Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 00:10
Behavioral task
behavioral1
Sample
2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240508-en
General
-
Target
2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
c2fe27522f4005d647fdc1b4e3a4b9fa
-
SHA1
972cb5f40809bb35e9cea45f0a3ab045e00be615
-
SHA256
5e950ef4a9d97474734858be635001e4bbf87d895c2c1df1519ba9a0823b33c2
-
SHA512
70d054e17540dc9a4ca8abd076c85d40026ce36dfbe9f8381e42c3f4545a27b201f37a05a858039440bc4e262901e157fc4a12f3d4add3797df6ae253404c160
-
SSDEEP
98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lUQ:Q+856utgpPF8u/7Q
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\WqACcaO.exe cobalt_reflective_dll \Windows\system\WhoTtuV.exe cobalt_reflective_dll C:\Windows\system\ushYuyS.exe cobalt_reflective_dll C:\Windows\system\EKgFJHc.exe cobalt_reflective_dll \Windows\system\FRXIIDn.exe cobalt_reflective_dll C:\Windows\system\CFlOswV.exe cobalt_reflective_dll C:\Windows\system\hQhKKJV.exe cobalt_reflective_dll C:\Windows\system\egzYhee.exe cobalt_reflective_dll \Windows\system\ReNPdbO.exe cobalt_reflective_dll C:\Windows\system\QbfasNE.exe cobalt_reflective_dll C:\Windows\system\aIWNosM.exe cobalt_reflective_dll C:\Windows\system\ZPGtEfO.exe cobalt_reflective_dll \Windows\system\MahYcQZ.exe cobalt_reflective_dll C:\Windows\system\aOxNwMt.exe cobalt_reflective_dll C:\Windows\system\KuZZchi.exe cobalt_reflective_dll C:\Windows\system\wvbKalt.exe cobalt_reflective_dll C:\Windows\system\wLdxPVQ.exe cobalt_reflective_dll C:\Windows\system\xrQTSoA.exe cobalt_reflective_dll C:\Windows\system\OHfHQdG.exe cobalt_reflective_dll C:\Windows\system\ChPgvIM.exe cobalt_reflective_dll C:\Windows\system\jgFjCke.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule \Windows\system\WqACcaO.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\WhoTtuV.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\ushYuyS.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\EKgFJHc.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\FRXIIDn.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\CFlOswV.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\hQhKKJV.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\egzYhee.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\ReNPdbO.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\QbfasNE.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\aIWNosM.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\ZPGtEfO.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\MahYcQZ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\aOxNwMt.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\KuZZchi.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\wvbKalt.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\wLdxPVQ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\xrQTSoA.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\OHfHQdG.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\ChPgvIM.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\jgFjCke.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 58 IoCs
Processes:
resource yara_rule behavioral1/memory/2084-0-0x000000013F4F0000-0x000000013F844000-memory.dmp UPX \Windows\system\WqACcaO.exe UPX \Windows\system\WhoTtuV.exe UPX behavioral1/memory/2648-25-0x000000013F790000-0x000000013FAE4000-memory.dmp UPX behavioral1/memory/2888-30-0x000000013F9C0000-0x000000013FD14000-memory.dmp UPX behavioral1/memory/2240-21-0x000000013F340000-0x000000013F694000-memory.dmp UPX behavioral1/memory/1336-19-0x000000013F800000-0x000000013FB54000-memory.dmp UPX C:\Windows\system\ushYuyS.exe UPX C:\Windows\system\EKgFJHc.exe UPX behavioral1/memory/2084-6-0x0000000002420000-0x0000000002774000-memory.dmp UPX \Windows\system\FRXIIDn.exe UPX behavioral1/memory/2740-40-0x000000013F9D0000-0x000000013FD24000-memory.dmp UPX behavioral1/memory/2576-42-0x000000013F640000-0x000000013F994000-memory.dmp UPX behavioral1/memory/2084-41-0x000000013F4F0000-0x000000013F844000-memory.dmp UPX C:\Windows\system\CFlOswV.exe UPX C:\Windows\system\hQhKKJV.exe UPX behavioral1/memory/2536-51-0x000000013F170000-0x000000013F4C4000-memory.dmp UPX C:\Windows\system\egzYhee.exe UPX behavioral1/memory/2992-59-0x000000013F850000-0x000000013FBA4000-memory.dmp UPX \Windows\system\ReNPdbO.exe UPX behavioral1/memory/1584-66-0x000000013FDE0000-0x0000000140134000-memory.dmp UPX behavioral1/memory/2588-78-0x000000013FC90000-0x000000013FFE4000-memory.dmp UPX C:\Windows\system\QbfasNE.exe UPX behavioral1/memory/2888-96-0x000000013F9C0000-0x000000013FD14000-memory.dmp UPX