Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 00:03
Behavioral task
behavioral1
Sample
2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240221-en
General
-
Target
2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
359a0df22cf70e52e442d48b89b54d2f
-
SHA1
d9c5bbdc24c1084f03943f05d03d8cd71f188fda
-
SHA256
c866fd74a259d82124228e798b2b359742482802064e606ac015187b32bc9546
-
SHA512
8271be36b2440d8826b02a49fed44cadca44e147d382f3c9ee7cdd84a245fb1ef0d77b54f3012b085cf581955514f51d0f0366e151bd1d38db618b730367ba27
-
SSDEEP
98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lUH:Q+856utgpPF8u/7H
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\pSrZlUz.exe cobalt_reflective_dll C:\Windows\system\TjtOXUO.exe cobalt_reflective_dll C:\Windows\system\KMaoRBO.exe cobalt_reflective_dll \Windows\system\izLMAzd.exe cobalt_reflective_dll C:\Windows\system\MYSnAfA.exe cobalt_reflective_dll \Windows\system\cLzyBsd.exe cobalt_reflective_dll \Windows\system\bHzQDnN.exe cobalt_reflective_dll \Windows\system\BXQFHHt.exe cobalt_reflective_dll C:\Windows\system\wNotxgj.exe cobalt_reflective_dll \Windows\system\oCsLcjm.exe cobalt_reflective_dll C:\Windows\system\dyrzJeN.exe cobalt_reflective_dll C:\Windows\system\wsEuehh.exe cobalt_reflective_dll C:\Windows\system\IOoheHg.exe cobalt_reflective_dll C:\Windows\system\SClfJlR.exe cobalt_reflective_dll C:\Windows\system\FMVHQPu.exe cobalt_reflective_dll \Windows\system\xfTtiKB.exe cobalt_reflective_dll C:\Windows\system\UQlztaZ.exe cobalt_reflective_dll C:\Windows\system\zNieVyo.exe cobalt_reflective_dll C:\Windows\system\iGuvvdH.exe cobalt_reflective_dll C:\Windows\system\xJXMDhi.exe cobalt_reflective_dll \Windows\system\aOHWWUs.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule \Windows\system\pSrZlUz.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\TjtOXUO.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\KMaoRBO.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\izLMAzd.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\MYSnAfA.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\cLzyBsd.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\bHzQDnN.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\BXQFHHt.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\wNotxgj.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\oCsLcjm.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\dyrzJeN.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\wsEuehh.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\IOoheHg.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\SClfJlR.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\FMVHQPu.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\xfTtiKB.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\UQlztaZ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\zNieVyo.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\iGuvvdH.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\xJXMDhi.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\aOHWWUs.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 58 IoCs
Processes:
resource yara_rule behavioral1/memory/1924-1-0x000000013FFC0000-0x0000000140314000-memory.dmp UPX \Windows\system\pSrZlUz.exe UPX C:\Windows\system\TjtOXUO.exe UPX C:\Windows\system\KMaoRBO.exe UPX behavioral1/memory/2484-18-0x000000013FAB0000-0x000000013FE04000-memory.dmp UPX \Windows\system\izLMAzd.exe UPX behavioral1/memory/2056-21-0x000000013F260000-0x000000013F5B4000-memory.dmp UPX behavioral1/memory/2612-27-0x000000013F530000-0x000000013F884000-memory.dmp UPX behavioral1/memory/2320-13-0x000000013FF70000-0x00000001402C4000-memory.dmp UPX C:\Windows\system\MYSnAfA.exe UPX behavioral1/memory/2700-35-0x000000013F8D0000-0x000000013FC24000-memory.dmp UPX \Windows\system\cLzyBsd.exe UPX behavioral1/memory/2816-42-0x000000013FD70000-0x00000001400C4000-memory.dmp UPX \Windows\system\bHzQDnN.exe UPX behavioral1/memory/2556-50-0x000000013F130000-0x000000013F484000-memory.dmp UPX \Windows\system\BXQFHHt.exe UPX C:\Windows\system\wNotxgj.exe UPX \Windows\system\oCsLcjm.exe UPX behavioral1/memory/2720-93-0x000000013F1D0000-0x000000013F524000-memory.dmp UPX C:\Windows\system\dyrzJeN.exe UPX C:\Windows\system\wsEuehh.exe UPX behavioral1/memory/2816-99-0x000000013FD70000-0x00000001400C4000-memory.dmp UPX C:\Windows\system\IOoheHg.exe UPX C:\Windows\system\SClfJlR.exe UPX C:\Windows\system\FMVHQPu.exe UPX \Windows\system\xfTtiKB.exe UPX C:\Windows\system\UQlztaZ.exe UPX C:\Windows\system\zNieVyo.exe UPX C:\Windows\system\iGuvvdH.exe UPX