Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 08:36
Behavioral task
behavioral1
Sample
2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240419-en
General
-
Target
2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
d735d5a6f1e7e9b55d5834735e6c334b
-
SHA1
40ec2a450eeca239811475e6367f387643f247f5
-
SHA256
e6473b57c00e9b1ced4a5d0a68a4a18e29401b2c4d467d3b65732523c99edb29
-
SHA512
531ab7f62e55262dffa5ed87d4aa6f23c9b6da8e9f02f465647a18558b0c5d0800c844864ca62d128c74c68f1e63794ec36ec7ff71219dda9960e6e416693260
-
SSDEEP
98304:BemTLkNdfE0pZrT56utgpPFotBER/mQ32lU6:Q+u56utgpPF8u/76
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\wOGsURp.exe cobalt_reflective_dll \Windows\system\wLjzUDy.exe cobalt_reflective_dll C:\Windows\system\eZdRhAZ.exe cobalt_reflective_dll C:\Windows\system\RhBYuqQ.exe cobalt_reflective_dll C:\Windows\system\WqxWlUk.exe cobalt_reflective_dll C:\Windows\system\jorKSHk.exe cobalt_reflective_dll C:\Windows\system\zcXXThb.exe cobalt_reflective_dll C:\Windows\system\uXITNIa.exe cobalt_reflective_dll C:\Windows\system\VzfoOGm.exe cobalt_reflective_dll C:\Windows\system\wSDspkc.exe cobalt_reflective_dll C:\Windows\system\FUFlOfa.exe cobalt_reflective_dll \Windows\system\dOsiBSp.exe cobalt_reflective_dll C:\Windows\system\NUeXzwa.exe cobalt_reflective_dll C:\Windows\system\aZZNrXn.exe cobalt_reflective_dll C:\Windows\system\yCwtEsv.exe cobalt_reflective_dll C:\Windows\system\hYuCEIG.exe cobalt_reflective_dll C:\Windows\system\TEVuyne.exe cobalt_reflective_dll C:\Windows\system\CCWfZjs.exe cobalt_reflective_dll C:\Windows\system\oexAqLs.exe cobalt_reflective_dll C:\Windows\system\VebEFaL.exe cobalt_reflective_dll C:\Windows\system\HXAymbF.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule \Windows\system\wOGsURp.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\wLjzUDy.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\eZdRhAZ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\RhBYuqQ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\WqxWlUk.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\jorKSHk.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\zcXXThb.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\uXITNIa.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\VzfoOGm.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\wSDspkc.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\FUFlOfa.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\dOsiBSp.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\NUeXzwa.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\aZZNrXn.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\yCwtEsv.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\hYuCEIG.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\TEVuyne.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\CCWfZjs.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\oexAqLs.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\VebEFaL.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\HXAymbF.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 58 IoCs
Processes:
resource yara_rule behavioral1/memory/2396-0-0x000000013FE00000-0x0000000140154000-memory.dmp UPX behavioral1/memory/2396-8-0x0000000002390000-0x00000000026E4000-memory.dmp UPX \Windows\system\wOGsURp.exe UPX \Windows\system\wLjzUDy.exe UPX behavioral1/memory/2856-16-0x000000013FC00000-0x000000013FF54000-memory.dmp UPX behavioral1/memory/2768-22-0x000000013F230000-0x000000013F584000-memory.dmp UPX behavioral1/memory/2084-20-0x000000013FFA0000-0x00000001402F4000-memory.dmp UPX C:\Windows\system\eZdRhAZ.exe UPX C:\Windows\system\RhBYuqQ.exe UPX behavioral1/memory/2692-29-0x000000013F310000-0x000000013F664000-memory.dmp UPX C:\Windows\system\WqxWlUk.exe UPX C:\Windows\system\jorKSHk.exe UPX behavioral1/memory/2872-36-0x000000013FE70000-0x00000001401C4000-memory.dmp UPX behavioral1/memory/2648-42-0x000000013FAA0000-0x000000013FDF4000-memory.dmp UPX C:\Windows\system\zcXXThb.exe UPX C:\Windows\system\uXITNIa.exe UPX behavioral1/memory/2948-69-0x000000013F9E0000-0x000000013FD34000-memory.dmp UPX C:\Windows\system\VzfoOGm.exe UPX behavioral1/memory/2556-86-0x000000013F860000-0x000000013FBB4000-memory.dmp UPX C:\Windows\system\wSDspkc.exe UPX C:\Windows\system\FUFlOfa.exe UPX \Windows\system\dOsiBSp.exe UPX C:\Windows\system\NUeXzwa.exe UPX C:\Windows\system\aZZNrXn.exe UPX C:\Windows\system\yCwtEsv.exe UPX C:\Windows\system\hYuCEIG.exe UPX behavioral1/memory/2648-103-0x000000013FAA0000-0x000000013FDF4000-memory.dmp UPX C:\Windows\system\TEVuyne.exe UPX