behavioral1/memory/808-101-0x000000013F4C0000-0x000000013F814000-memory.dmp UPX behavioral1/memory/2844-97-0x000000013FC10000-0x000000013FF64000-memory.dmp UPX C:\Windows\system\aIWNosM.exe UPX C:\Windows\system\ZPGtEfO.exe UPX \Windows\system\MahYcQZ.exe UPX C:\Windows\system\aOxNwMt.exe UPX C:\Windows\system\KuZZchi.exe UPX C:\Windows\system\wvbKalt.exe UPX C:\Windows\system\wLdxPVQ.exe UPX behavioral1/memory/2576-107-0x000000013F640000-0x000000013F994000-memory.dmp UPX C:\Windows\system\xrQTSoA.exe UPX behavioral1/memory/2804-90-0x000000013F080000-0x000000013F3D4000-memory.dmp UPX behavioral1/memory/2828-89-0x000000013F480000-0x000000013F7D4000-memory.dmp UPX C:\Windows\system\OHfHQdG.exe UPX C:\Windows\system\ChPgvIM.exe UPX C:\Windows\system\jgFjCke.exe UPX behavioral1/memory/2648-70-0x000000013F790000-0x000000013FAE4000-memory.dmp UPX behavioral1/memory/2992-139-0x000000013F850000-0x000000013FBA4000-memory.dmp UPX behavioral1/memory/2588-142-0x000000013FC90000-0x000000013FFE4000-memory.dmp UPX behavioral1/memory/2844-145-0x000000013FC10000-0x000000013FF64000-memory.dmp UPX behavioral1/memory/1336-147-0x000000013F800000-0x000000013FB54000-memory.dmp UPX behavioral1/memory/2240-148-0x000000013F340000-0x000000013F694000-memory.dmp UPX behavioral1/memory/2648-149-0x000000013F790000-0x000000013FAE4000-memory.dmp UPX behavioral1/memory/2888-150-0x000000013F9C0000-0x000000013FD14000-memory.dmp UPX behavioral1/memory/2740-151-0x000000013F9D0000-0x000000013FD24000-memory.dmp UPX behavioral1/memory/2576-152-0x000000013F640000-0x000000013F994000-memory.dmp UPX behavioral1/memory/2536-153-0x000000013F170000-0x000000013F4C4000-memory.dmp UPX behavioral1/memory/2992-154-0x000000013F850000-0x000000013FBA4000-memory.dmp UPX behavioral1/memory/1584-155-0x000000013FDE0000-0x0000000140134000-memory.dmp UPX behavioral1/memory/2588-156-0x000000013FC90000-0x000000013FFE4000-memory.dmp UPX behavioral1/memory/2828-157-0x000000013F480000-0x000000013F7D4000-memory.dmp UPX behavioral1/memory/2804-158-0x000000013F080000-0x000000013F3D4000-memory.dmp UPX behavioral1/memory/2844-160-0x000000013FC10000-0x000000013FF64000-memory.dmp UPX behavioral1/memory/808-159-0x000000013F4C0000-0x000000013F814000-memory.dmp UPX -
XMRig Miner payload 60 IoCs
Processes:
resource yara_rule behavioral1/memory/2084-0-0x000000013F4F0000-0x000000013F844000-memory.dmp xmrig \Windows\system\WqACcaO.exe xmrig \Windows\system\WhoTtuV.exe xmrig behavioral1/memory/2648-25-0x000000013F790000-0x000000013FAE4000-memory.dmp xmrig behavioral1/memory/2888-30-0x000000013F9C0000-0x000000013FD14000-memory.dmp xmrig behavioral1/memory/2240-21-0x000000013F340000-0x000000013F694000-memory.dmp xmrig behavioral1/memory/1336-19-0x000000013F800000-0x000000013FB54000-memory.dmp xmrig C:\Windows\system\ushYuyS.exe xmrig C:\Windows\system\EKgFJHc.exe xmrig behavioral1/memory/2084-6-0x0000000002420000-0x0000000002774000-memory.dmp xmrig \Windows\system\FRXIIDn.exe xmrig behavioral1/memory/2740-40-0x000000013F9D0000-0x000000013FD24000-memory.dmp xmrig behavioral1/memory/2576-42-0x000000013F640000-0x000000013F994000-memory.dmp xmrig behavioral1/memory/2084-41-0x000000013F4F0000-0x000000013F844000-memory.dmp xmrig C:\Windows\system\CFlOswV.exe xmrig C:\Windows\system\hQhKKJV.exe xmrig behavioral1/memory/2536-51-0x000000013F170000-0x000000013F4C4000-memory.dmp xmrig C:\Windows\system\egzYhee.exe xmrig behavioral1/memory/2992-59-0x000000013F850000-0x000000013FBA4000-memory.dmp xmrig \Windows\system\ReNPdbO.exe xmrig behavioral1/memory/1584-66-0x000000013FDE0000-0x0000000140134000-memory.dmp xmrig behavioral1/memory/2588-78-0x000000013FC90000-0x000000013FFE4000-memory.dmp xmrig C:\Windows\system\QbfasNE.exe xmrig behavioral1/memory/2888-96-0x000000013F9C0000-0x000000013FD14000-memory.dmp xmrig behavioral1/memory/808-101-0x000000013F4C0000-0x000000013F814000-memory.dmp xmrig behavioral1/memory/2844-97-0x000000013FC10000-0x000000013FF64000-memory.dmp xmrig C:\Windows\system\aIWNosM.exe xmrig C:\Windows\system\ZPGtEfO.exe xmrig \Windows\system\MahYcQZ.exe xmrig C:\Windows\system\aOxNwMt.exe xmrig C:\Windows\system\KuZZchi.exe xmrig C:\Windows\system\wvbKalt.exe xmrig C:\Windows\system\wLdxPVQ.exe xmrig behavioral1/memory/2576-107-0x000000013F640000-0x000000013F994000-memory.dmp xmrig C:\Windows\system\xrQTSoA.exe xmrig behavioral1/memory/2804-90-0x000000013F080000-0x000000013F3D4000-memory.dmp xmrig behavioral1/memory/2828-89-0x000000013F480000-0x000000013F7D4000-memory.dmp xmrig C:\Windows\system\OHfHQdG.exe xmrig C:\Windows\system\ChPgvIM.exe xmrig C:\Windows\system\jgFjCke.exe xmrig behavioral1/memory/2648-70-0x000000013F790000-0x000000013FAE4000-memory.dmp