behavioral1/memory/2568-108-0x000000013FEA0000-0x00000001401F4000-memory.dmp UPX C:\Windows\system\xJXMDhi.exe UPX behavioral1/memory/2056-84-0x000000013F260000-0x000000013F5B4000-memory.dmp UPX \Windows\system\aOHWWUs.exe UPX behavioral1/memory/760-100-0x000000013FA80000-0x000000013FDD4000-memory.dmp UPX behavioral1/memory/2904-97-0x000000013F230000-0x000000013F584000-memory.dmp UPX behavioral1/memory/2700-92-0x000000013F8D0000-0x000000013FC24000-memory.dmp UPX behavioral1/memory/2612-91-0x000000013F530000-0x000000013F884000-memory.dmp UPX behavioral1/memory/2668-80-0x000000013FD90000-0x00000001400E4000-memory.dmp UPX behavioral1/memory/2908-76-0x000000013F190000-0x000000013F4E4000-memory.dmp UPX behavioral1/memory/2408-63-0x000000013F900000-0x000000013FC54000-memory.dmp UPX behavioral1/memory/2320-57-0x000000013FF70000-0x00000001402C4000-memory.dmp UPX behavioral1/memory/1924-56-0x000000013FFC0000-0x0000000140314000-memory.dmp UPX behavioral1/memory/2720-143-0x000000013F1D0000-0x000000013F524000-memory.dmp UPX behavioral1/memory/760-144-0x000000013FA80000-0x000000013FDD4000-memory.dmp UPX behavioral1/memory/2320-145-0x000000013FF70000-0x00000001402C4000-memory.dmp UPX behavioral1/memory/2484-146-0x000000013FAB0000-0x000000013FE04000-memory.dmp UPX behavioral1/memory/2056-147-0x000000013F260000-0x000000013F5B4000-memory.dmp UPX behavioral1/memory/2612-148-0x000000013F530000-0x000000013F884000-memory.dmp UPX behavioral1/memory/2700-149-0x000000013F8D0000-0x000000013FC24000-memory.dmp UPX behavioral1/memory/2556-150-0x000000013F130000-0x000000013F484000-memory.dmp UPX behavioral1/memory/2816-151-0x000000013FD70000-0x00000001400C4000-memory.dmp UPX behavioral1/memory/2408-152-0x000000013F900000-0x000000013FC54000-memory.dmp UPX behavioral1/memory/2908-153-0x000000013F190000-0x000000013F4E4000-memory.dmp UPX behavioral1/memory/2668-154-0x000000013FD90000-0x00000001400E4000-memory.dmp UPX behavioral1/memory/2720-155-0x000000013F1D0000-0x000000013F524000-memory.dmp UPX behavioral1/memory/2904-156-0x000000013F230000-0x000000013F584000-memory.dmp UPX behavioral1/memory/760-157-0x000000013FA80000-0x000000013FDD4000-memory.dmp UPX behavioral1/memory/2568-158-0x000000013FEA0000-0x00000001401F4000-memory.dmp UPX -
XMRig Miner payload 59 IoCs
Processes:
resource yara_rule behavioral1/memory/1924-1-0x000000013FFC0000-0x0000000140314000-memory.dmp xmrig \Windows\system\pSrZlUz.exe xmrig C:\Windows\system\TjtOXUO.exe xmrig C:\Windows\system\KMaoRBO.exe xmrig behavioral1/memory/2484-18-0x000000013FAB0000-0x000000013FE04000-memory.dmp xmrig \Windows\system\izLMAzd.exe xmrig behavioral1/memory/2056-21-0x000000013F260000-0x000000013F5B4000-memory.dmp xmrig behavioral1/memory/2612-27-0x000000013F530000-0x000000013F884000-memory.dmp xmrig behavioral1/memory/2320-13-0x000000013FF70000-0x00000001402C4000-memory.dmp xmrig C:\Windows\system\MYSnAfA.exe xmrig behavioral1/memory/2700-35-0x000000013F8D0000-0x000000013FC24000-memory.dmp xmrig \Windows\system\cLzyBsd.exe xmrig behavioral1/memory/2816-42-0x000000013FD70000-0x00000001400C4000-memory.dmp xmrig \Windows\system\bHzQDnN.exe xmrig behavioral1/memory/2556-50-0x000000013F130000-0x000000013F484000-memory.dmp xmrig \Windows\system\BXQFHHt.exe xmrig C:\Windows\system\wNotxgj.exe xmrig \Windows\system\oCsLcjm.exe xmrig behavioral1/memory/2720-93-0x000000013F1D0000-0x000000013F524000-memory.dmp xmrig C:\Windows\system\dyrzJeN.exe xmrig C:\Windows\system\wsEuehh.exe xmrig behavioral1/memory/2816-99-0x000000013FD70000-0x00000001400C4000-memory.dmp xmrig C:\Windows\system\IOoheHg.exe xmrig C:\Windows\system\SClfJlR.exe xmrig C:\Windows\system\FMVHQPu.exe xmrig \Windows\system\xfTtiKB.exe xmrig C:\Windows\system\UQlztaZ.exe xmrig C:\Windows\system\zNieVyo.exe xmrig C:\Windows\system\iGuvvdH.exe xmrig behavioral1/memory/2568-108-0x000000013FEA0000-0x00000001401F4000-memory.dmp xmrig C:\Windows\system\xJXMDhi.exe xmrig behavioral1/memory/2056-84-0x000000013F260000-0x000000013F5B4000-memory.dmp xmrig \Windows\system\aOHWWUs.exe xmrig behavioral1/memory/760-100-0x000000013FA80000-0x000000013FDD4000-memory.dmp xmrig behavioral1/memory/2904-97-0x000000013F230000-0x000000013F584000-memory.dmp xmrig behavioral1/memory/2700-92-0x000000013F8D0000-0x000000013FC24000-memory.dmp xmrig behavioral1/memory/2612-91-0x000000013F530000-0x000000013F884000-memory.dmp xmrig behavioral1/memory/2668-80-0x000000013FD90000-0x00000001400E4000-memory.dmp xmrig behavioral1/memory/1924-78-0x000000013FA80000-0x000000013FDD4000-memory.dmp xmrig behavioral1/memory/2908-76-0x000000013F190000-0x000000013F4E4000-memory.dmp