behavioral1/memory/2832-99-0x000000013F430000-0x000000013F784000-memory.dmp UPX behavioral1/memory/2796-91-0x000000013F7E0000-0x000000013FB34000-memory.dmp UPX C:\Windows\system\CCWfZjs.exe UPX C:\Windows\system\oexAqLs.exe UPX behavioral1/memory/1044-78-0x000000013FCF0000-0x0000000140044000-memory.dmp UPX behavioral1/memory/2768-76-0x000000013F230000-0x000000013F584000-memory.dmp UPX C:\Windows\system\VebEFaL.exe UPX behavioral1/memory/2508-63-0x000000013FB10000-0x000000013FE64000-memory.dmp UPX behavioral1/memory/2600-57-0x000000013FE10000-0x0000000140164000-memory.dmp UPX behavioral1/memory/2980-50-0x000000013F100000-0x000000013F454000-memory.dmp UPX C:\Windows\system\HXAymbF.exe UPX behavioral1/memory/2396-47-0x000000013FE00000-0x0000000140154000-memory.dmp UPX behavioral1/memory/2508-137-0x000000013FB10000-0x000000013FE64000-memory.dmp UPX behavioral1/memory/2948-139-0x000000013F9E0000-0x000000013FD34000-memory.dmp UPX behavioral1/memory/1044-140-0x000000013FCF0000-0x0000000140044000-memory.dmp UPX behavioral1/memory/2796-143-0x000000013F7E0000-0x000000013FB34000-memory.dmp UPX behavioral1/memory/2856-146-0x000000013FC00000-0x000000013FF54000-memory.dmp UPX behavioral1/memory/2084-147-0x000000013FFA0000-0x00000001402F4000-memory.dmp UPX behavioral1/memory/2768-148-0x000000013F230000-0x000000013F584000-memory.dmp UPX behavioral1/memory/2692-149-0x000000013F310000-0x000000013F664000-memory.dmp UPX behavioral1/memory/2872-150-0x000000013FE70000-0x00000001401C4000-memory.dmp UPX behavioral1/memory/2648-151-0x000000013FAA0000-0x000000013FDF4000-memory.dmp UPX behavioral1/memory/2980-152-0x000000013F100000-0x000000013F454000-memory.dmp UPX behavioral1/memory/2600-153-0x000000013FE10000-0x0000000140164000-memory.dmp UPX behavioral1/memory/2508-154-0x000000013FB10000-0x000000013FE64000-memory.dmp UPX behavioral1/memory/2948-155-0x000000013F9E0000-0x000000013FD34000-memory.dmp UPX behavioral1/memory/1044-156-0x000000013FCF0000-0x0000000140044000-memory.dmp UPX behavioral1/memory/2556-157-0x000000013F860000-0x000000013FBB4000-memory.dmp UPX behavioral1/memory/2796-158-0x000000013F7E0000-0x000000013FB34000-memory.dmp UPX behavioral1/memory/2832-159-0x000000013F430000-0x000000013F784000-memory.dmp UPX -
XMRig Miner payload 60 IoCs
Processes:
resource yara_rule behavioral1/memory/2396-0-0x000000013FE00000-0x0000000140154000-memory.dmp xmrig behavioral1/memory/2396-8-0x0000000002390000-0x00000000026E4000-memory.dmp xmrig \Windows\system\wOGsURp.exe xmrig \Windows\system\wLjzUDy.exe xmrig behavioral1/memory/2856-16-0x000000013FC00000-0x000000013FF54000-memory.dmp xmrig behavioral1/memory/2768-22-0x000000013F230000-0x000000013F584000-memory.dmp xmrig behavioral1/memory/2084-20-0x000000013FFA0000-0x00000001402F4000-memory.dmp xmrig C:\Windows\system\eZdRhAZ.exe xmrig C:\Windows\system\RhBYuqQ.exe xmrig behavioral1/memory/2692-29-0x000000013F310000-0x000000013F664000-memory.dmp xmrig C:\Windows\system\WqxWlUk.exe xmrig C:\Windows\system\jorKSHk.exe xmrig behavioral1/memory/2872-36-0x000000013FE70000-0x00000001401C4000-memory.dmp xmrig behavioral1/memory/2648-42-0x000000013FAA0000-0x000000013FDF4000-memory.dmp xmrig C:\Windows\system\zcXXThb.exe xmrig C:\Windows\system\uXITNIa.exe xmrig behavioral1/memory/2948-69-0x000000013F9E0000-0x000000013FD34000-memory.dmp xmrig C:\Windows\system\VzfoOGm.exe xmrig behavioral1/memory/2556-86-0x000000013F860000-0x000000013FBB4000-memory.dmp xmrig C:\Windows\system\wSDspkc.exe xmrig C:\Windows\system\FUFlOfa.exe xmrig \Windows\system\dOsiBSp.exe xmrig C:\Windows\system\NUeXzwa.exe xmrig C:\Windows\system\aZZNrXn.exe xmrig C:\Windows\system\yCwtEsv.exe xmrig C:\Windows\system\hYuCEIG.exe xmrig behavioral1/memory/2648-103-0x000000013FAA0000-0x000000013FDF4000-memory.dmp xmrig C:\Windows\system\TEVuyne.exe xmrig behavioral1/memory/2832-99-0x000000013F430000-0x000000013F784000-memory.dmp xmrig behavioral1/memory/2396-98-0x000000013F430000-0x000000013F784000-memory.dmp xmrig behavioral1/memory/2796-91-0x000000013F7E0000-0x000000013FB34000-memory.dmp xmrig C:\Windows\system\CCWfZjs.exe xmrig C:\Windows\system\oexAqLs.exe xmrig behavioral1/memory/1044-78-0x000000013FCF0000-0x0000000140044000-memory.dmp xmrig behavioral1/memory/2768-76-0x000000013F230000-0x000000013F584000-memory.dmp xmrig C:\Windows\system\VebEFaL.exe xmrig behavioral1/memory/2508-63-0x000000013FB10000-0x000000013FE64000-memory.dmp xmrig behavioral1/memory/2600-57-0x000000013FE10000-0x0000000140164000-memory.dmp xmrig behavioral1/memory/2396-56-0x0000000002390000-0x00000000026E4000-memory.dmp xmrig behavioral1/memory/2980-50-0x000000013F100000-0x000000013F454000-memory.dmp