x0000000140264000-memory.dmp xmrig C:\Windows\system\abrMSJj.exe xmrig C:\Windows\system\KoFNVAE.exe xmrig C:\Windows\system\WuRNXYp.exe xmrig C:\Windows\system\viSILFz.exe xmrig C:\Windows\system\ODvvDxb.exe xmrig C:\Windows\system\AcfohZV.exe xmrig behavioral1/memory/1876-60-0x000000013FCE0000-0x0000000140034000-memory.dmp xmrig behavioral1/memory/1876-59-0x000000013F970000-0x000000013FCC4000-memory.dmp xmrig C:\Windows\system\DcqJvgy.exe xmrig behavioral1/memory/2748-70-0x000000013F780000-0x000000013FAD4000-memory.dmp xmrig behavioral1/memory/1836-83-0x000000013FAE0000-0x000000013FE34000-memory.dmp xmrig behavioral1/memory/2752-75-0x000000013FA40000-0x000000013FD94000-memory.dmp xmrig \Windows\system\VKBfJwD.exe xmrig behavioral1/memory/1384-91-0x000000013FEE0000-0x0000000140234000-memory.dmp xmrig behavioral1/memory/1420-97-0x000000013FC40000-0x000000013FF94000-memory.dmp xmrig C:\Windows\system\HQXispL.exe xmrig C:\Windows\system\ZWbhnwp.exe xmrig \Windows\system\UrNlbSS.exe xmrig C:\Windows\system\sPAxfnm.exe xmrig C:\Windows\system\cjgLRRQ.exe xmrig C:\Windows\system\kzahflZ.exe xmrig behavioral1/memory/2648-103-0x000000013F020000-0x000000013F374000-memory.dmp xmrig C:\Windows\system\HwfgJvK.exe xmrig behavioral1/memory/3012-90-0x000000013F670000-0x000000013F9C4000-memory.dmp xmrig C:\Windows\system\xAhvOkk.exe xmrig C:\Windows\system\zPCUVRH.exe xmrig behavioral1/memory/1876-74-0x000000013F2C0000-0x000000013F614000-memory.dmp xmrig C:\Windows\system\swfOfSV.exe xmrig behavioral1/memory/1964-63-0x000000013FCE0000-0x0000000140034000-memory.dmp xmrig behavioral1/memory/2520-58-0x000000013F380000-0x000000013F6D4000-memory.dmp xmrig behavioral1/memory/1968-56-0x000000013F480000-0x000000013F7D4000-memory.dmp xmrig behavioral1/memory/2644-54-0x000000013F2C0000-0x000000013F614000-memory.dmp xmrig behavioral1/memory/2568-52-0x000000013F970000-0x000000013FCC4000-memory.dmp xmrig behavioral1/memory/2872-51-0x000000013F940000-0x000000013FC94000-memory.dmp xmrig behavioral1/memory/1964-137-0x000000013FCE0000-0x0000000140034000-memory.dmp xmrig behavioral1/memory/2748-138-0x000000013F780000-0x000000013FAD4000-memory.dmp xmrig behavioral1/memory/2752-139-0x000000013FA40000-0x000000013FD94000-memory.dmp xmrig behavioral1/memory/1836-140-0x000000013FAE0000-0x000000013FE34000-memory.dmp xmrig behavioral1/memory/1384-141-0x000000013FEE0000-0x0000000140234000-memory.dmp xmrig behavioral1/memory/1420-143-0x000000013FC40000-0x000000013FF94000-memory.dmp xmrig behavioral1/memory/1876-144-0x0000000002330000-0x0000000002684000-memory.dmp xmrig behavioral1/memory/3012-145-0x000000013F670000-0x000000013F9C4000-memory.dmp xmrig behavioral1/memory/2556-146-0x000000013FF10000-0x0000000140264000-memory.dmp xmrig behavioral1/memory/2872-147-0x000000013F940000-0x000000013FC94000-memory.dmp xmrig behavioral1/memory/2568-148-0x000000013F970000-0x000000013FCC4000-memory.dmp xmrig behavioral1/memory/2644-149-0x000000013F2C0000-0x000000013F614000-memory.dmp xmrig behavioral1/memory/2520-151-0x000000013F380000-0x000000013F6D4000-memory.dmp xmrig behavioral1/memory/1968-150-0x000000013F480000-0x000000013F7D4000-memory.dmp xmrig behavioral1/memory/2648-152-0x000000013F020000-0x000000013F374000-memory.dmp xmrig behavioral1/memory/1964-153-0x000000013FCE0000-0x0000000140034000-memory.dmp xmrig behavioral1/memory/2748-155-0x000000013F780000-0x000000013FAD4000-memory.dmp xmrig behavioral1/memory/2752-154-0x000000013FA40000-0x000000013FD94000-memory.dmp xmrig behavioral1/memory/1836-156-0x000000013FAE0000-0x000000013FE34000-memory.dmp xmrig behavioral1/memory/1384-157-0x000000013FEE0000-0x0000000140234000-memory.dmp xmrig behavioral1/memory/1420-158-0x000000013FC40000-0x000000013FF94000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