xmrig behavioral1/memory/2408-63-0x000000013F900000-0x000000013FC54000-memory.dmp xmrig behavioral1/memory/2320-57-0x000000013FF70000-0x00000001402C4000-memory.dmp xmrig behavioral1/memory/1924-56-0x000000013FFC0000-0x0000000140314000-memory.dmp xmrig behavioral1/memory/2720-143-0x000000013F1D0000-0x000000013F524000-memory.dmp xmrig behavioral1/memory/760-144-0x000000013FA80000-0x000000013FDD4000-memory.dmp xmrig behavioral1/memory/2320-145-0x000000013FF70000-0x00000001402C4000-memory.dmp xmrig behavioral1/memory/2484-146-0x000000013FAB0000-0x000000013FE04000-memory.dmp xmrig behavioral1/memory/2056-147-0x000000013F260000-0x000000013F5B4000-memory.dmp xmrig behavioral1/memory/2612-148-0x000000013F530000-0x000000013F884000-memory.dmp xmrig behavioral1/memory/2700-149-0x000000013F8D0000-0x000000013FC24000-memory.dmp xmrig behavioral1/memory/2556-150-0x000000013F130000-0x000000013F484000-memory.dmp xmrig behavioral1/memory/2816-151-0x000000013FD70000-0x00000001400C4000-memory.dmp xmrig behavioral1/memory/2408-152-0x000000013F900000-0x000000013FC54000-memory.dmp xmrig behavioral1/memory/2908-153-0x000000013F190000-0x000000013F4E4000-memory.dmp xmrig behavioral1/memory/2668-154-0x000000013FD90000-0x00000001400E4000-memory.dmp xmrig behavioral1/memory/2720-155-0x000000013F1D0000-0x000000013F524000-memory.dmp xmrig behavioral1/memory/2904-156-0x000000013F230000-0x000000013F584000-memory.dmp xmrig behavioral1/memory/760-157-0x000000013FA80000-0x000000013FDD4000-memory.dmp xmrig behavioral1/memory/2568-158-0x000000013FEA0000-0x00000001401F4000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
pSrZlUz.exeTjtOXUO.exeKMaoRBO.exeizLMAzd.exeMYSnAfA.execLzyBsd.exebHzQDnN.exeBXQFHHt.exedyrzJeN.exewNotxgj.exeoCsLcjm.exewsEuehh.exeaOHWWUs.exeIOoheHg.exexJXMDhi.exeSClfJlR.exeiGuvvdH.exezNieVyo.exeUQlztaZ.exeFMVHQPu.exexfTtiKB.exepid process 2320 pSrZlUz.exe 2484 TjtOXUO.exe 2056 KMaoRBO.exe 2612 izLMAzd.exe 2700 MYSnAfA.exe 2816 cLzyBsd.exe 2556 bHzQDnN.exe 2408 BXQFHHt.exe 2908 dyrzJeN.exe 2668 wNotxgj.exe 2720 oCsLcjm.exe 2904 wsEuehh.exe 760 aOHWWUs.exe 2568 IOoheHg.exe 1844 xJXMDhi.exe 2268 SClfJlR.exe 1544 iGuvvdH.exe 1268 zNieVyo.exe 1212 UQlztaZ.exe 1016 FMVHQPu.exe 2040 xfTtiKB.exe -
Loads dropped DLL 21 IoCs
Processes:
2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exepid process 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe -
Processes:
resource yara_rule behavioral1/memory/1924-1-0x000000013FFC0000-0x0000000140314000-memory.dmp upx \Windows\system\pSrZlUz.exe upx C:\Windows\system\TjtOXUO.exe upx C:\Windows\system\KMaoRBO.exe upx behavioral1/memory/2484-18-0x000000013FAB0000-0x000000013FE04000-memory.dmp upx \Windows\system\izLMAzd.exe upx behavioral1/memory/2056-21-0x000000013F260000-0x000000013F5B4000-memory.dmp upx behavioral1/memory/2612-27-0x000000013F530000-0x000000013F884000-memory.dmp upx behavioral1/memory/2320-13-0x000000013FF70000-0x00000001402C4000-memory.dmp upx C:\Windows\system\MYSnAfA.exe upx behavioral1/memory/2700-35-0x000000013F8D0000-0x000000013FC24000-memory.dmp upx \Windows\system\cLzyBsd.exe upx behavioral1/memory/2816-42-0x000000013FD70000-0x00000001400C4000-memory.dmp upx \Windows\system\bHzQDnN.exe upx behavioral1/memory/2556-50-0x000000013F130000-0x000000013F484000-memory.dmp upx \Windows\system\BXQFHHt.exe upx C:\Windows\system\wNotxgj.exe upx \Windows\system\oCsLcjm.exe upx behavioral1/memory/2720-93-0x000000013F1D0000-0x000000013F524000-memory.dmp upx C:\Windows\system\dyrzJeN.exe upx C:\Windows\system\wsEuehh.exe upx behavioral1/memory/2816-99-0x000000013FD70000-0x00000001400C4000-memory.dmp upx C:\Windows\system\IOoheHg.exe upx C:\Windows\system\SClfJlR.exe upx C:\Windows\system\FMVHQPu.exe upx \Windows\system\xfTtiKB.exe upx C:\Windows\system\UQlztaZ.exe upx C:\Windows\system\zNieVyo.exe upx C:\Windows\system\iGuvvdH.exe upx behavioral1/memory/2568-108-0x000000013FEA0000-0x00000001401F4000-memory.dmp upx C:\Windows\system\xJXMDhi.exe upx behavioral1/memory/2056-84-0x000000013F260000-0x000000013F5B4000-memory.dmp upx \Windows\system\aOHWWUs.exe upx behavioral1/memory/760-100-0x000000013FA80000-0x000000013FDD4000-memory.dmp upx behavioral1/memory/2904-97-0x000000013F230000-0x000000013F584000-memory.dmp upx behavioral1/memory/2700-92-0x000000013F8D0000-0x000000013FC24000-memory.dmp upx behavioral1/memory/2612-91-0x000000013F530000-0x000000013F884000-memory.dmp upx behavioral1/memory/2668-80-0x000000013FD90000-0x00000001400E4000-memory.dmp upx behavioral1/memory/2908-76-0x000000013F190000-0x000000013F4E4000-memory.dmp