xmrig C:\Windows\system\HXAymbF.exe xmrig behavioral1/memory/2396-47-0x000000013FE00000-0x0000000140154000-memory.dmp xmrig behavioral1/memory/2508-137-0x000000013FB10000-0x000000013FE64000-memory.dmp xmrig behavioral1/memory/2948-139-0x000000013F9E0000-0x000000013FD34000-memory.dmp xmrig behavioral1/memory/1044-140-0x000000013FCF0000-0x0000000140044000-memory.dmp xmrig behavioral1/memory/2796-143-0x000000013F7E0000-0x000000013FB34000-memory.dmp xmrig behavioral1/memory/2856-146-0x000000013FC00000-0x000000013FF54000-memory.dmp xmrig behavioral1/memory/2084-147-0x000000013FFA0000-0x00000001402F4000-memory.dmp xmrig behavioral1/memory/2768-148-0x000000013F230000-0x000000013F584000-memory.dmp xmrig behavioral1/memory/2692-149-0x000000013F310000-0x000000013F664000-memory.dmp xmrig behavioral1/memory/2872-150-0x000000013FE70000-0x00000001401C4000-memory.dmp xmrig behavioral1/memory/2648-151-0x000000013FAA0000-0x000000013FDF4000-memory.dmp xmrig behavioral1/memory/2980-152-0x000000013F100000-0x000000013F454000-memory.dmp xmrig behavioral1/memory/2600-153-0x000000013FE10000-0x0000000140164000-memory.dmp xmrig behavioral1/memory/2508-154-0x000000013FB10000-0x000000013FE64000-memory.dmp xmrig behavioral1/memory/2948-155-0x000000013F9E0000-0x000000013FD34000-memory.dmp xmrig behavioral1/memory/1044-156-0x000000013FCF0000-0x0000000140044000-memory.dmp xmrig behavioral1/memory/2556-157-0x000000013F860000-0x000000013FBB4000-memory.dmp xmrig behavioral1/memory/2796-158-0x000000013F7E0000-0x000000013FB34000-memory.dmp xmrig behavioral1/memory/2832-159-0x000000013F430000-0x000000013F784000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
wOGsURp.exewLjzUDy.exeeZdRhAZ.exeRhBYuqQ.exeWqxWlUk.exejorKSHk.exeHXAymbF.exezcXXThb.exeuXITNIa.exeVebEFaL.exeVzfoOGm.exeoexAqLs.exeCCWfZjs.exewSDspkc.exeTEVuyne.exehYuCEIG.exeyCwtEsv.exeFUFlOfa.exeaZZNrXn.exeNUeXzwa.exedOsiBSp.exepid process 2856 wOGsURp.exe 2084 wLjzUDy.exe 2768 eZdRhAZ.exe 2692 RhBYuqQ.exe 2872 WqxWlUk.exe 2648 jorKSHk.exe 2980 HXAymbF.exe 2600 zcXXThb.exe 2508 uXITNIa.exe 2948 VebEFaL.exe 1044 VzfoOGm.exe 2556 oexAqLs.exe 2796 CCWfZjs.exe 2832 wSDspkc.exe 272 TEVuyne.exe 1328 hYuCEIG.exe 304 yCwtEsv.exe 1992 FUFlOfa.exe 2044 aZZNrXn.exe 2380 NUeXzwa.exe 1456 dOsiBSp.exe -
Loads dropped DLL 21 IoCs
Processes:
2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exepid process 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe -
Processes:
resource yara_rule behavioral1/memory/2396-0-0x000000013FE00000-0x0000000140154000-memory.dmp upx behavioral1/memory/2396-8-0x0000000002390000-0x00000000026E4000-memory.dmp upx \Windows\system\wOGsURp.exe upx \Windows\system\wLjzUDy.exe upx behavioral1/memory/2856-16-0x000000013FC00000-0x000000013FF54000-memory.dmp upx behavioral1/memory/2768-22-0x000000013F230000-0x000000013F584000-memory.dmp upx behavioral1/memory/2084-20-0x000000013FFA0000-0x00000001402F4000-memory.dmp upx C:\Windows\system\eZdRhAZ.exe upx C:\Windows\system\RhBYuqQ.exe upx behavioral1/memory/2692-29-0x000000013F310000-0x000000013F664000-memory.dmp upx C:\Windows\system\WqxWlUk.exe upx C:\Windows\system\jorKSHk.exe upx behavioral1/memory/2872-36-0x000000013FE70000-0x00000001401C4000-memory.dmp upx behavioral1/memory/2648-42-0x000000013FAA0000-0x000000013FDF4000-memory.dmp upx C:\Windows\system\zcXXThb.exe upx C:\Windows\system\uXITNIa.exe upx behavioral1/memory/2948-69-0x000000013F9E0000-0x000000013FD34000-memory.dmp upx C:\Windows\system\VzfoOGm.exe upx behavioral1/memory/2556-86-0x000000013F860000-0x000000013FBB4000-memory.dmp upx C:\Windows\system\wSDspkc.exe upx C:\Windows\system\FUFlOfa.exe upx \Windows\system\dOsiBSp.exe upx C:\Windows\system\NUeXzwa.exe upx C:\Windows\system\aZZNrXn.exe upx C:\Windows\system\yCwtEsv.exe upx C:\Windows\system\hYuCEIG.exe upx behavioral1/memory/2648-103-0x000000013FAA0000-0x000000013FDF4000-memory.dmp upx C:\Windows\system\TEVuyne.exe upx behavioral1/memory/2832-99-0x000000013F430000-0x000000013F784000-memory.dmp upx behavioral1/memory/2796-91-0x000000013F7E0000-0x000000013FB34000-memory.dmp upx C:\Windows\system\CCWfZjs.exe upx C:\Windows\system\oexAqLs.exe upx behavioral1/memory/1044-78-0x000000013FCF0000-0x0000000140044000-memory.dmp upx behavioral1/memory/2768-76-0x000000013F230000-0x000000013F584000-memory.dmp upx C:\Windows\system\VebEFaL.exe upx behavioral1/memory/2508-63-0x000000013FB10000-0x000000013FE64000-memory.dmp upx behavioral1/memory/2600-57-0x000000013FE10000-0x0000000140164000-memory.dmp upx behavioral1/memory/2980-50-0x000000013F100000-0x000000013F454000-memory.dmp