xmrig behavioral1/memory/2992-139-0x000000013F850000-0x000000013FBA4000-memory.dmp xmrig behavioral1/memory/2084-140-0x000000013FDE0000-0x0000000140134000-memory.dmp xmrig behavioral1/memory/2084-141-0x000000013FC90000-0x000000013FFE4000-memory.dmp xmrig behavioral1/memory/2588-142-0x000000013FC90000-0x000000013FFE4000-memory.dmp xmrig behavioral1/memory/2844-145-0x000000013FC10000-0x000000013FF64000-memory.dmp xmrig behavioral1/memory/1336-147-0x000000013F800000-0x000000013FB54000-memory.dmp xmrig behavioral1/memory/2240-148-0x000000013F340000-0x000000013F694000-memory.dmp xmrig behavioral1/memory/2648-149-0x000000013F790000-0x000000013FAE4000-memory.dmp xmrig behavioral1/memory/2888-150-0x000000013F9C0000-0x000000013FD14000-memory.dmp xmrig behavioral1/memory/2740-151-0x000000013F9D0000-0x000000013FD24000-memory.dmp xmrig behavioral1/memory/2576-152-0x000000013F640000-0x000000013F994000-memory.dmp xmrig behavioral1/memory/2536-153-0x000000013F170000-0x000000013F4C4000-memory.dmp xmrig behavioral1/memory/2992-154-0x000000013F850000-0x000000013FBA4000-memory.dmp xmrig behavioral1/memory/1584-155-0x000000013FDE0000-0x0000000140134000-memory.dmp xmrig behavioral1/memory/2588-156-0x000000013FC90000-0x000000013FFE4000-memory.dmp xmrig behavioral1/memory/2828-157-0x000000013F480000-0x000000013F7D4000-memory.dmp xmrig behavioral1/memory/2804-158-0x000000013F080000-0x000000013F3D4000-memory.dmp xmrig behavioral1/memory/2844-160-0x000000013FC10000-0x000000013FF64000-memory.dmp xmrig behavioral1/memory/808-159-0x000000013F4C0000-0x000000013F814000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
WqACcaO.exeushYuyS.exeWhoTtuV.exeEKgFJHc.exeCFlOswV.exeFRXIIDn.exehQhKKJV.exeegzYhee.exeReNPdbO.exeQbfasNE.exeChPgvIM.exeOHfHQdG.exeaIWNosM.exejgFjCke.exeZPGtEfO.exexrQTSoA.exewLdxPVQ.exewvbKalt.exeKuZZchi.exeaOxNwMt.exeMahYcQZ.exepid process 1336 WqACcaO.exe 2240 ushYuyS.exe 2648 WhoTtuV.exe 2888 EKgFJHc.exe 2740 CFlOswV.exe 2576 FRXIIDn.exe 2536 hQhKKJV.exe 2992 egzYhee.exe 1584 ReNPdbO.exe 2588 QbfasNE.exe 2828 ChPgvIM.exe 2804 OHfHQdG.exe 2844 aIWNosM.exe 808 jgFjCke.exe 340 ZPGtEfO.exe 1860 xrQTSoA.exe 1616 wLdxPVQ.exe 1496 wvbKalt.exe 1684 KuZZchi.exe 1564 aOxNwMt.exe 1380 MahYcQZ.exe -
Loads dropped DLL 21 IoCs
Processes:
2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exepid process 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe -
Processes:
resource yara_rule behavioral1/memory/2084-0-0x000000013F4F0000-0x000000013F844000-memory.dmp upx \Windows\system\WqACcaO.exe upx \Windows\system\WhoTtuV.exe upx behavioral1/memory/2648-25-0x000000013F790000-0x000000013FAE4000-memory.dmp upx behavioral1/memory/2888-30-0x000000013F9C0000-0x000000013FD14000-memory.dmp upx behavioral1/memory/2240-21-0x000000013F340000-0x000000013F694000-memory.dmp upx behavioral1/memory/1336-19-0x000000013F800000-0x000000013FB54000-memory.dmp upx C:\Windows\system\ushYuyS.exe upx C:\Windows\system\EKgFJHc.exe upx behavioral1/memory/2084-6-0x0000000002420000-0x0000000002774000-memory.dmp upx \Windows\system\FRXIIDn.exe upx behavioral1/memory/2740-40-0x000000013F9D0000-0x000000013FD24000-memory.dmp upx behavioral1/memory/2576-42-0x000000013F640000-0x000000013F994000-memory.dmp upx behavioral1/memory/2084-41-0x000000013F4F0000-0x000000013F844000-memory.dmp upx C:\Windows\system\CFlOswV.exe upx C:\Windows\system\hQhKKJV.exe upx behavioral1/memory/2536-51-0x000000013F170000-0x000000013F4C4000-memory.dmp upx C:\Windows\system\egzYhee.exe upx behavioral1/memory/2084-56-0x0000000002420000-0x0000000002774000-memory.dmp upx behavioral1/memory/2992-59-0x000000013F850000-0x000000013FBA4000-memory.dmp upx \Windows\system\ReNPdbO.exe upx behavioral1/memory/1584-66-0x000000013FDE0000-0x0000000140134000-memory.dmp upx behavioral1/memory/2588-78-0x000000013FC90000-0x000000013FFE4000-memory.dmp upx C:\Windows\system\QbfasNE.exe upx behavioral1/memory/2888-96-0x000000013F9C0000-0x000000013FD14000-memory.dmp upx behavioral1/memory/808-101-0x000000013F4C0000-0x000000013F814000-memory.dmp upx behavioral1/memory/2844-97-0x000000013FC10000-0x000000013FF64000-memory.dmp upx C:\Windows\system\aIWNosM.exe upx C:\Windows\system\ZPGtEfO.exe upx \Windows\system\MahYcQZ.exe upx C:\Windows\system\aOxNwMt.exe upx C:\Windows\system\KuZZchi.exe upx C:\Windows\system\wvbKalt.exe upx C:\Windows\system\wLdxPVQ.exe upx behavioral1/memory/2576-107-0x000000013F640000-0x000000013F994000-memory.dmp upx C:\Windows\system\xrQTSoA.exe upx behavioral1/memory/2804-90-0x000000013F080000-0x000000013F3D4000-memory.dmp upx