upx behavioral1/memory/2408-63-0x000000013F900000-0x000000013FC54000-memory.dmp upx behavioral1/memory/2320-57-0x000000013FF70000-0x00000001402C4000-memory.dmp upx behavioral1/memory/1924-56-0x000000013FFC0000-0x0000000140314000-memory.dmp upx behavioral1/memory/2720-143-0x000000013F1D0000-0x000000013F524000-memory.dmp upx behavioral1/memory/760-144-0x000000013FA80000-0x000000013FDD4000-memory.dmp upx behavioral1/memory/2320-145-0x000000013FF70000-0x00000001402C4000-memory.dmp upx behavioral1/memory/2484-146-0x000000013FAB0000-0x000000013FE04000-memory.dmp upx behavioral1/memory/2056-147-0x000000013F260000-0x000000013F5B4000-memory.dmp upx behavioral1/memory/2612-148-0x000000013F530000-0x000000013F884000-memory.dmp upx behavioral1/memory/2700-149-0x000000013F8D0000-0x000000013FC24000-memory.dmp upx behavioral1/memory/2556-150-0x000000013F130000-0x000000013F484000-memory.dmp upx behavioral1/memory/2816-151-0x000000013FD70000-0x00000001400C4000-memory.dmp upx behavioral1/memory/2408-152-0x000000013F900000-0x000000013FC54000-memory.dmp upx behavioral1/memory/2908-153-0x000000013F190000-0x000000013F4E4000-memory.dmp upx behavioral1/memory/2668-154-0x000000013FD90000-0x00000001400E4000-memory.dmp upx behavioral1/memory/2720-155-0x000000013F1D0000-0x000000013F524000-memory.dmp upx behavioral1/memory/2904-156-0x000000013F230000-0x000000013F584000-memory.dmp upx behavioral1/memory/760-157-0x000000013FA80000-0x000000013FDD4000-memory.dmp upx behavioral1/memory/2568-158-0x000000013FEA0000-0x00000001401F4000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exedescription ioc process File created C:\Windows\System\cLzyBsd.exe 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\dyrzJeN.exe 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\xJXMDhi.exe 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\SClfJlR.exe 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\UQlztaZ.exe 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\xfTtiKB.exe 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\KMaoRBO.exe 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\izLMAzd.exe 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\MYSnAfA.exe 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\aOHWWUs.exe 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\IOoheHg.exe 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\FMVHQPu.exe 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\TjtOXUO.exe 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\BXQFHHt.exe 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\wsEuehh.exe 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\wNotxgj.exe 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\iGuvvdH.exe 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\zNieVyo.exe 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\pSrZlUz.exe 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\bHzQDnN.exe 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\oCsLcjm.exe 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process Token: SeLockMemoryPrivilege 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process target process PID 1924 wrote to memory of 2320 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe pSrZlUz.exe PID 1924 wrote to memory of 2320 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe pSrZlUz.exe PID 1924 wrote to memory of 2320 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe pSrZlUz.exe PID 1924 wrote to memory of 2484 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe TjtOXUO.exe PID 1924 wrote to memory of 2484 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe TjtOXUO.exe PID 1924 wrote to memory of 2484 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe TjtOXUO.exe PID 1924 wrote to memory of 2056 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe KMaoRBO.exe PID 1924 wrote to memory of 2056 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe KMaoRBO.exe PID 1924 wrote to memory of 2056 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe KMaoRBO.exe PID 1924 wrote to memory of 2612 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe izLMAzd.exe PID 1924 wrote to memory of 2612 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe izLMAzd.exe PID 1924 wrote to memory of 2612 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe izLMAzd.exe PID 1924 wrote to memory of 2700 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe MYSnAfA.exe PID 1924 wrote to memory of 2700 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe MYSnAfA.exe PID 1924 wrote