upx C:\Windows\system\HXAymbF.exe upx behavioral1/memory/2396-47-0x000000013FE00000-0x0000000140154000-memory.dmp upx behavioral1/memory/2508-137-0x000000013FB10000-0x000000013FE64000-memory.dmp upx behavioral1/memory/2948-139-0x000000013F9E0000-0x000000013FD34000-memory.dmp upx behavioral1/memory/1044-140-0x000000013FCF0000-0x0000000140044000-memory.dmp upx behavioral1/memory/2796-143-0x000000013F7E0000-0x000000013FB34000-memory.dmp upx behavioral1/memory/2856-146-0x000000013FC00000-0x000000013FF54000-memory.dmp upx behavioral1/memory/2084-147-0x000000013FFA0000-0x00000001402F4000-memory.dmp upx behavioral1/memory/2768-148-0x000000013F230000-0x000000013F584000-memory.dmp upx behavioral1/memory/2692-149-0x000000013F310000-0x000000013F664000-memory.dmp upx behavioral1/memory/2872-150-0x000000013FE70000-0x00000001401C4000-memory.dmp upx behavioral1/memory/2648-151-0x000000013FAA0000-0x000000013FDF4000-memory.dmp upx behavioral1/memory/2980-152-0x000000013F100000-0x000000013F454000-memory.dmp upx behavioral1/memory/2600-153-0x000000013FE10000-0x0000000140164000-memory.dmp upx behavioral1/memory/2508-154-0x000000013FB10000-0x000000013FE64000-memory.dmp upx behavioral1/memory/2948-155-0x000000013F9E0000-0x000000013FD34000-memory.dmp upx behavioral1/memory/1044-156-0x000000013FCF0000-0x0000000140044000-memory.dmp upx behavioral1/memory/2556-157-0x000000013F860000-0x000000013FBB4000-memory.dmp upx behavioral1/memory/2796-158-0x000000013F7E0000-0x000000013FB34000-memory.dmp upx behavioral1/memory/2832-159-0x000000013F430000-0x000000013F784000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exedescription ioc process File created C:\Windows\System\VebEFaL.exe 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\wSDspkc.exe 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\yCwtEsv.exe 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\dOsiBSp.exe 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\eZdRhAZ.exe 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\zcXXThb.exe 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\uXITNIa.exe 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\TEVuyne.exe 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\CCWfZjs.exe 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\RhBYuqQ.exe 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\WqxWlUk.exe 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\VzfoOGm.exe 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\oexAqLs.exe 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\hYuCEIG.exe 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\FUFlOfa.exe 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\aZZNrXn.exe 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\NUeXzwa.exe 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\wLjzUDy.exe 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\wOGsURp.exe 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\jorKSHk.exe 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\HXAymbF.exe 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process Token: SeLockMemoryPrivilege 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process target process PID 2396 wrote to memory of 2084 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe wLjzUDy.exe PID 2396 wrote to memory of 2084 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe wLjzUDy.exe PID 2396 wrote to memory of 2084 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe wLjzUDy.exe PID 2396 wrote to memory of 2856 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe wOGsURp.exe PID 2396 wrote to memory of 2856 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe wOGsURp.exe PID 2396 wrote to memory of 2856 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe wOGsURp.exe PID 2396 wrote to memory of 2768 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe eZdRhAZ.exe PID 2396 wrote to memory of 2768 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe eZdRhAZ.exe PID 2396 wrote to memory of 2768 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe eZdRhAZ.exe PID 2396 wrote to memory of 2692 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe RhBYuqQ.exe PID 2396 wrote to memory of 2692 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe RhBYuqQ.exe PID 2396 wrote to memory of 2692 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe RhBYuqQ.exe PID 2396 wrote to memory of 2872 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe WqxWlUk.exe PID 2396 wrote to memory of 2872 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe WqxWlUk.exe PID 