behavioral1/memory/2828-89-0x000000013F480000-0x000000013F7D4000-memory.dmp upx C:\Windows\system\OHfHQdG.exe upx C:\Windows\system\ChPgvIM.exe upx C:\Windows\system\jgFjCke.exe upx behavioral1/memory/2648-70-0x000000013F790000-0x000000013FAE4000-memory.dmp upx behavioral1/memory/2992-139-0x000000013F850000-0x000000013FBA4000-memory.dmp upx behavioral1/memory/2588-142-0x000000013FC90000-0x000000013FFE4000-memory.dmp upx behavioral1/memory/2844-145-0x000000013FC10000-0x000000013FF64000-memory.dmp upx behavioral1/memory/1336-147-0x000000013F800000-0x000000013FB54000-memory.dmp upx behavioral1/memory/2240-148-0x000000013F340000-0x000000013F694000-memory.dmp upx behavioral1/memory/2648-149-0x000000013F790000-0x000000013FAE4000-memory.dmp upx behavioral1/memory/2888-150-0x000000013F9C0000-0x000000013FD14000-memory.dmp upx behavioral1/memory/2740-151-0x000000013F9D0000-0x000000013FD24000-memory.dmp upx behavioral1/memory/2576-152-0x000000013F640000-0x000000013F994000-memory.dmp upx behavioral1/memory/2536-153-0x000000013F170000-0x000000013F4C4000-memory.dmp upx behavioral1/memory/2992-154-0x000000013F850000-0x000000013FBA4000-memory.dmp upx behavioral1/memory/1584-155-0x000000013FDE0000-0x0000000140134000-memory.dmp upx behavioral1/memory/2588-156-0x000000013FC90000-0x000000013FFE4000-memory.dmp upx behavioral1/memory/2828-157-0x000000013F480000-0x000000013F7D4000-memory.dmp upx behavioral1/memory/2804-158-0x000000013F080000-0x000000013F3D4000-memory.dmp upx behavioral1/memory/2844-160-0x000000013FC10000-0x000000013FF64000-memory.dmp upx behavioral1/memory/808-159-0x000000013F4C0000-0x000000013F814000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exedescription ioc process File created C:\Windows\System\CFlOswV.exe 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\FRXIIDn.exe 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\QbfasNE.exe 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\aIWNosM.exe 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\wvbKalt.exe 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\WhoTtuV.exe 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\OHfHQdG.exe 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\KuZZchi.exe 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\WqACcaO.exe 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ushYuyS.exe 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\EKgFJHc.exe 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ChPgvIM.exe 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\xrQTSoA.exe 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\MahYcQZ.exe 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\hQhKKJV.exe 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\egzYhee.exe 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ReNPdbO.exe 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\jgFjCke.exe 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ZPGtEfO.exe 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\wLdxPVQ.exe 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\aOxNwMt.exe 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process Token: SeLockMemoryPrivilege 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process target process PID 2084 wrote to memory of 1336 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe WqACcaO.exe PID 2084 wrote to memory of 1336 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe WqACcaO.exe PID 2084 wrote to memory of 1336 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe WqACcaO.exe PID 2084 wrote to memory of 2240 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe ushYuyS.exe PID 2084 wrote to memory of 2240 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe ushYuyS.exe PID 2084 wrote to memory of 2240 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe ushYuyS.exe PID 2084 wrote to memory of 2648 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe WhoTtuV.exe PID 2084 wrote to memory of 2648 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe WhoTtuV.exe PID 2084 wrote to memory of 2648 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe WhoTtuV.exe PID 2084 wrote to memory of 2888 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe EKgFJHc.exe PID 2084 wrote to memory of 2888 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe EKgFJHc.exe PID 2084 wrote to memory of 2888 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe EKgFJHc.exe PID 2084 wrote to memory of 2740 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe CFlOswV.exe PID 2084 wrote to memory of 2740 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe CFlOswV.exe PID 