eHznHEh.exeDbgMBXX.exeAmIyOeC.exeabrMSJj.exeODvvDxb.exeviSILFz.exeWuRNXYp.exeKoFNVAE.exeAcfohZV.exeDcqJvgy.exeswfOfSV.exezPCUVRH.exeVKBfJwD.exexAhvOkk.exeHwfgJvK.exeHQXispL.exekzahflZ.execjgLRRQ.exeZWbhnwp.exesPAxfnm.exeUrNlbSS.exepid process 3012 eHznHEh.exe 2556 DbgMBXX.exe 2648 AmIyOeC.exe 2872 abrMSJj.exe 2568 ODvvDxb.exe 2644 viSILFz.exe 1968 WuRNXYp.exe 2520 KoFNVAE.exe 1964 AcfohZV.exe 2748 DcqJvgy.exe 2752 swfOfSV.exe 1836 zPCUVRH.exe 1384 VKBfJwD.exe 1420 xAhvOkk.exe 2460 HwfgJvK.exe 1216 HQXispL.exe 564 kzahflZ.exe 1416 cjgLRRQ.exe 2664 ZWbhnwp.exe 2764 sPAxfnm.exe 1560 UrNlbSS.exe -
Loads dropped DLL 21 IoCs
Processes:
2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exepid process 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe -
Processes:
resource yara_rule behavioral1/memory/1876-1-0x000000013F2C0000-0x000000013F614000-memory.dmp upx \Windows\system\eHznHEh.exe upx behavioral1/memory/3012-9-0x000000013F670000-0x000000013F9C4000-memory.dmp upx \Windows\system\DbgMBXX.exe upx C:\Windows\system\AmIyOeC.exe upx behavioral1/memory/2648-21-0x000000013F020000-0x000000013F374000-memory.dmp upx behavioral1/memory/2556-19-0x000000013FF10000-0x0000000140264000-memory.dmp upx C:\Windows\system\abrMSJj.exe upx C:\Windows\system\KoFNVAE.exe upx C:\Windows\system\WuRNXYp.exe upx C:\Windows\system\viSILFz.exe upx C:\Windows\system\ODvvDxb.exe upx C:\Windows\system\AcfohZV.exe upx C:\Windows\system\DcqJvgy.exe upx behavioral1/memory/2748-70-0x000000013F780000-0x000000013FAD4000-memory.dmp upx behavioral1/memory/1836-83-0x000000013FAE0000-0x000000013FE34000-memory.dmp upx behavioral1/memory/2752-75-0x000000013FA40000-0x000000013FD94000-memory.dmp upx \Windows\system\VKBfJwD.exe upx behavioral1/memory/1384-91-0x000000013FEE0000-0x0000000140234000-memory.dmp upx behavioral1/memory/1420-97-0x000000013FC40000-0x000000013FF94000-memory.dmp upx C:\Windows\system\HQXispL.exe upx C:\Windows\system\ZWbhnwp.exe upx \Windows\system\UrNlbSS.exe upx C:\Windows\system\sPAxfnm.exe upx C:\Windows\system\cjgLRRQ.exe upx C:\Windows\system\kzahflZ.exe upx behavioral1/memory/2648-103-0x000000013F020000-0x000000013F374000-memory.dmp upx C:\Windows\system\HwfgJvK.exe upx behavioral1/memory/3012-90-0x000000013F670000-0x000000013F9C4000-memory.dmp upx C:\Windows\system\xAhvOkk.exe upx C:\Windows\system\zPCUVRH.exe upx behavioral1/memory/1876-74-0x000000013F2C0000-0x000000013F614000-memory.dmp upx C:\Windows\system\swfOfSV.exe upx behavioral1/memory/1964-63-0x000000013FCE0000-0x0000000140034000-memory.dmp upx behavioral1/memory/2520-58-0x000000013F380000-0x000000013F6D4000-memory.dmp upx behavioral1/memory/1968-56-0x000000013F480000-0x000000013F7D4000-memory.dmp upx behavioral1/memory/2644-54-0x000000013F2C0000-0x000000013F614000-memory.dmp upx behavioral1/memory/2568-52-0x000000013F970000-0x000000013FCC4000-memory.dmp upx behavioral1/memory/2872-51-0x000000013F940000-0x000000013FC94000-memory.dmp upx behavioral1/memory/1964-137-0x000000013FCE0000-0x0000000140034000-memory.dmp upx behavioral1/memory/2748-138-0x000000013F780000-0x000000013FAD4000-memory.dmp upx behavioral1/memory/2752-139-0x000000013FA40000-0x000000013FD94000-memory.dmp upx behavioral1/memory/1836-140-0x000000013FAE0000-0x000000013FE34000-memory.dmp upx behavioral1/memory/1384-141-0x000000013FEE0000-0x0000000140234000-memory.dmp upx behavioral1/memory/1420-143-0x000000013FC40000-0x000000013FF94000-memory.dmp upx behavioral1/memory/3012-145-0x000000013F670000-0x000000013F9C4000-memory.dmp upx behavioral1/memory/2556-146-0x000000013FF10000-0x0000000140264000-memory.dmp upx