to memory of 2700 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe MYSnAfA.exe PID 1924 wrote to memory of 2816 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe cLzyBsd.exe PID 1924 wrote to memory of 2816 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe cLzyBsd.exe PID 1924 wrote to memory of 2816 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe cLzyBsd.exe PID 1924 wrote to memory of 2556 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe bHzQDnN.exe PID 1924 wrote to memory of 2556 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe bHzQDnN.exe PID 1924 wrote to memory of 2556 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe bHzQDnN.exe PID 1924 wrote to memory of 2408 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe BXQFHHt.exe PID 1924 wrote to memory of 2408 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe BXQFHHt.exe PID 1924 wrote to memory of 2408 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe BXQFHHt.exe PID 1924 wrote to memory of 2904 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe wsEuehh.exe PID 1924 wrote to memory of 2904 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe wsEuehh.exe PID 1924 wrote to memory of 2904 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe wsEuehh.exe PID 1924 wrote to memory of 2908 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe dyrzJeN.exe PID 1924 wrote to memory of 2908 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe dyrzJeN.exe PID 1924 wrote to memory of 2908 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe dyrzJeN.exe PID 1924 wrote to memory of 760 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe aOHWWUs.exe PID 1924 wrote to memory of 760 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe aOHWWUs.exe PID 1924 wrote to memory of 760 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe aOHWWUs.exe PID 1924 wrote to memory of 2668 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe wNotxgj.exe PID 1924 wrote to memory of 2668 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe wNotxgj.exe PID 1924 wrote to memory of 2668 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe wNotxgj.exe PID 1924 wrote to memory of 2568 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe IOoheHg.exe PID 1924 wrote to memory of 2568 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe IOoheHg.exe PID 1924 wrote to memory of 2568 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe IOoheHg.exe PID 1924 wrote to memory of 2720 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe oCsLcjm.exe PID 1924 wrote to memory of 2720 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe oCsLcjm.exe PID 1924 wrote to memory of 2720 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe oCsLcjm.exe PID 1924 wrote to memory of 1844 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe xJXMDhi.exe PID 1924 wrote to memory of 1844 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe xJXMDhi.exe PID 1924 wrote to memory of 1844 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe xJXMDhi.exe PID 1924 wrote to memory of 2268 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe SClfJlR.exe PID 1924 wrote to memory of 2268 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe SClfJlR.exe PID 1924 wrote to memory of 2268 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe SClfJlR.exe PID 1924 wrote to memory of 1544 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe iGuvvdH.exe PID 1924 wrote to memory of 1544 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe iGuvvdH.exe PID 1924 wrote to memory of 1544 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe iGuvvdH.exe PID 1924 wrote to memory of 1268 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe zNieVyo.exe PID 1924 wrote to memory of 1268 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe zNieVyo.exe PID 1924 wrote to memory of 1268 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe zNieVyo.exe PID 1924 wrote to memory of 1212 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe UQlztaZ.exe PID 1924 wrote to memory of 1212 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe UQlztaZ.exe PID 1924 wrote to memory of 1212 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe UQlztaZ.exe PID 1924 wrote to memory of 1016 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe FMVHQPu.exe PID 1924 wrote to memory of 1016 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe FMVHQPu.exe PID 1924 wrote to memory of 1016 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe FMVHQPu.exe PID 1924 wrote to memory of 2040 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe xfTtiKB.exe PID 1924 wrote to memory of 2040 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe xfTtiKB.exe PID 1924 wrote to memory of 2040 1924 2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe xfTtiKB.