2084 wrote to memory of 2740 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe CFlOswV.exe PID 2084 wrote to memory of 2576 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe FRXIIDn.exe PID 2084 wrote to memory of 2576 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe FRXIIDn.exe PID 2084 wrote to memory of 2576 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe FRXIIDn.exe PID 2084 wrote to memory of 2536 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe hQhKKJV.exe PID 2084 wrote to memory of 2536 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe hQhKKJV.exe PID 2084 wrote to memory of 2536 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe hQhKKJV.exe PID 2084 wrote to memory of 2992 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe egzYhee.exe PID 2084 wrote to memory of 2992 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe egzYhee.exe PID 2084 wrote to memory of 2992 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe egzYhee.exe PID 2084 wrote to memory of 1584 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe ReNPdbO.exe PID 2084 wrote to memory of 1584 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe ReNPdbO.exe PID 2084 wrote to memory of 1584 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe ReNPdbO.exe PID 2084 wrote to memory of 2588 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe QbfasNE.exe PID 2084 wrote to memory of 2588 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe QbfasNE.exe PID 2084 wrote to memory of 2588 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe QbfasNE.exe PID 2084 wrote to memory of 2804 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe OHfHQdG.exe PID 2084 wrote to memory of 2804 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe OHfHQdG.exe PID 2084 wrote to memory of 2804 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe OHfHQdG.exe PID 2084 wrote to memory of 2828 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe ChPgvIM.exe PID 2084 wrote to memory of 2828 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe ChPgvIM.exe PID 2084 wrote to memory of 2828 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe ChPgvIM.exe PID 2084 wrote to memory of 2844 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe aIWNosM.exe PID 2084 wrote to memory of 2844 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe aIWNosM.exe PID 2084 wrote to memory of 2844 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe aIWNosM.exe PID 2084 wrote to memory of 808 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe jgFjCke.exe PID 2084 wrote to memory of 808 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe jgFjCke.exe PID 2084 wrote to memory of 808 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe jgFjCke.exe PID 2084 wrote to memory of 340 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe ZPGtEfO.exe PID 2084 wrote to memory of 340 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe ZPGtEfO.exe PID 2084 wrote to memory of 340 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe ZPGtEfO.exe PID 2084 wrote to memory of 1860 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe xrQTSoA.exe PID 2084 wrote to memory of 1860 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe xrQTSoA.exe PID 2084 wrote to memory of 1860 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe xrQTSoA.exe PID 2084 wrote to memory of 1616 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe wLdxPVQ.exe PID 2084 wrote to memory of 1616 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe wLdxPVQ.exe PID 2084 wrote to memory of 1616 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe wLdxPVQ.exe PID 2084 wrote to memory of 1496 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe wvbKalt.exe PID 2084 wrote to memory of 1496 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe wvbKalt.exe PID 2084 wrote to memory of 1496 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe wvbKalt.exe PID 2084 wrote to memory of 1684 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe KuZZchi.exe PID 2084 wrote to memory of 1684 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe KuZZchi.exe PID 2084 wrote to memory of 1684 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe KuZZchi.exe PID 2084 wrote to memory of 1564 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe aOxNwMt.exe PID 2084 wrote to memory of 1564 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe aOxNwMt.exe PID 2084 wrote to memory of 1564 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe aOxNwMt.exe PID 2084 wrote to memory of 1380 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe MahYcQZ.exe PID 2084 wrote to memory of 1380 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe MahYcQZ.exe PID 2084 wrote to memory of 1380 2084 2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe MahYcQZ.