behavioral1/memory/2872-147-0x000000013F940000-0x000000013FC94000-memory.dmp upx behavioral1/memory/2568-148-0x000000013F970000-0x000000013FCC4000-memory.dmp upx behavioral1/memory/2644-149-0x000000013F2C0000-0x000000013F614000-memory.dmp upx behavioral1/memory/2520-151-0x000000013F380000-0x000000013F6D4000-memory.dmp upx behavioral1/memory/1968-150-0x000000013F480000-0x000000013F7D4000-memory.dmp upx behavioral1/memory/2648-152-0x000000013F020000-0x000000013F374000-memory.dmp upx behavioral1/memory/1964-153-0x000000013FCE0000-0x0000000140034000-memory.dmp upx behavioral1/memory/2748-155-0x000000013F780000-0x000000013FAD4000-memory.dmp upx behavioral1/memory/2752-154-0x000000013FA40000-0x000000013FD94000-memory.dmp upx behavioral1/memory/1836-156-0x000000013FAE0000-0x000000013FE34000-memory.dmp upx behavioral1/memory/1384-157-0x000000013FEE0000-0x0000000140234000-memory.dmp upx behavioral1/memory/1420-158-0x000000013FC40000-0x000000013FF94000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exedescription ioc process File created C:\Windows\System\eHznHEh.exe 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\abrMSJj.exe 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\VKBfJwD.exe 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\xAhvOkk.exe 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\KoFNVAE.exe 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\AcfohZV.exe 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\DcqJvgy.exe 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\swfOfSV.exe 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\DbgMBXX.exe 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\AmIyOeC.exe 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\viSILFz.exe 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\WuRNXYp.exe 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\zPCUVRH.exe 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\UrNlbSS.exe 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ODvvDxb.exe 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\cjgLRRQ.exe 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ZWbhnwp.exe 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\sPAxfnm.exe 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\HwfgJvK.exe 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\HQXispL.exe 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\kzahflZ.exe 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process Token: SeLockMemoryPrivilege 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process target process PID 1876 wrote to memory of 3012 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe eHznHEh.exe PID 1876 wrote to memory of 3012 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe eHznHEh.exe PID 1876 wrote to memory of 3012 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe eHznHEh.exe PID 1876 wrote to memory of 2556 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe DbgMBXX.exe PID 1876 wrote to memory of 2556 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe DbgMBXX.exe PID 1876 wrote to memory of 2556 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe DbgMBXX.exe PID 1876 wrote to memory of 2648 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe AmIyOeC.exe PID 1876 wrote to memory of 2648 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe AmIyOeC.exe PID 1876 wrote to memory of 2648 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe AmIyOeC.exe PID 1876 wrote to memory of 2872 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe abrMSJj.exe PID 1876 wrote to memory of 2872 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe abrMSJj.exe PID 1876 wrote to memory of 2872 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe abrMSJj.exe PID 1876 wrote to memory of 2568 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe ODvvDxb.exe PID 1876 wrote to memory of 2568 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe ODvvDxb.exe PID 1876 wrote to memory of 2568 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe ODvvDxb.exe PID 1876 wrote to memory of 2644 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe viSILFz.exe PID 1876 wrote to memory of 2644 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe viSILFz.exe PID 1876 wrote to memory of 2644 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe viSILFz.exe PID 1876 wrote to memory of 1968 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe WuRNXYp.exe PID 1876 wrote to memory of 1968 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe WuRNXYp.exe PID 1876 wrote to memory of 1968 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe WuRNXYp.exe PID 1876 wrote to memory of 2520 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe KoFNVAE.exe PID 1876 wrote to memory of 2520 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe KoFNVAE.exe PID 1876 wrote to memory of 2520 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe KoFNVAE.exe PID 1876 wrote to memory of 1964 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe AcfohZV.exe PID 1876 wrote to memory of 1964 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe AcfohZV.exe PID 1876 wrote to memory of 1964 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe AcfohZV.exe PID 1876 wrote to memory of 2748 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe DcqJvgy.exe PID 1876 wrote to memory of 2748 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe DcqJvgy.exe PID 1876 wrote to memory of 2748 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe DcqJvgy.exe PID 1876 wrote to memory of 2752 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe swfOfSV.exe PID 1876 wrote to memory of 2752 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe swfOfSV.exe PID 1876 wrote to memory of 2752 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe swfOfSV.exe PID 1876 wrote to memory of 1836 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe zPCUVRH.exe PID 1876 wrote to memory of 1836 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe zPCUVRH.exe PID 1876 wrote to memory of 1836 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe zPCUVRH.exe PID 1876 wrote to memory of 1384 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe VKBfJwD.exe PID 1876 wrote to memory of 1384 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe VKBfJwD.exe PID 1876 wrote to memory of 1384 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe VKBfJwD.exe PID 1876 wrote to memory of 1420 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe xAhvOkk.exe PID 1876 wrote to memory of 1420 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe xAhvOkk.exe PID 1876 wrote to memory of 1420 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe xAhvOkk.exe PID 1876 wrote to memory of 2460 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe HwfgJvK.exe PID 1876 wrote to memory of 2460 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe HwfgJvK.exe PID 1876 wrote to memory of 2460 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe HwfgJvK.exe PID 1876 wrote to memory of 1216 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe HQXispL.exe PID 1876 wrote to memory of 1216 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe HQXispL.exe PID 1876 wrote to memory of 1216 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe HQXispL.exe PID 1876 wrote to memory of 564 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe kzahflZ.exe PID 1876 wrote to memory of 564 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe kzahflZ.exe PID 1876 wrote to memory of 564 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe kzahflZ.exe PID 1876 wrote to memory of 1416 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe cjgLRRQ.exe PID 1876 wrote to memory of 1416 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe cjgLRRQ.exe PID 1876 wrote to memory of 1416 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe cjgLRRQ.exe PID 1876 wrote to memory of 2664 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe ZWbhnwp.exe PID 1876 wrote to memory of 2664 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe ZWbhnwp.exe PID 1876 wrote to memory of 2664 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe ZWbhnwp.exe PID 1876 wrote to memory of 2764 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe sPAxfnm.exe PID 1876 wrote to memory of 2764 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe sPAxfnm.exe PID 1876 wrote to memory of 2764 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe sPAxfnm.exe PID 1876 wrote to memory of 1560 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe UrNlbSS.exe PID 1876 wrote to memory of 1560 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe UrNlbSS.exe PID 1876 wrote to memory of 1560 1876 2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe UrNlbSS.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-24_bf60ad052d5f63d8736b1912510dd97b_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\eHznHEh.exeC:\Windows\System\eHznHEh.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\DbgMBXX.exeC:\Windows\System\DbgMBXX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\AmIyOeC.exeC:\Windows\System\AmIyOeC.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\abrMSJj.exeC:\Windows\System\abrMSJj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ODvvDxb.exeC:\Windows\System\ODvvDxb.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\viSILFz.exeC:\Windows\System\viSILFz.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\WuRNXYp.exeC:\Windows\System\WuRNXYp.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\KoFNVAE.exeC:\Windows\System\KoFNVAE.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\AcfohZV.exeC:\Windows\System\AcfohZV.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\DcqJvgy.exeC:\Windows\System\DcqJvgy.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\swfOfSV.exeC:\Windows\System\swfOfSV.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zPCUVRH.exeC:\Windows\System\zPCUVRH.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\VKBfJwD.exeC:\Windows\System\VKBfJwD.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\xAhvOkk.exeC:\Windows\System\xAhvOkk.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\HwfgJvK.exeC:\Windows\System\HwfgJvK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\HQXispL.exeC:\Windows\System\HQXispL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\kzahflZ.exeC:\Windows\System\kzahflZ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\cjgLRRQ.exeC:\Windows\System\cjgLRRQ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ZWbhnwp.exeC:\Windows\System\ZWbhnwp.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\sPAxfnm.exeC:\Windows\System\sPAxfnm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\UrNlbSS.exeC:\Windows\System\UrNlbSS.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\AcfohZV.exeFilesize
5.9MB
MD5d1bd33a1c5df358b5e58ad8f3fc779f1
SHA173ca6bb74393f3377d1c4f889c1fb4b03a493d28
SHA25684fa4423b9368d43308a593320c78095985afb2e61c8df60bb606ee2097a37ca