2396 wrote to memory of 2872 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe WqxWlUk.exe PID 2396 wrote to memory of 2648 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe jorKSHk.exe PID 2396 wrote to memory of 2648 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe jorKSHk.exe PID 2396 wrote to memory of 2648 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe jorKSHk.exe PID 2396 wrote to memory of 2980 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe HXAymbF.exe PID 2396 wrote to memory of 2980 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe HXAymbF.exe PID 2396 wrote to memory of 2980 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe HXAymbF.exe PID 2396 wrote to memory of 2600 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe zcXXThb.exe PID 2396 wrote to memory of 2600 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe zcXXThb.exe PID 2396 wrote to memory of 2600 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe zcXXThb.exe PID 2396 wrote to memory of 2508 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe uXITNIa.exe PID 2396 wrote to memory of 2508 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe uXITNIa.exe PID 2396 wrote to memory of 2508 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe uXITNIa.exe PID 2396 wrote to memory of 2948 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe VebEFaL.exe PID 2396 wrote to memory of 2948 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe VebEFaL.exe PID 2396 wrote to memory of 2948 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe VebEFaL.exe PID 2396 wrote to memory of 1044 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe VzfoOGm.exe PID 2396 wrote to memory of 1044 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe VzfoOGm.exe PID 2396 wrote to memory of 1044 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe VzfoOGm.exe PID 2396 wrote to memory of 2556 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe oexAqLs.exe PID 2396 wrote to memory of 2556 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe oexAqLs.exe PID 2396 wrote to memory of 2556 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe oexAqLs.exe PID 2396 wrote to memory of 2796 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe CCWfZjs.exe PID 2396 wrote to memory of 2796 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe CCWfZjs.exe PID 2396 wrote to memory of 2796 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe CCWfZjs.exe PID 2396 wrote to memory of 2832 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe wSDspkc.exe PID 2396 wrote to memory of 2832 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe wSDspkc.exe PID 2396 wrote to memory of 2832 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe wSDspkc.exe PID 2396 wrote to memory of 272 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe TEVuyne.exe PID 2396 wrote to memory of 272 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe TEVuyne.exe PID 2396 wrote to memory of 272 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe TEVuyne.exe PID 2396 wrote to memory of 1328 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe hYuCEIG.exe PID 2396 wrote to memory of 1328 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe hYuCEIG.exe PID 2396 wrote to memory of 1328 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe hYuCEIG.exe PID 2396 wrote to memory of 304 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe yCwtEsv.exe PID 2396 wrote to memory of 304 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe yCwtEsv.exe PID 2396 wrote to memory of 304 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe yCwtEsv.exe PID 2396 wrote to memory of 1992 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe FUFlOfa.exe PID 2396 wrote to memory of 1992 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe FUFlOfa.exe PID 2396 wrote to memory of 1992 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe FUFlOfa.exe PID 2396 wrote to memory of 2044 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe aZZNrXn.exe PID 2396 wrote to memory of 2044 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe aZZNrXn.exe PID 2396 wrote to memory of 2044 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe aZZNrXn.exe PID 2396 wrote to memory of 2380 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe NUeXzwa.exe PID 2396 wrote to memory of 2380 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe NUeXzwa.exe PID 2396 wrote to memory of 2380 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe NUeXzwa.exe PID 2396 wrote to memory of 1456 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe dOsiBSp.exe PID 2396 wrote to memory of 1456 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe dOsiBSp.exe PID 2396 wrote to memory of 1456 2396 2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe dOsiBSp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-24_d735d5a6f1e7e9b55d5834735e6c334b_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\wLjzUDy.exeC:\Windows\System\wLjzUDy.