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-27_c2fe27522f4005d647fdc1b4e3a4b9fa_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\WqACcaO.exeC:\Windows\System\WqACcaO.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ushYuyS.exeC:\Windows\System\ushYuyS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\WhoTtuV.exeC:\Windows\System\WhoTtuV.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\EKgFJHc.exeC:\Windows\System\EKgFJHc.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CFlOswV.exeC:\Windows\System\CFlOswV.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\FRXIIDn.exeC:\Windows\System\FRXIIDn.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\hQhKKJV.exeC:\Windows\System\hQhKKJV.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\egzYhee.exeC:\Windows\System\egzYhee.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ReNPdbO.exeC:\Windows\System\ReNPdbO.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\QbfasNE.exeC:\Windows\System\QbfasNE.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\OHfHQdG.exeC:\Windows\System\OHfHQdG.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ChPgvIM.exeC:\Windows\System\ChPgvIM.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aIWNosM.exeC:\Windows\System\aIWNosM.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\jgFjCke.exeC:\Windows\System\jgFjCke.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ZPGtEfO.exeC:\Windows\System\ZPGtEfO.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\xrQTSoA.exeC:\Windows\System\xrQTSoA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wLdxPVQ.exeC:\Windows\System\wLdxPVQ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wvbKalt.exeC:\Windows\System\wvbKalt.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\KuZZchi.exeC:\Windows\System\KuZZchi.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aOxNwMt.exeC:\Windows\System\aOxNwMt.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\MahYcQZ.exeC:\Windows\System\MahYcQZ.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\CFlOswV.exeFilesize
5.9MB
MD54c2700265a477514ae869b928004b222
SHA1487b9e44140b5de743d73c35e5358deb55b75adf
SHA2563549d964391710c9a7bba11604775bcb06fab93d5cfa9c5d6a26c4964bc43c5a
SHA512f4d170692823b74b42c3cd354ad3b348658f4ead4c62f4201eb4de5fad099ed515f056b499d0c2c64fcde7b1449c09e9534122e0035f9d338db6b49f18eebea3
-
C:\Windows\system\ChPgvIM.exeFilesize
5.9MB
MD5107ce33af51165d9d8e39381a0cb3f33
SHA15a8d57c4a3dc77b299219b5572e51ba132c3475b
SHA256f40e726410ff595ee4ec48315a654b5491435f7c69d1303c316aeed2d41cbffd
SHA512f70671c8decdbe250bc6aea490df75a40f9561a0843d8492fa920d78c392ea08b42d12ad58fdebe03fbfd8cc36dddfb861c6755bc110552dee636de6a94cfad1
-
C:\Windows\system\EKgFJHc.exeFilesize
5.9MB
MD5660ed8b15812fb92ee3e08432107c291
SHA1f8b904709b37f30df67d76f22607c828658765a2
SHA256ea382f7f86598247c64d0c224ebbf9ec470611de891d03dae2458409eac3e1e0
SHA5129b1837a9b586b968476e831823faa56b7c3b0b0442d493f0e11b47f7042aba68bcc4ffebae9a0e120e6588fbcda95cf0bc2a9c27b84c09dd2e9e27cdbe49c9b1
-
C:\Windows\system\KuZZchi.exeFilesize
5.9MB
MD556b2d82381019dda9e83bfa53cd63566
SHA1489e1abd1bb6c9362cb7ed8b64140c156d8221c1
SHA25631d68223a7fec7e58d8ca14817f5915b727dc57b12684a8732113340c06b9418
SHA512ae406e51571608fdf5b30e81306eb5a368d4b49137910d6da018eaa2daa7f68471a101d3ae9de505af0b37bbb5e0462ad06f2845a383bb4d45b92ac2d64b2fee
-
C:\Windows\system\OHfHQdG.exeFilesize
5.9MB
MD5ea31510d93f3d1764cb3fa210c7050dd
SHA13bcd0ae6f50b1696dc657e3fb76b0c76872ff1bb
SHA25649004d3532cd0fe44acf071aa526ee95d263d69b16c75b2a3474ae5a53601cf5
SHA512b2f872a5a131a282fbb9c0269b586fc73300811322b02924318289e758ebac55be2cf6729629b644fcfb9c3a9908cf160c1d283918e876945b898bb05bc334ef
-
C:\Windows\system\QbfasNE.exeFilesize
5.9MB
MD56618ca68d1fbda48657357e707660294
SHA1c1a2fae97f457f313d995f595dca7b05a792f50c
SHA25672ac63c051370672a376bacaed3b6a08ec22d52ba8dd240b6af3b76228c8182a
SHA512bf58202f2fd311be41c175ca1ca2fd4632d0d0ecdba6068c77898449f8ed45644f809d1f6b18d8226aefd1ab680567169bb97a5367c62d5a22cd739459aa877c
-
C:\Windows\system\ZPGtEfO.exeFilesize
5.9MB
MD50d84652e9ad70d950880f1cc836187d0
SHA1b453a900b60f870c1b75636eb6f5dcaf59f76bba
SHA256aeb4f615a9b6469fa28f74853875d89640e3198b3fadfa4180026367c599cb39
SHA5127d6f585526a820a23f4d9e3b01845a25ed6e309c7a80cf43db6c779bf45125c0a7f8f64e40744255bc50d4a19a17538041d4716c187c1d9922b751d9ef671f61