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-27_359a0df22cf70e52e442d48b89b54d2f_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\pSrZlUz.exeC:\Windows\System\pSrZlUz.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\TjtOXUO.exeC:\Windows\System\TjtOXUO.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\KMaoRBO.exeC:\Windows\System\KMaoRBO.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\izLMAzd.exeC:\Windows\System\izLMAzd.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\MYSnAfA.exeC:\Windows\System\MYSnAfA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\cLzyBsd.exeC:\Windows\System\cLzyBsd.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bHzQDnN.exeC:\Windows\System\bHzQDnN.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\BXQFHHt.exeC:\Windows\System\BXQFHHt.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wsEuehh.exeC:\Windows\System\wsEuehh.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\dyrzJeN.exeC:\Windows\System\dyrzJeN.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aOHWWUs.exeC:\Windows\System\aOHWWUs.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wNotxgj.exeC:\Windows\System\wNotxgj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\IOoheHg.exeC:\Windows\System\IOoheHg.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\oCsLcjm.exeC:\Windows\System\oCsLcjm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\xJXMDhi.exeC:\Windows\System\xJXMDhi.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\SClfJlR.exeC:\Windows\System\SClfJlR.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\iGuvvdH.exeC:\Windows\System\iGuvvdH.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zNieVyo.exeC:\Windows\System\zNieVyo.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\UQlztaZ.exeC:\Windows\System\UQlztaZ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\FMVHQPu.exeC:\Windows\System\FMVHQPu.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\xfTtiKB.exeC:\Windows\System\xfTtiKB.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\FMVHQPu.exeFilesize
5.9MB
MD5d774656d0ec882caa834a17519594b52
SHA115fb3916ade5d4eeea0f5085b48800e59fa83606
SHA25668b8eb2f537feadbdb44719d575bcef68b6d57fbc1021b3035973be19da9706e
SHA51297e354f184cf2f77fd3471163a94f50534478d508e6a83e868285b4bb5029bfcfc8edeee67a77ec03b24801926551a96c1589033b927b6b44414b6e7d26b0608
-
C:\Windows\system\IOoheHg.exeFilesize
5.9MB
MD55cdc9d661741cb91da511921afccb4de
SHA1ad293ef6f10bc9d166696bff46b05ffdf4a89b17
SHA25626d9802b460a5d8bc6154aeca0abe69b40c95fd90b41e70a629a368eb0205805
SHA512c2b14543eb897ac6dd994457fcb18f7d2b1b3986e3c7c0acb86e9ce040bb955a28e9e8d3ac51426bbfbc63a4371cde170cd5f9284b64a407f9c20fe06063fcf1
-
C:\Windows\system\KMaoRBO.exeFilesize
5.9MB
MD5275abd2a2ba9a08ca4fb06e59702bad6
SHA1026dc6fbfa5fa7de184137cc86a9386127f96881
SHA2563a941edbae3289a08530df777e54e38beb2747cc486cd7f073ce560d187bac2f
SHA512676b10140ec1510d3dce3bf93c96453137072a9f92d16134d5451a665ff588023654438a541b445daed5c49fbf685a66cfe44d3a2b6f7002eb8c83a52b50c4c0
-
C:\Windows\system\MYSnAfA.exeFilesize
5.9MB
MD5b4c0b74d744aee45ecf6714acef7cf3e
SHA137bf5130b8ff62078c484db54eb0c8dc278e5976
SHA25602903a6213e4a86b06f235e0aa6f2c64cbc24888394d6655d23b5dff51ea962a
SHA512a0854f0de8266315c0f4c2072018b36732e54d66cd3e342d0e0dc6a8c56b3a3aea17cf2a8c2bab3a3f562c54fe0a12f3d0413f38f6eb165dd41eacd0a31d111f
-
C:\Windows\system\SClfJlR.exeFilesize
5.9MB
MD50fa420bb399b170b0f6a7a3e48eb694b
SHA179044c9768bd38828cb9be870ad0734c483d2469
SHA256d7662852b525e887594e51eab7dc8ac8c801781bec3f90024c36502e14ff1e85
SHA512609e8fabaf92729667a613db004ca146fabe3dd9fa7e61b1afbf0e52c888a21d4ecda35b7ed4735ae48e17ad1f0a9bea920702ff4fab512ec243e92f047c4b29
-
C:\Windows\system\TjtOXUO.exeFilesize
5.9MB
MD59584f88a916fb23c3cea499cdabe69b8
SHA10b4f777ea817a1e25586f609efc82f38085c5751
SHA25683826d289145a66fce64cd1b143615d3e207e75ddc1756cefb684abab50318e1
SHA51235c15603cf255a4b0e162429d636af846b4f1abdb207c054511aa0fef1523760208aa2bf4e441641e83b8a16f477f77f5a04a54c04b974a68f0e8c0be8710453
-
C:\Windows\system\UQlztaZ.exeFilesize
5.9MB
MD5af9cbb5552be0214215a33986a7b8337
SHA177eb0ae760be86ae493953bbacc7a27c4587b26e
SHA2564e36595c44ac0c1cf47db926ad80319b169bc3a9d2c1da588853e2719195b85e