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wOGsURp.exeC:\Windows\System\wOGsURp.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\eZdRhAZ.exeC:\Windows\System\eZdRhAZ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RhBYuqQ.exeC:\Windows\System\RhBYuqQ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\WqxWlUk.exeC:\Windows\System\WqxWlUk.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\jorKSHk.exeC:\Windows\System\jorKSHk.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\HXAymbF.exeC:\Windows\System\HXAymbF.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zcXXThb.exeC:\Windows\System\zcXXThb.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\uXITNIa.exeC:\Windows\System\uXITNIa.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\VebEFaL.exeC:\Windows\System\VebEFaL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\VzfoOGm.exeC:\Windows\System\VzfoOGm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\oexAqLs.exeC:\Windows\System\oexAqLs.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CCWfZjs.exeC:\Windows\System\CCWfZjs.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wSDspkc.exeC:\Windows\System\wSDspkc.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\TEVuyne.exeC:\Windows\System\TEVuyne.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\hYuCEIG.exeC:\Windows\System\hYuCEIG.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\yCwtEsv.exeC:\Windows\System\yCwtEsv.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\FUFlOfa.exeC:\Windows\System\FUFlOfa.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aZZNrXn.exeC:\Windows\System\aZZNrXn.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\NUeXzwa.exeC:\Windows\System\NUeXzwa.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\dOsiBSp.exeC:\Windows\System\dOsiBSp.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\CCWfZjs.exeFilesize
5.9MB
MD57465af8a3f62ea60fe7c36bbc1b98875
SHA16af6f9d387631ae3372f5b131609831beaa685a1
SHA256bd7695172cfd87d3de679f34eab6cfeb9e1a3cecb5355f051cbda0092184f8fb
SHA512bcba88ffd8c099bdcbb349706c15f3df9c469b6dfbcc22862b6cc8ee6896609142738e5420d5aa78a1f6fc2defe5fe959a79489b76b24e4e6a8ba92cb7e46448
-
C:\Windows\system\FUFlOfa.exeFilesize
5.9MB
MD59ebf0c0574d8fd2b756a958f42a885c4
SHA137a957ea5bab09fb5abccb092bd8d551ab78d21a
SHA2567e2549d16e539bb9ecfdff3583f84822b9d35b03fcbeac5948fae1e36b86dffd
SHA5123f47780543846c439b1b7ac46b5b2225b796cbcd474e4d63a1e6e06ad2750f2ca9cbc6bc5c76c0a139c144b4468472ce3bcfee2e9eebfb242942b4912e2d453c
-
C:\Windows\system\HXAymbF.exeFilesize
5.9MB
MD522fa6c8aba9ef1c30fe61e2bf3aca702
SHA1f54565ce77ab216ea7ae3df9fb5a3e36d76bea43
SHA256368620463a2afda32e8ad3ba1a01001afd9617162f2afcd17be9ebdedd4cd9ee
SHA512fd0ce74664812c28b8aca7aad80eb8130012faeaf297bfdb7432392eb2dc9d61d95b7ba897b0214a7b9dc699bd302ca8c503f86d7aacc5ce4255456e5e156b51
-
C:\Windows\system\NUeXzwa.exeFilesize
5.9MB
MD541961d66ca4209e8079ddd6179f1b968
SHA14b37495b7dd6c7b611398877768b760f54cde569
SHA256721423b3f6f0af647ddd322a4f81e8b9bcadf79e0ce594b4ec0e4a89125fabf7
SHA512db4b324d70b03e0187f1ea0c0c71d9c77668b4a36766510b5fc89ee97a0061c240f7435cb37db345ccf8de0ec9ff258504620de1eeec1c47955a0eaddc45db01
-
C:\Windows\system\RhBYuqQ.exeFilesize
5.9MB
MD5660fe615cd23a37911d6e70fdf29c790
SHA112f835a6cf2fdcb27b4e95b10f42f8154a14b777
SHA256a72f38cab1edba83457fe77c65a2b14fa0ebfd32e2ef190a8b4dd03fa1d6867a
SHA512b7bda03518e7927c042310b41723614b72f9b37e98f43166c0d9ff57b8efad4fa55ddd2e50c9b998a47fd45feffd21a10198d300229a7ab0bf6c1c0533e22523
-
C:\Windows\system\TEVuyne.exeFilesize
5.9MB
MD5fd3080c58acfc1f5571a07c24136ebaa
SHA156cc55f77027a14a6cc16e6e60afa2c53689d5d5
SHA256793a292166b17098a26b75b429b39845f71296e4b4578eb8e5a38a83b3836d13
SHA5122eb91a821e8cb2bc514876aa43d53d9f2b0932fd68ff8a496ac108268d5053d4201758310c023fb6b135463e9fffc73df5f18588346e80360ceefccbfe838c32
-
C:\Windows\system\VebEFaL.exeFilesize
5.9MB
MD5cbcb36d277e94839aff3e6c18110a310
SHA126b984275becd58c0c18251dd2c057376466554b
SHA25633d0221785c1f06813aa2188b53ad2355d3471ef11a48c7923d0faf8e82196fe