-
C:\Windows\system\aIWNosM.exeFilesize
5.9MB
MD5c85977f95230e125ab8b12a5f2556a6a
SHA1affc4b48cb49fb1cccf2f7f7d487c0cbe8d6c9fd
SHA25627128ad88d077d2ad4edde2fca3a082155d69f59710643b57b58c3b5530c72d1
SHA512168dcf782ec5d48e0978d2e5b4a6504ea5c90b4e01fd095bd263fd98bd9d17e64640efb2b778f2455e32749529b08191bbf38814eda40e52e5a6ecc894c138c1
-
C:\Windows\system\aOxNwMt.exeFilesize
5.9MB
MD58c3024f86303362435c96d7de765be5e
SHA17b77dda01a4a03cb3b9968ef810c506acb423396
SHA256198ba9c4ef29194aa9e4adbea9dd13d1a069e720cc61a1e9b389fe87ae02f087
SHA512705a88a6b90c3e1ad2f916247dc470c424f69b2a9c2c1aa8134f4ceac9cf63125716900ef7de60b44606f13c92a2452a9565d96c5ee17adc916a419d47a48c14
-
C:\Windows\system\egzYhee.exeFilesize
5.9MB
MD5421952eba9ae773cca0c5e47367a7984
SHA12744cb3b7e5fb9eaf378323fc4549efafe7936ee
SHA256a28308ff574f7c95d2c2aea421938ad22f5aed932342f356624a8adf404c0869
SHA512c410926238faa4fae2b30667e8d081b25953200dbfcd8cc8036d33b785bcf824aa3dcc2ac0e90de6535c2af16835a53869fe9fdaec37b6824209c3233c664515
-
C:\Windows\system\hQhKKJV.exeFilesize
5.9MB
MD5e0483791709f07396a89b81baafe2a5f
SHA16ba9128db7ed7d30ce6e49fa655bdddc13da3b2d
SHA2564eb09f8a1b17c24817d2d244f3d9fbad1a1009c12d17c97d557707797ae1688f
SHA51203a8eb3629be98091c5eedbffc8dc4332a62a9c5ff212b0997c4ec4e54df4a604beb06dd3f5d4227e80ee72cc46dc8b9215e7af7bef56af74c94c6a6677791ab
-
C:\Windows\system\jgFjCke.exeFilesize
5.9MB
MD58a83d5c75f9a25ddd6ac868ef457fb89
SHA1ece777369aa1878fe91be83cce01da455b1e35b8
SHA256d6fed4710d31e81dbea5cecd1a48be1e5e63c40346c0ad6f6a28a5b8af7b249b
SHA5126cbcb3903b9b377267cfb5a49cec25dd05d4733fc8e29ef1b50a225d2ccc039ab993a7b8002742686f0bc87626236932bc27baabed0208b0a2653cffc5afcb4e
-
C:\Windows\system\ushYuyS.exeFilesize
5.9MB
MD5ebea477ca9eaf038b389b28b5a6eeb25
SHA150bda73ec4f69c3252d2f2bfbb913bfd1f65027d
SHA256f84497ce3340369cd837f350919b06afb351fab2b62c4d0b78c3241011946f96
SHA5121de9aa441079553cf36e80f0786ae7abd4f80fa21b6a3a5f92e2019d56d893b219988da1ecba39d7be8d8266d05db8c0bc9b55a8c0e7b49b37e84d412276efe7
-
C:\Windows\system\wLdxPVQ.exeFilesize
5.9MB
MD5c91fdbc000d57cf428d1a6cfc9e214c1
SHA17080b7dd6187a432645a3c1e727bf89786c47eeb
SHA2567f9ce5e4c87f25011517827b326d4c131279f33159a4982e689378bc72fc5ebd
SHA51217366b931353865aa1bb630a819eff85d43a491286a1cc58100bc565cce528ca355aeb76f3b1a17688719d228e809bd3e023cfa492f5c23909c435e9b7ebc162
-
C:\Windows\system\wvbKalt.exeFilesize
5.9MB
MD5de1133e02163229a539f3451ddada152
SHA1d0e026f51d46781903f90d649cdbde1cc366ef56
SHA256a5165d5819a188b664da232c09174fece6f3fab1ff98020b5007fafd49b42a6a
SHA512eb056a7cf35a61c80aef7a41ec88bb0bf02a67009142b00e1670ac6d4e71d89ad5b3bd852e1f64429b14897941f9ed38647855ca2f7f459e9612c1b61e50bb54
-
C:\Windows\system\xrQTSoA.exeFilesize
5.9MB
MD50d3fb20c3db1ae04e271510e002fa2cb
SHA1b46f1795b03fb84c2591cb3fdff92f0584c65a2a
SHA2568b6de5bf8d8e29651e090dc7dbe17ee3b5a7c21a41c8020ec2a52c3a7f537292
SHA512ef87ca9a4b9ce32d00593a3b7473556a18bd466d17975dd416e96ba0a87e07fc161e4dcb76834a38522b502a77376a40c004e4a5f9b4cb4ce7593fe98cba0c70
-
\Windows\system\FRXIIDn.exeFilesize
5.9MB
MD50c00286b484e1015a3af70fcd20fac6b
SHA134a6462cd3eb145c4ae67c19af0f3fa206d474f6
SHA25628028adbe0569f12f6782ed963537a50d3eaae4fe7243aaa9c53041109c09735
SHA5120b53a505836660962d325b1d28ab3f5df21b62401b521c2827801ce12c4a38211e9f441e97b4769656aa0b4401b030f712534177243be9af56b3b767d557ba42
-
\Windows\system\MahYcQZ.exeFilesize
5.9MB
MD5eec06933508c1ade25bed401dc66e446
SHA1c9bdf5bc6083f4cd7a0cb503e04dcfd553d9f6fa
SHA2568883724078a7053d4d1f41576bc8ee44a89399b4f5928fbf1ff97b2d4a474821
SHA51221cbd09947f6433a2d6b284cab306de9d2c8151c1c470a5ce1b723f04fc4d0dc49ec414b048f5a38ac64085e74eb63399a4c0a00120d4e0fd26704a0417800d7
-
\Windows\system\ReNPdbO.exeFilesize
5.9MB
MD51a63f03d3fcc47a945a2ce9b35869b49
SHA17d4abdbd3ac139d1deea0f8b68d4acced3fc60d7
SHA2564d01c0b6d463b7dbaa4b0b06b4a49da8d2b46b43aa10d23c65895cfe6f6c05c7
SHA51280bb2d98e2bdc3f55597c6a91a579597ee8b8d50cae12410e1adb7086eb8790511d42a00c7ef1122acdc9d8e5f414e7bb3a92b3c6909676f44cb5aadfe79949e
-
\Windows\system\WhoTtuV.exeFilesize
5.9MB
MD5b23b6c2b803a9a42909247ef7727e250
SHA1becbe66505e7e67734524d2a19700bdb151d20ad
SHA256519ae91e68a12973dda338cc593e421dced7875f6bcde31539786a2a52e91643
SHA51242d0bf19f31fb516cac11cf87ed75cc7f346eb57688c91a65db11b64dad2c52dd22a7a174c894c908fdbec3aeaae17bf5d5f3b32cf5220ab0994a503cf23855c
-
\Windows\system\WqACcaO.exeFilesize
5.9MB
MD58b96c595c1dae64314892bc4fdf35487
SHA18d14ffe2374f836edce80c3b4e1552eed0f32c11
SHA2567b383c5eeba71bbfd156b1d431cdb4d23d2df84ff1f32938a5a0078e013d86b0