SHA5120f75051f28e6678208d4d90b58935e5da742e84751df3daf6bd50953811c3e6a291e7530668250ba60c5cfa473414c33a51003d045bb2a33b0c3fc0c2f050836
-
C:\Windows\system\dyrzJeN.exeFilesize
5.9MB
MD5f3fda021e270d30a4a2f80870dab009e
SHA193060ccb503bb04895b8dc883189314b5358c452
SHA2568913961bc82a9902579bed14652250d96c82641509723b7a21a145f05229f814
SHA51221291453efd4a27a4f3a1b0fffa91dd3e4461c686011cf4b53c20acc776b6c736a5a25182fa1d94aa12f891c119e23fbc3e763957db52275b174e0eea2239b29
-
C:\Windows\system\iGuvvdH.exeFilesize
5.9MB
MD55c30cf73ee59a5d14196cb5b48c4db24
SHA160d16a5537294566d3879c2896cf30cd2ba5d4fa
SHA2569cbe8a9e82fd26aaaaf134159b584756d018fc658d2790bc9f011ff76f4cd4df
SHA5120a08d876bf0d780cdf6cacdea4505a5181c3ce9c2e526ce14f9550f59af9e556e556c715a004bb10611081d8be84805fc8e008da19eb80c0b8d8184cd98cc69c
-
C:\Windows\system\wNotxgj.exeFilesize
5.9MB
MD56e5a23f03cea7513a99d3687dd2d85b5
SHA1660b85df5cb563adba2955522ccaca574affe7ab
SHA2561e383d18689a177d0d726253af317fa1d160e59d08c8e0f8f9b16b24d35dbbd3
SHA512c2b893201e35ef587e7cd3ce93598b76158122677347ed67442c546fc455cc2b90ba1f430a929ed5374c486aee4a23a325a7b94c5db40970f1a8eed3c79a69d5
-
C:\Windows\system\wsEuehh.exeFilesize
5.9MB
MD53797b3c55f66656bcabac038d779c1d3
SHA1823206bc57bdb915e60d0166a0d239a0739837ea
SHA2567b895c55cc09a18d9a911d827b89f1a14bbf2aaf0a70f875fd1b036aefedb6dd
SHA5123c5c9717d383d91333dfcdbe46a9f87650125dcf33efb9756d105a6fb6f846a1a927d645fd02ed703f82c65e004194848eb1c50b57f8bec5f1ef5d076dd90daf
-
C:\Windows\system\xJXMDhi.exeFilesize
5.9MB
MD561e61418952bdc252c7ac41760cf06bc
SHA15286b0d19e90eb831eab91105307591a888f216b
SHA256991962c51d697fbdb66d7082f934d99fee49fce86bd82f3e7a3d7dd8748831e3
SHA512dd92e06c467c46f3dfbe95b4d066ddb9fad9020831958a4a66623517d1d16773c4822aaf6b3f6614f2e6ba7d1ec2588bc253bc90ccd1ff927656d7798d5e0b20
-
C:\Windows\system\zNieVyo.exeFilesize
5.9MB
MD594dfba64e63ce76b89932cafa992d609
SHA1dc12b246c5ebe0e5acff6fec2519bdb2756a961c
SHA256a66f38c44d591c2a13975aaae345a7c79b4f098c9a2e330c134ba15f6304369c
SHA5121f6f927eabad324af9c7faa49a77209c9bd58313c4f173ebfb59d1d878d5dd04b64f86c31757b00b59741c8f38b43ed45ee56bd24c50909158175c508ad30aea
-
\Windows\system\BXQFHHt.exeFilesize
5.9MB
MD5619ef588264cbc611358474177ce71bb
SHA165a704c38a23715fa6df967387bc2992a1027d77
SHA2562abad0d6eb83c26d26290763e7d41d172dfa8919a29622c0485cca2930a9b656
SHA512246f92d941d5b6b28712a869943d1147656d123a57bf7657dc565b100fe69fa2196c377a7e96731d0021d6f248660e405e4c2a55f15a2c8622ba497ca0926d25
-
\Windows\system\aOHWWUs.exeFilesize
5.9MB
MD5bf201f930e1a18625ca8816930391fc9
SHA18d5cfd9d932a20687d1cb7f8a61c6e477c3426a3
SHA256c3aefc8ad7925624af6be6f95fb03b6a121f268bd7ca6e7fe959ff6ccf0edc10
SHA5128e1d92210294349bb762c6744b7c9d8e76c323b922121effe4f4ecd7df990cecc0ab5593b292b34de209f5b6b1f21c231cb9f6589f6ede6d2a7c167dc65d9616
-
\Windows\system\bHzQDnN.exeFilesize
5.9MB
MD5a156368ce4b825ece70516e64bdc2640
SHA19a2fcd83c007862f45e4f538e4b26effc8b474fe
SHA256e7cbd62eb51c26a6beb94e764f20755570235edf6e223e1dc78fee714e92a2fc
SHA5124105d4781343cd23ce4593707c7722b2ba62f5fe2dc1433096b9d82c6fd3743fdfec1508dd9c58777fbcb2e971e8d97ebea805c2387e5012976c803efc836a16
-
\Windows\system\cLzyBsd.exeFilesize
5.9MB
MD51bd343ba1307aa72e70a3afbe7b0f953
SHA1f61cb2f76d66e0d631a763ed74563a7ce481c2e8
SHA256b563137aeb9b9f9e3602dfbbca69c2e0d932d3eed70edd1680b7490cfb131acb
SHA51295736db208d4bf97d3ed6756347fd1b3fcfe92387562d36f87fe61c6eb07454d168aeed7bb00149f69d0c6b9b619e61ee45b63170805700d118e662857e6208b
-
\Windows\system\izLMAzd.exeFilesize
5.9MB
MD596c205fb9080365f9dc670fbad2a0d35
SHA1892021b9679716b32a365fb0735e31bb697ebe99
SHA256e3666fcc913c1870feb241511c19f259585c157d0666d5fbfdf64987d6017728
SHA5128eb97f54fcee91a3eff82ca519e67a58a9dd0e32d8dab09a912bfd52bcd4b61a99796e16f2c7b69824caf05b1927825fc3751d7ab339619f0d60f1ddb1bf7248
-
\Windows\system\oCsLcjm.exeFilesize
5.9MB
MD53c78ad00044a8d7e0786878bb240616d
SHA1306b63c18896d5165cde111473578bdd5d8236fa
SHA256b2562d1e7ce5f973115e09df5d0f249d3028a420a0a1ef1bf7e3e7a1b21a08a2
SHA512096aab5feaec1bf77e2ff4832eae917bc71e9bc6aca7a55cd15f4d27d967cc3a85b10d1cb305cd30aacc993d7724bc3b77b6d1136a8b215e28f7f6f2ebc6e01c
-
\Windows\system\pSrZlUz.exeFilesize
5.9MB
MD5e61b44209f6e62d2154753741d348cba
SHA178e621dc2bc859a991a3f18065129b5f2c58e325
SHA2567425e4a18c2ed221fa9bee737619a96df1849f7f3541446d4e7d7aff3cd3c906
SHA512eb8fa29b0bca450b66c56fe7a0b5602ba1592ef56f8620d78e54400f7539db5f855eb652ac207af25b79c6f836485c8e0935d37cadbdc73243a5f65ea6a4ce14
-
\Windows\system\xfTtiKB.exeFilesize
5.9MB
MD57921d781d3e3185603de4d87a84c5198
SHA198465fbc90760d0e5966bde7f9cf75312d59ab41