SHA51270a57bb8aec0a3b721a385b61715efa780fe839c5065b4ab5c5906af6a8a1daa92e29be1bd51531e3c93a890fc899a2d338d163e89a609129e47b3801563f15b
-
C:\Windows\system\VzfoOGm.exeFilesize
5.9MB
MD5bd698b0edf3621388c7ad7e991e288d2
SHA18ffc4fe322cef264265b92543f8c927c6dbd6dea
SHA256629f08b59b4620c9ff06142a8bae0b9a842f548d180977b36237fb9ab61e1646
SHA5126e34ba2679a1028af7f6a8cfd72d0b646d9451903dc5fafcfcbbebfdfa78d34184734e625ab0405aba88792b5d60df3658cb38355ea1825c551eead0327b0e50
-
C:\Windows\system\WqxWlUk.exeFilesize
5.9MB
MD5568914b65db718a6f32adfe0bd4b0280
SHA1431fe0ef093fc6576211c7186964c1a79613b7c3
SHA2566c6d55c8764aad9c70703fcc7b3dbf4c095f34ed3e93e76c71fa2a1184bb4940
SHA5124ab880a9ee247bbe04059ab6f4c5864aa8c5d3d4c8c92d9c354e77595b0067148bc05f3576bdb40a99240102e516d5e611dfa2f9a111858769e0458dcd40f427
-
C:\Windows\system\aZZNrXn.exeFilesize
5.9MB
MD55ec8d097b3ecdd216e200db9f54e839f
SHA17f562946080e4cf7a05cd80aeb85be25c079f89c
SHA256c4b21b295e7d1343346e1c8240c845048af147d64330913c53c12886e33d8b9c
SHA512c095efbbde958f8d0bec1b069e343988554d2e0bafaa3ff42c50a6540780695612b5b9c0f28bea0e3a338d739229c1499dabc4a96935c3f086d882ea8c20604f
-
C:\Windows\system\eZdRhAZ.exeFilesize
5.9MB
MD5f69bda05b394887e66961016c36a7363
SHA15324ada9420e9b401ef1fcde82b4fe998ba76b92
SHA256307d7bff026efec82e24255723b305a0eea8c2d207b42c68ea4472b29e1131c3
SHA5128311a7b9ec2a0d2d142392b4e015386f24dbc8f2f3941a347f003a6d698cf891349c4a8c67055fe86259cb276073d5a6d2d47596eea297806508e24277d90b7a
-
C:\Windows\system\hYuCEIG.exeFilesize
5.9MB
MD56e3625bb0289c508e270116bcff86a06
SHA1ac9347e27781807b5c00ea1dd47430e6a45c32e2
SHA256821830853cb0749e8c61162b45b8db10ab63ea7b01c9e214990c7744ddc61a38
SHA5127172eee74122e44449cb7e85cde5e187bfd207543863810d0c6ab377ead3d006b0c17cc64ec310a09e1aa4a62b1bcfa11c625575d882b9da913879a3a948b8b6
-
C:\Windows\system\jorKSHk.exeFilesize
5.9MB
MD58b1cb44c96976ebe9cb9c2955f5b4c3f
SHA139039c6b79371bb5c6a8290fe08544a9986f1caf
SHA256b1445ea91b08f0f48981ceda1e139a28c3dad0c90376b3c3c9812dc0dec010cc
SHA512ba0385d7cfa1bdf449bf47621b623008128481323943628c1c33aa9788d40ffa224ba567d807e427b94a6b2e8192d4637879de0b81f5b72a47506d934bc67932
-
C:\Windows\system\oexAqLs.exeFilesize
5.9MB
MD5bffd2413896e18609ff7b2437bdbb233
SHA1791b728574c23dea4337fcf07abb71fef5c1a8cf
SHA25679047f7677354a5c702881c41990ceb055b3d1f525a4bc41213dfab20303110b
SHA512a267b3437c4667ef998e0a2940d1e0c9a4f85615509d49bf059af8da66b5fc7caf0aa7deb5ecaddacbaed518c18f0b0e1a1afb06dbe5a9c3ce38f0a1a1816be1
-
C:\Windows\system\uXITNIa.exeFilesize
5.9MB
MD59a72bfd7a8a2bf85474314e73ba5e4a0
SHA1e4fab71d3d56190e57b50c8b179ddfc75a408d3d
SHA256628d152adf0342594c8170fe328f093ce1de8088aa6c07f974d1f416a409c6a5
SHA5122411146fe9d5c18648744b9b33cd682cb44ff38d2ade7db2d97a88b8e0860f8cfca991b9d9de400762c67a109d3b50ca4237a978f2f0111187b338c1359f45ec
-
C:\Windows\system\wSDspkc.exeFilesize
5.9MB
MD5d97266acbf4f4a97c85f704f270c4015
SHA192813acde370bf6c5b0496454d5ef5ce36468f4d
SHA25611f99876d2f8b3445f9045003485d28d4bc180c857f4caa17f4a9188415f4c26
SHA5127c6953b3cefd316b45e4bc2b27e02b013b5a4fa8be46321c761e5c21eb2aa60ce297eaf655427e3f6a9149c62382d62ccca7ea518fda2a8cbab8369bcb419ba6
-
C:\Windows\system\yCwtEsv.exeFilesize
5.9MB
MD59d25d46db8cbe4f8b34d985d0f5181d0
SHA1ebf3b2083d36e84106db6cde945ca41e5cc9ec50
SHA256d89bf55fcd745ff51f261b450e1e805356d0ed69f95dd4ab98449d1d106949ea
SHA512fc6ef2828e0bd197aa0a07d75fe2182f659d0b40dba4c0a1e43f90acb681121101a0d525df029f56ae17b89184925b411c9c95609d18d168089d3ffc7f6cb8ec
-
C:\Windows\system\zcXXThb.exeFilesize
5.9MB
MD584c5974d048d4e4d1232cefe0df5f333
SHA1565291a8c00411adf99e473dbfcf6706c3c75d82
SHA256d2bb7377987234d90a985946722efe958013b6b3d45de7dde72c1b66f923e378
SHA512abefafc1435b96a3826d3f2f5f0ba590da6d7fc016e04506910ba890eedeff8c275f806bf93741d809439ad539843e15a4ba3f0f7f26183da311b82aec75bfc4
-
\Windows\system\dOsiBSp.exeFilesize
5.9MB
MD562a0cde480de9b85bd74acd40b27d7e9
SHA18b4482554798435a10928e1dc7c6c8af72f53c27
SHA2562c101739500e8978564c4801027084644987a28f338fe5f559d9fd825bb4004a
SHA5120760276203678fca16b1e6f9463a2b21a38c5f5c806496d3f066f398110c240166d455db46ff43f4a5cdeec2cfe45a9e64f0fa729436ed7e545db62da0d6a19a
-
\Windows\system\wLjzUDy.exeFilesize
5.9MB
MD5ec6ae560eb26afa1aea41d19c2ae44a1
SHA16365b01e886ecce7fbe4d826d4860ff435ba62eb
SHA2568c8e15ed820a1f92fe1b3058490e34ee52a239359b65c729f31fe0baeea66f63
SHA5126beba14fced4997b6d98b2918be44832febbd571354229e6abb9946b71de8af96a32c230528195eebd944d095ea6bc512b0adabcdf6395d97f5034748838a44c
-
\Windows\system\wOGsURp.exeFilesize
5.9MB
MD5d1446057e2523072189c70b6db43337f
SHA1d2fbdf9bdf538a1c9d4784654025579e4cc84d10
SHA256b934ed7453cf3bd4f0e180d47a9862b4a55d8567b717dfef77b678fa399d8b4a