SHA51286dfd66a3fc2ae4611e311bc9566ba3a4f2abfe2ebce6c443fa58d9d75c5690f66b147b2bbb23e8abb7a1d7c54db0ea1157f59247e414ae0f0f9252afc33c318
-
C:\Windows\system\AmIyOeC.exeFilesize
5.9MB
MD5d16b59461a4c11df5a9a3053d1cea2f4
SHA1a9d132daf0a59b56ec09ecac17e13ebf00c54213
SHA2563a5ae5654c2d161a67b111338faa8e6976657da73a79c20dde66e6fc7678189c
SHA512f7f1f6deb56fdfe37885f396158f08d3628b8c3c73000ccbc44e34e841abff8aba98a5e756f8d5839dade993d894d3194e5c729faaa2b8ce50c22d2bbfcb53c9
-
C:\Windows\system\DcqJvgy.exeFilesize
5.9MB
MD5c78932bdc594c27c62d527441337cab7
SHA1754c9d413d168d6015313335e5c2ee7876e13d92
SHA256135d303eb425975d1f995fbd052ed77766843ef73c9d40725ff1efc39ddde845
SHA51269d6ac2dc65488cb149ee6abc6b5243f84b1a22cfde935421a22415815edbf7cf2da2cba27a8f164e9dea4cc0a69b7863173f09fed0860f8afc783987d6e4473
-
C:\Windows\system\HQXispL.exeFilesize
5.9MB
MD5532206247cab47bb2dfa9869359ea503
SHA12b250e5a5b97c7b20ea76c553723bf0949003e92
SHA256bf4ac6281463e58e7f15dc707de339ba4aa4f7e7dd3fa540aaee3dabf622673c
SHA512667771651de9abc89039c18ac9d713533abc346576a2162ff90c4e0b19c4f6fe32e5500676c00443cc81ca62110fc005b5c765164a6e3b8a8a2cdab6a6b5464c
-
C:\Windows\system\HwfgJvK.exeFilesize
5.9MB
MD579131e2784732d3611ff6187d2d9a07b
SHA149a5eac3634cf3f9532db302444fbfdd0060cdfa
SHA25632d6031cd33db4e636ab833012a7c9f0971d76369d34685195772a35d57d453a
SHA5123a4e6f5387796c03689b51dc3cab36c67fd9bf3be04727b237575211beb2ebd718a5fd5d52adea118d0584287ff0fd1990aa0a6f88a1bf8f208f544cf540b7bb
-
C:\Windows\system\KoFNVAE.exeFilesize
5.9MB
MD531b5926ba011e287d8cb4495f2f96e0b
SHA1dc92f0e2e1e254965bed4b06708deff2e74dab29
SHA256d5519a3a88a64bc944dfe33e126ea96769ae71e4349fa541f9025455c5d4ab9c
SHA512bc2a35db3b3d70d01cad66b6ccb75da907175458598990b5806541dffe750686f4a2af270b76e9fe77ec05049ad65cb3f103ee925402261ebf0f6c80a833a4c2
-
C:\Windows\system\ODvvDxb.exeFilesize
5.9MB
MD5c48cca7aee437c9f0ae2d2beef7b5791
SHA15e1bd1958cc58a85ad83c10013b6b118b40da7b8
SHA256a2aaac488752321db0eeb2c65717c15d1f1514273f395992221b42d4d1fa909a
SHA51230c4699c0095673f40b0d68427cb8405b340487768704b671944865ea2c94bb6db46909ef37eebc0742920364a2d3b7056c667a36d72a556f3395819d0f174f2
-
C:\Windows\system\WuRNXYp.exeFilesize
5.9MB
MD5f4dca409947b20f5f05f55ea73af5d49
SHA1c86f3d2aaad4faccdb6a77f6f272332debeff703
SHA256da8e0d0d76ada5bcf45150651037f5157ace97d0c9ec25aafa636ad209dafaf3
SHA512cc298a69075d59c3733dc30f653351202ad0851a1148d6accd27b24eb8f68e33b7b0ab10a1b88a8f44ef3088807ae00c5975a38c2733fab689e2a8b070784d61
-
C:\Windows\system\ZWbhnwp.exeFilesize
5.9MB
MD55276fa2babd29d2f4ed4990e94e171fa
SHA1ebe063f33bd8c879986baa67612e5f3dae03721e
SHA2566892ab2a9384e1ab7d9bdedc9a3845c5d0c4e98d024ee5fcc860cdc3deb99c52
SHA5129cb8172f6fe80ead1545f72d076ffca89a93c67517df74913edbe713d7e982126fbf06c7ba04fdbca5171ec3c13fe35f927f1d9ec3a01fcdb5673ef0877049b2
-
C:\Windows\system\abrMSJj.exeFilesize
5.9MB
MD5d6d41e4e4ca671e7ff970b1e41f25609
SHA142e41ae68625a56e7ae3aba0cb760a6f9e070163
SHA256e988e3b1882af09315a319e66937018f5edcc8a5fdf584dda3255782f2a25d8f
SHA512d2cf83cfec916e493b95f30b8fa97ec8a9eb903b66b0fe726aa8820f3c2fb0d72906c6b3f636572e9ab3736803649ce9b4b5346e1bea3d3d78e44a7b7e5a86d8
-
C:\Windows\system\cjgLRRQ.exeFilesize
5.9MB
MD5a1756e5a8c518018461dc8dc9a0a77aa
SHA1dedeb095e99630488ea8526500b6f706675a1c6a
SHA2560da8e4e7d20485ff0cd70184ee878a5253b1cdab84b05964c34be14b7dfa2567
SHA512a300a4b4b4c2a91366f0f401561066568b52ef773638ad687414a70098b63395e2b34c14bff32b84135f8459c03341914491b645047635aca29c93e0653514b7
-
C:\Windows\system\kzahflZ.exeFilesize
5.9MB
MD51bda18d9aa8d7ddaa2b35016b6d7bc6b
SHA1cae83efcd7abddcb62613fbc7f8d530c56b82c78
SHA256f35db4c9a2f7520af2e077642d57c91ed731f75fc39672219cd85cb361c6df1e
SHA5122a42e375cd568ed57da94fb846f64606a157c26cbc7f8fae9591418c9732fe424555cbe8cd34382fb551ad1224495d89e03cb1dbf6cc60bade989b842dc612c1