SHA512e0b687e07fb1e83819a038129467be5de71c4b63cb292eb0f7eb80906a3a7c25131bb125301ba0e8dfd882bee46670d4236615417a726211e92ab1f3d1a3b603
-
memory/808-101-0x000000013F4C0000-0x000000013F814000-memory.dmpFilesize
3.3MB
-
memory/808-159-0x000000013F4C0000-0x000000013F814000-memory.dmpFilesize
3.3MB
-
memory/1336-19-0x000000013F800000-0x000000013FB54000-memory.dmpFilesize
3.3MB
-
memory/1336-147-0x000000013F800000-0x000000013FB54000-memory.dmpFilesize
3.3MB
-
memory/1584-155-0x000000013FDE0000-0x0000000140134000-memory.dmpFilesize
3.3MB
-
memory/1584-66-0x000000013FDE0000-0x0000000140134000-memory.dmpFilesize
3.3MB
-
memory/2084-38-0x000000013F9D0000-0x000000013FD24000-memory.dmpFilesize
3.3MB
-
memory/2084-65-0x000000013FDE0000-0x0000000140134000-memory.dmpFilesize
3.3MB
-
memory/2084-57-0x000000013F850000-0x000000013FBA4000-memory.dmpFilesize
3.3MB
-
memory/2084-1-0x00000000000F0000-0x0000000000100000-memory.dmpFilesize
64KB
-
memory/2084-12-0x0000000002420000-0x0000000002774000-memory.dmpFilesize
3.3MB
-
memory/2084-140-0x000000013FDE0000-0x0000000140134000-memory.dmpFilesize
3.3MB
-
memory/2084-56-0x0000000002420000-0x0000000002774000-memory.dmpFilesize
3.3MB
-
memory/2084-100-0x0000000002420000-0x0000000002774000-memory.dmpFilesize
3.3MB
-
memory/2084-17-0x0000000002420000-0x0000000002774000-memory.dmpFilesize
3.3MB
-
memory/2084-87-0x0000000002420000-0x0000000002774000-memory.dmpFilesize
3.3MB
-
memory/2084-49-0x000000013F170000-0x000000013F4C4000-memory.dmpFilesize
3.3MB
-
memory/2084-0-0x000000013F4F0000-0x000000013F844000-memory.dmpFilesize
3.3MB
-
memory/2084-41-0x000000013F4F0000-0x000000013F844000-memory.dmpFilesize
3.3MB
-
memory/2084-138-0x000000013F850000-0x000000013FBA4000-memory.dmpFilesize
3.3MB
-
memory/2084-146-0x000000013F880000-0x000000013FBD4000-memory.dmpFilesize
3.3MB
-
memory/2084-6-0x0000000002420000-0x0000000002774000-memory.dmpFilesize
3.3MB
-
memory/2084-108-0x000000013F880000-0x000000013FBD4000-memory.dmpFilesize
3.3MB
-
memory/2084-144-0x0000000002420000-0x0000000002774000-memory.dmpFilesize
3.3MB
-
memory/2084-28-0x000000013F9C0000-0x000000013FD14000-memory.dmpFilesize
3.3MB
-
memory/2084-143-0x000000013F080000-0x000000013F3D4000-memory.dmpFilesize
3.3MB
-
memory/2084-141-0x000000013FC90000-0x000000013FFE4000-memory.dmpFilesize
3.3MB
-
memory/2084-88-0x000000013FC10000-0x000000013FF64000-memory.dmpFilesize
3.3MB
-
memory/2240-148-0x000000013F340000-0x000000013F694000-memory.dmpFilesize
3.3MB
-
memory/2240-21-0x000000013F340000-0x000000013F694000-memory.dmpFilesize
3.3MB
-
memory/2536-51-0x000000013F170000-0x000000013F4C4000-memory.dmpFilesize
3.3MB
-
memory/2536-153-0x000000013F170000-0x000000013F4C4000-memory.dmpFilesize
3.3MB
-
memory/2576-42-0x000000013F640000-0x000000013F994000-memory.dmpFilesize
3.3MB
-
memory/2576-152-0x000000013F640000-0x000000013F994000-memory.dmpFilesize
3.3MB
-
memory/2576-107-0x000000013F640000-0x000000013F994000-memory.dmpFilesize
3.3MB
-
memory/2588-142-0x000000013FC90000-0x000000013FFE4000-memory.dmpFilesize
3.3MB
-
memory/2588-156-0x000000013FC90000-0x000000013FFE4000-memory.dmpFilesize
3.3MB
-
memory/2588-78-0x000000013FC90000-0x000000013FFE4000-memory.dmpFilesize
3.3MB
-
memory/2648-25-0x000000013F790000-0x000000013FAE4000-memory.dmpFilesize
3.3MB
-
memory/2648-149-0x000000013F790000-0x000000013FAE4000-memory.dmpFilesize
3.3MB
-
memory/2648-70-0x000000013F790000-0x000000013FAE4000-memory.dmpFilesize
3.3MB
-
memory/2740-40-0x000000013F9D0000-0x000000013FD24000-memory.dmpFilesize
3.3MB
-
memory/2740-151-0x000000013F9D0000-0x000000013FD24000-memory.dmpFilesize
3.3MB
-
memory/2804-90-0x000000013F080000-0x000000013F3D4000-memory.dmpFilesize
3.3MB
-
memory/2804-158-0x000000013F080000-0x000000013F3D4000-memory.dmpFilesize
3.3MB
-
memory/2828-89-0x000000013F480000-0x000000013F7D4000-memory.dmpFilesize
3.3MB
-
memory/2828-157-0x000000013F480000-0x000000013F7D4000-memory.dmpFilesize
3.3MB
-
memory/2844-97-0x000000013FC10000-0x000000013FF64000-memory.dmpFilesize
3.3MB
-
memory/2844-145-0x000000013FC10000-0x000000013FF64000-memory.dmpFilesize
3.3MB
-
memory/2844-160-0x000000013FC10000-0x000000013FF64000-memory.dmpFilesize
3.3MB
-
memory/2888-96-0x000000013F9C0000-0x000000013FD14000-memory.dmpFilesize
3.3MB
-
memory/2888-150-0x000000013F9C0000-0x000000013FD14000-memory.dmpFilesize
3.3MB
-
memory/2888-30-0x000000013F9C0000-0x000000013FD14000-memory.dmpFilesize
3.3MB
-
memory/2992-154-0x000000013F850000-0x000000013FBA4000-memory.dmpFilesize
3.3MB
-
memory/2992-59-0x000000013F850000-0x000000013FBA4000-memory.dmpFilesize
3.3MB
-
memory/2992-139-0x000000013F850000-0x000000013FBA4000-memory.dmpFilesize
3.3MB