SHA256e7ded7ccdcb8eb4b1f7ee9c45ea2e14a9ea87f2515ea6b709af253275301eee6
SHA512676f7508659eb27e7b306f76b59d853c1b86cf3a4a5302a2f0be593033cb12d32ce42812b18bbfd6b886ab4e5affa03b36f5393d3cd851a0d0d382e45e587409
-
memory/760-157-0x000000013FA80000-0x000000013FDD4000-memory.dmpFilesize
3.3MB
-
memory/760-144-0x000000013FA80000-0x000000013FDD4000-memory.dmpFilesize
3.3MB
-
memory/760-100-0x000000013FA80000-0x000000013FDD4000-memory.dmpFilesize
3.3MB
-
memory/1924-34-0x000000013F8D0000-0x000000013FC24000-memory.dmpFilesize
3.3MB
-
memory/1924-1-0x000000013FFC0000-0x0000000140314000-memory.dmpFilesize
3.3MB
-
memory/1924-65-0x0000000002300000-0x0000000002654000-memory.dmpFilesize
3.3MB
-
memory/1924-90-0x000000013F1D0000-0x000000013F524000-memory.dmpFilesize
3.3MB
-
memory/1924-0-0x00000000003F0000-0x0000000000400000-memory.dmpFilesize
64KB
-
memory/1924-49-0x000000013F130000-0x000000013F484000-memory.dmpFilesize
3.3MB
-
memory/1924-86-0x0000000002300000-0x0000000002654000-memory.dmpFilesize
3.3MB
-
memory/1924-78-0x000000013FA80000-0x000000013FDD4000-memory.dmpFilesize
3.3MB
-
memory/1924-56-0x000000013FFC0000-0x0000000140314000-memory.dmpFilesize
3.3MB
-
memory/1924-17-0x000000013FAB0000-0x000000013FE04000-memory.dmpFilesize
3.3MB
-
memory/1924-37-0x0000000002300000-0x0000000002654000-memory.dmpFilesize
3.3MB
-
memory/1924-79-0x0000000002300000-0x0000000002654000-memory.dmpFilesize
3.3MB
-
memory/1924-139-0x000000013F230000-0x000000013F584000-memory.dmpFilesize
3.3MB
-
memory/1924-14-0x000000013F260000-0x000000013F5B4000-memory.dmpFilesize
3.3MB
-
memory/1924-142-0x000000013F1D0000-0x000000013F524000-memory.dmpFilesize
3.3MB
-
memory/1924-141-0x0000000002300000-0x0000000002654000-memory.dmpFilesize
3.3MB
-
memory/1924-25-0x000000013F530000-0x000000013F884000-memory.dmpFilesize
3.3MB
-
memory/1924-140-0x000000013FA80000-0x000000013FDD4000-memory.dmpFilesize
3.3MB
-
memory/1924-70-0x000000013F230000-0x000000013F584000-memory.dmpFilesize
3.3MB
-
memory/2056-147-0x000000013F260000-0x000000013F5B4000-memory.dmpFilesize
3.3MB
-
memory/2056-21-0x000000013F260000-0x000000013F5B4000-memory.dmpFilesize
3.3MB
-
memory/2056-84-0x000000013F260000-0x000000013F5B4000-memory.dmpFilesize
3.3MB
-
memory/2320-13-0x000000013FF70000-0x00000001402C4000-memory.dmpFilesize
3.3MB
-
memory/2320-145-0x000000013FF70000-0x00000001402C4000-memory.dmpFilesize
3.3MB
-
memory/2320-57-0x000000013FF70000-0x00000001402C4000-memory.dmpFilesize
3.3MB
-
memory/2408-152-0x000000013F900000-0x000000013FC54000-memory.dmpFilesize
3.3MB
-
memory/2408-63-0x000000013F900000-0x000000013FC54000-memory.dmpFilesize
3.3MB
-
memory/2484-18-0x000000013FAB0000-0x000000013FE04000-memory.dmpFilesize
3.3MB
-
memory/2484-146-0x000000013FAB0000-0x000000013FE04000-memory.dmpFilesize
3.3MB
-
memory/2556-50-0x000000013F130000-0x000000013F484000-memory.dmpFilesize
3.3MB
-
memory/2556-150-0x000000013F130000-0x000000013F484000-memory.dmpFilesize
3.3MB
-
memory/2568-108-0x000000013FEA0000-0x00000001401F4000-memory.dmpFilesize
3.3MB
-
memory/2568-158-0x000000013FEA0000-0x00000001401F4000-memory.dmpFilesize
3.3MB
-
memory/2612-148-0x000000013F530000-0x000000013F884000-memory.dmpFilesize
3.3MB
-
memory/2612-27-0x000000013F530000-0x000000013F884000-memory.dmpFilesize
3.3MB
-
memory/2612-91-0x000000013F530000-0x000000013F884000-memory.dmpFilesize
3.3MB
-
memory/2668-80-0x000000013FD90000-0x00000001400E4000-memory.dmpFilesize
3.3MB
-
memory/2668-154-0x000000013FD90000-0x00000001400E4000-memory.dmpFilesize
3.3MB
-
memory/2700-35-0x000000013F8D0000-0x000000013FC24000-memory.dmpFilesize
3.3MB
-
memory/2700-149-0x000000013F8D0000-0x000000013FC24000-memory.dmpFilesize
3.3MB
-
memory/2700-92-0x000000013F8D0000-0x000000013FC24000-memory.dmpFilesize
3.3MB
-
memory/2720-143-0x000000013F1D0000-0x000000013F524000-memory.dmpFilesize
3.3MB
-
memory/2720-155-0x000000013F1D0000-0x000000013F524000-memory.dmpFilesize
3.3MB
-
memory/2720-93-0x000000013F1D0000-0x000000013F524000-memory.dmpFilesize
3.3MB
-
memory/2816-99-0x000000013FD70000-0x00000001400C4000-memory.dmpFilesize
3.3MB
-
memory/2816-42-0x000000013FD70000-0x00000001400C4000-memory.dmpFilesize
3.3MB
-
memory/2816-151-0x000000013FD70000-0x00000001400C4000-memory.dmpFilesize
3.3MB
-
memory/2904-97-0x000000013F230000-0x000000013F584000-memory.dmpFilesize
3.3MB
-
memory/2904-156-0x000000013F230000-0x000000013F584000-memory.dmpFilesize
3.3MB
-
memory/2908-153-0x000000013F190000-0x000000013F4E4000-memory.dmpFilesize
3.3MB
-
memory/2908-76-0x000000013F190000-0x000000013F4E4000-memory.dmpFilesize
3.3MB