SHA512a61df8a1d392948a6ed2387473fb3893646b1869869dadfcb8784b0844d70b28a5166549791e7370111e9bb456ffe7508f8f3be1bb08a7dbb462b97c719083a5
-
memory/1044-78-0x000000013FCF0000-0x0000000140044000-memory.dmpFilesize
3.3MB
-
memory/1044-156-0x000000013FCF0000-0x0000000140044000-memory.dmpFilesize
3.3MB
-
memory/1044-140-0x000000013FCF0000-0x0000000140044000-memory.dmpFilesize
3.3MB
-
memory/2084-20-0x000000013FFA0000-0x00000001402F4000-memory.dmpFilesize
3.3MB
-
memory/2084-147-0x000000013FFA0000-0x00000001402F4000-memory.dmpFilesize
3.3MB
-
memory/2396-145-0x000000013F2F0000-0x000000013F644000-memory.dmpFilesize
3.3MB
-
memory/2396-12-0x0000000002390000-0x00000000026E4000-memory.dmpFilesize
3.3MB
-
memory/2396-47-0x000000013FE00000-0x0000000140154000-memory.dmpFilesize
3.3MB
-
memory/2396-33-0x0000000002390000-0x00000000026E4000-memory.dmpFilesize
3.3MB
-
memory/2396-135-0x0000000002390000-0x00000000026E4000-memory.dmpFilesize
3.3MB
-
memory/2396-144-0x000000013F430000-0x000000013F784000-memory.dmpFilesize
3.3MB
-
memory/2396-142-0x000000013F7E0000-0x000000013FB34000-memory.dmpFilesize
3.3MB
-
memory/2396-141-0x000000013F860000-0x000000013FBB4000-memory.dmpFilesize
3.3MB
-
memory/2396-98-0x000000013F430000-0x000000013F784000-memory.dmpFilesize
3.3MB
-
memory/2396-41-0x000000013FAA0000-0x000000013FDF4000-memory.dmpFilesize
3.3MB
-
memory/2396-138-0x000000013F9E0000-0x000000013FD34000-memory.dmpFilesize
3.3MB
-
memory/2396-85-0x000000013F860000-0x000000013FBB4000-memory.dmpFilesize
3.3MB
-
memory/2396-28-0x000000013F310000-0x000000013F664000-memory.dmpFilesize
3.3MB
-
memory/2396-0-0x000000013FE00000-0x0000000140154000-memory.dmpFilesize
3.3MB
-
memory/2396-77-0x0000000002390000-0x00000000026E4000-memory.dmpFilesize
3.3MB
-
memory/2396-136-0x0000000002390000-0x00000000026E4000-memory.dmpFilesize
3.3MB
-
memory/2396-68-0x000000013F9E0000-0x000000013FD34000-memory.dmpFilesize
3.3MB
-
memory/2396-8-0x0000000002390000-0x00000000026E4000-memory.dmpFilesize
3.3MB
-
memory/2396-1-0x00000000000F0000-0x0000000000100000-memory.dmpFilesize
64KB
-
memory/2396-62-0x0000000002390000-0x00000000026E4000-memory.dmpFilesize
3.3MB
-
memory/2396-56-0x0000000002390000-0x00000000026E4000-memory.dmpFilesize
3.3MB
-
memory/2508-63-0x000000013FB10000-0x000000013FE64000-memory.dmpFilesize
3.3MB
-
memory/2508-154-0x000000013FB10000-0x000000013FE64000-memory.dmpFilesize
3.3MB
-
memory/2508-137-0x000000013FB10000-0x000000013FE64000-memory.dmpFilesize
3.3MB
-
memory/2556-157-0x000000013F860000-0x000000013FBB4000-memory.dmpFilesize
3.3MB
-
memory/2556-86-0x000000013F860000-0x000000013FBB4000-memory.dmpFilesize
3.3MB
-
memory/2600-153-0x000000013FE10000-0x0000000140164000-memory.dmpFilesize
3.3MB
-
memory/2600-57-0x000000013FE10000-0x0000000140164000-memory.dmpFilesize
3.3MB
-
memory/2648-42-0x000000013FAA0000-0x000000013FDF4000-memory.dmpFilesize
3.3MB
-
memory/2648-103-0x000000013FAA0000-0x000000013FDF4000-memory.dmpFilesize
3.3MB
-
memory/2648-151-0x000000013FAA0000-0x000000013FDF4000-memory.dmpFilesize
3.3MB
-
memory/2692-149-0x000000013F310000-0x000000013F664000-memory.dmpFilesize
3.3MB
-
memory/2692-29-0x000000013F310000-0x000000013F664000-memory.dmpFilesize
3.3MB
-
memory/2768-76-0x000000013F230000-0x000000013F584000-memory.dmpFilesize
3.3MB
-
memory/2768-148-0x000000013F230000-0x000000013F584000-memory.dmpFilesize
3.3MB
-
memory/2768-22-0x000000013F230000-0x000000013F584000-memory.dmpFilesize
3.3MB
-
memory/2796-91-0x000000013F7E0000-0x000000013FB34000-memory.dmpFilesize
3.3MB
-
memory/2796-158-0x000000013F7E0000-0x000000013FB34000-memory.dmpFilesize
3.3MB
-
memory/2796-143-0x000000013F7E0000-0x000000013FB34000-memory.dmpFilesize
3.3MB
-
memory/2832-159-0x000000013F430000-0x000000013F784000-memory.dmpFilesize
3.3MB
-
memory/2832-99-0x000000013F430000-0x000000013F784000-memory.dmpFilesize
3.3MB
-
memory/2856-16-0x000000013FC00000-0x000000013FF54000-memory.dmpFilesize
3.3MB
-
memory/2856-146-0x000000013FC00000-0x000000013FF54000-memory.dmpFilesize
3.3MB
-
memory/2872-150-0x000000013FE70000-0x00000001401C4000-memory.dmpFilesize
3.3MB
-
memory/2872-36-0x000000013FE70000-0x00000001401C4000-memory.dmpFilesize
3.3MB
-
memory/2948-139-0x000000013F9E0000-0x000000013FD34000-memory.dmpFilesize
3.3MB
-
memory/2948-155-0x000000013F9E0000-0x000000013FD34000-memory.dmpFilesize
3.3MB
-
memory/2948-69-0x000000013F9E0000-0x000000013FD34000-memory.dmpFilesize
3.3MB
-
memory/2980-50-0x000000013F100000-0x000000013F454000-memory.dmpFilesize
3.3MB
-
memory/2980-152-0x000000013F100000-0x000000013F454000-memory.dmpFilesize
3.3MB