-
C:\Windows\system\sPAxfnm.exeFilesize
5.9MB
MD5da7aeeccc8c90bc327a223fd5ca2cc69
SHA139fa9c369edad69ab824451fc1debc5ab567461e
SHA2561af2e3bf24ddaac0d766c6830db0eb1d887a4339a00ded6a66c057db163f9402
SHA5120f85b400fdfd0d130a0037a388692f8466c31ce242f93cf83cf2ebd74ab45f33972068577e2ee003e422eef1eb4bedac1effc4a47a45c32f0ee796b146c9a1f4
-
C:\Windows\system\swfOfSV.exeFilesize
5.9MB
MD5bf87b843ccbb8ddbe923b4d1fbdbbb83
SHA1b75bae812ffbae268802ee37b6a663dc2c9230cd
SHA2567820c785ccfe83e2c40d0610b08898237d6dbedfbc172bacf08e64c170d1b880
SHA5127f17f3d6c6d8e75068e4cc6f1d76a03573a08c12fec596993f4aa6b78bf6c42d9cfb0259fead27c11ddd56bb241dc1222b7a26beed2eaa76c9a2cc2eb776cad6
-
C:\Windows\system\viSILFz.exeFilesize
5.9MB
MD5c1b8793cf2df0fa75e428eff23c390fd
SHA1d62a72d5cdfdea53d64c1b76f54d854f551a60a8
SHA256d355767c345c259428713115481cffecf0feab28481e519423762c1a5d003cdb
SHA51256e9aeb67cd6bc7ebfefd3118513eaa9231d96bf03a805fe8224c22793f1281ae1ded437b4d1cc49b7b0dc5254e85b64e482e294387eaf89617b3ee3d67749b1
-
C:\Windows\system\xAhvOkk.exeFilesize
5.9MB
MD5656c513213ec19897d9b6fa72defda60
SHA139cfcf42d4c4c27872424bb53ecd9c31aa35cf22
SHA25633d667d59246e7149628a80fb840b7b28e4aee8da73ecab7b4c7e2aa2c5ee006
SHA512b5d384cc432c5915f27bb9205aeb4b16ddecbec59583e1ccc630f3964c6ed60303d4f19ca28971ceeb89e6c147a76af5db60a440ea1f613d3db53e5c62b5fd64
-
C:\Windows\system\zPCUVRH.exeFilesize
5.9MB
MD5aba4ffd05793af63f6637fb4c27f2e55
SHA1d0fc886b9349c62706e9df91c146ee1206139d76
SHA256b2e526ec1f5cc096a26010df442ef51c4fc501a44b3fe3ce755ba8e17bbd38ec
SHA512ccd2c6c03b3d24ed97460e6db8f6ee38892e3dc813a61b39705971c96a921cced7f9f20b56155e3753c2a611e8358b61aa43919a1c52d484b5ce8d2e9e037b63
-
\Windows\system\DbgMBXX.exeFilesize
5.9MB
MD505e4b55f569acb14a37baf8b3a0c1815
SHA1114e1501e8e71c2813d2fd91554f77a83ce6f6ff
SHA2565e468fe91b1f15eea61ef46d8113ed3912fa8a714c5d31485a331442a9a09a7d
SHA51201acccdb1f1a145befd45e0b6068e7b36f6740a4f068608cd8686d2a5185a97b4acf9fe15e7ce8eddd2ed78d4d1ae52baf0ffc8fac71000de6a9e4249b8403fd
-
\Windows\system\UrNlbSS.exeFilesize
5.9MB
MD5dd002c51ea759d71ba0a07aaf42d4e7b
SHA1c883268c32d9b5cba7ee765b45119ffdddb85aea
SHA2564b3f71059fad146dc39f84e8f0f75daa7026a2a23b566072255f027c270bcd41
SHA5124a1693845ad8cd3834ea45a962a35acde6877171d4716cfb4a433b4595e775f6c300263612c9e42c89332675b68ae6c40bf39a922846c35eee93e0a33bb163aa
-
\Windows\system\VKBfJwD.exeFilesize
5.9MB
MD569bde764ba09fa3cf7bc2fda162e9095
SHA17b1d37ceecec06809ec188badbfd35b5cf50cb0d
SHA256c4e23cf1c19cafa74f9f4d1132537baeae67258607eba0696a2218e68d4c7bcd
SHA512549f384886388e82a23c21c54e4948a2db9080edf5378d03f2425faba4180c5f3b03a6b82e5898ed66d15c414a109bc9765bb8da4e9faa51ce1d055381e24cd7
-
\Windows\system\eHznHEh.exeFilesize
5.9MB
MD5231921b2e2fd31b0a85324e566d5e6cb
SHA148c53f49781008c3761bc054f1f25b8ccf059eb3
SHA2565e9975758a62e8c8d432112a325fe3c1d82ef40c6aa714edd1b9aff925c6d05b
SHA5122563eea04080c630e7ce0ce6af5d8b2a5f90762ed142d68b50745aa08ec8e6c2bfe082705289bf37d458b902fff088f6039e3836b0eca8b48f2b527ea3a5654a
-
memory/1384-157-0x000000013FEE0000-0x0000000140234000-memory.dmpFilesize
3.3MB
-
memory/1384-91-0x000000013FEE0000-0x0000000140234000-memory.dmpFilesize
3.3MB
-
memory/1384-141-0x000000013FEE0000-0x0000000140234000-memory.dmpFilesize
3.3MB
-
memory/1420-143-0x000000013FC40000-0x000000013FF94000-memory.dmpFilesize
3.3MB
-
memory/1420-97-0x000000013FC40000-0x000000013FF94000-memory.dmpFilesize
3.3MB
-
memory/1420-158-0x000000013FC40000-0x000000013FF94000-memory.dmpFilesize
3.3MB
-
memory/1836-156-0x000000013FAE0000-0x000000013FE34000-memory.dmpFilesize
3.3MB
-
memory/1836-83-0x000000013FAE0000-0x000000013FE34000-memory.dmpFilesize
3.3MB
-
memory/1836-140-0x000000013FAE0000-0x000000013FE34000-memory.dmpFilesize
3.3MB
-
memory/1876-96-0x000000013FC40000-0x000000013FF94000-memory.dmpFilesize
3.3MB
-
memory/1876-53-0x0000000002330000-0x0000000002684000-memory.dmpFilesize
3.3MB
-
memory/1876-69-0x000000013F780000-0x000000013FAD4000-memory.dmpFilesize
3.3MB
-
memory/1876-104-0x0000000002330000-0x0000000002684000-memory.dmpFilesize
3.3MB
-
memory/1876-1-0x000000013F2C0000-0x000000013F614000-memory.dmpFilesize
3.3MB
-
memory/1876-6-0x000000013F670000-0x000000013F9C4000-memory.dmpFilesize
3.3MB
-
memory/1876-0-0x00000000001F0000-0x0000000000200000-memory.dmpFilesize
64KB
-
memory/1876-144-0x0000000002330000-0x0000000002684000-memory.dmpFilesize
3.3MB
-
memory/1876-59-0x000000013F970000-0x000000013FCC4000-memory.dmpFilesize
3.3MB
-
memory/1876-82-0x000000013FAE0000-0x000000013FE34000-memory.dmpFilesize
3.3MB
-
memory/1876-60-0x000000013FCE0000-0x0000000140034000-memory.dmpFilesize
3.3MB
-
memory/1876-74-0x000000013F2C0000-0x000000013F614000-memory.dmpFilesize
3.3MB
-
memory/1876-48-0x000000013F940000-0x000000013FC94000-memory.dmpFilesize
3.3MB
-
memory/1876-142-0x000000013FC40000-0x000000013FF94000-memory.dmpFilesize
3.3MB
-
memory/1876-17-0x000000013FF10000-0x0000000140264000-memory.dmpFilesize
3.3MB
-
memory/1876-57-0x0000000002330000-0x0000000002684000-memory.dmpFilesize
3.3MB
-
memory/1876-136-0x000000013FCE0000-0x0000000140034000-memory.dmpFilesize
3.3MB
-
memory/1876-55-0x0000000002330000-0x0000000002684000-memory.dmpFilesize
3.3MB
-
memory/1964-137-0x000000013FCE0000-0x0000000140034000-memory.dmpFilesize
3.3MB
-
memory/1964-153-0x000000013FCE0000-0x0000000140034000-memory.dmpFilesize
3.3MB
-
memory/1964-63-0x000000013FCE0000-0x0000000140034000-memory.dmpFilesize
3.3MB
-
memory/1968-56-0x000000013F480000-0x000000013F7D4000-memory.dmpFilesize
3.3MB
-
memory/1968-150-0x000000013F480000-0x000000013F7D4000-memory.dmpFilesize
3.3MB
-
memory/2520-58-0x000000013F380000-0x000000013F6D4000-memory.dmpFilesize
3.3MB
-
memory/2520-151-0x000000013F380000-0x000000013F6D4000-memory.dmpFilesize
3.3MB
-
memory/2556-19-0x000000013FF10000-0x0000000140264000-memory.dmpFilesize
3.3MB
-
memory/2556-146-0x000000013FF10000-0x0000000140264000-memory.dmpFilesize
3.3MB
-
memory/2568-148-0x000000013F970000-0x000000013FCC4000-memory.dmpFilesize
3.3MB
-
memory/2568-52-0x000000013F970000-0x000000013FCC4000-memory.dmpFilesize
3.3MB
-
memory/2644-54-0x000000013F2C0000-0x000000013F614000-memory.dmpFilesize
3.3MB
-
memory/2644-149-0x000000013F2C0000-0x000000013F614000-memory.dmpFilesize
3.3MB
-
memory/2648-21-0x000000013F020000-0x000000013F374000-memory.dmpFilesize
3.3MB
-
memory/2648-103-0x000000013F020000-0x000000013F374000-memory.dmpFilesize
3.3MB
-
memory/2648-152-0x000000013F020000-0x000000013F374000-memory.dmpFilesize
3.3MB
-
memory/2748-138-0x000000013F780000-0x000000013FAD4000-memory.dmpFilesize
3.3MB
-
memory/2748-70-0x000000013F780000-0x000000013FAD4000-memory.dmpFilesize
3.3MB
-
memory/2748-155-0x000000013F780000-0x000000013FAD4000-memory.dmpFilesize
3.3MB
-
memory/2752-139-0x000000013FA40000-0x000000013FD94000-memory.dmpFilesize
3.3MB
-
memory/2752-154-0x000000013FA40000-0x000000013FD94000-memory.dmpFilesize
3.3MB
-
memory/2752-75-0x000000013FA40000-0x000000013FD94000-memory.dmpFilesize
3.3MB
-
memory/2872-147-0x000000013F940000-0x000000013FC94000-memory.dmpFilesize
3.3MB
-
memory/2872-51-0x000000013F940000-0x000000013FC94000-memory.dmpFilesize
3.3MB
-
memory/3012-145-0x000000013F670000-0x000000013F9C4000-memory.dmpFilesize
3.3MB
-
memory/3012-90-0x000000013F670000-0x000000013F9C4000-memory.dmpFilesize
3.3MB
-
memory/3012-9-0x000000013F670000-0x000000013F9C4000-memory.dmpFilesize
3.3MB