Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 07:49
Behavioral task
behavioral1
Sample
2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20231129-en
General
-
Target
2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
08966a06b7f762db90c1966d10fed0ba
-
SHA1
29eae01abdc9c6a884e5fd013fd7eff3cc45d8ae
-
SHA256
9f63450d285f1d7b000b9f3730f9d1e81a3baf43e9a8164ff12bf4c54937c9e3
-
SHA512
92dca6a79edfca9fb84cd3dd6b6643e994f6e6ba21b19d50a0120c7a5dd9fba9067ffce98f6a7d27d8de594d3613604158d0743de1150a7a250672a82d8b092f
-
SSDEEP
98304:oemTLkNdfE0pZrt56utgpPFotBER/mQ32lUE:T+856utgpPF8u/7E
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\OdtsMqK.exe cobalt_reflective_dll \Windows\system\rhctgvZ.exe cobalt_reflective_dll C:\Windows\system\PyvgALk.exe cobalt_reflective_dll C:\Windows\system\RcgrNEG.exe cobalt_reflective_dll C:\Windows\system\RmdIWuD.exe cobalt_reflective_dll C:\Windows\system\QRJbpSF.exe cobalt_reflective_dll C:\Windows\system\OvPkODC.exe cobalt_reflective_dll \Windows\system\kxTzmfC.exe cobalt_reflective_dll \Windows\system\TbticyZ.exe cobalt_reflective_dll C:\Windows\system\HNSckit.exe cobalt_reflective_dll \Windows\system\Rwntsgo.exe cobalt_reflective_dll C:\Windows\system\BoXaozE.exe cobalt_reflective_dll \Windows\system\qlSBgqW.exe cobalt_reflective_dll C:\Windows\system\CSgtXQS.exe cobalt_reflective_dll \Windows\system\BVprAzH.exe cobalt_reflective_dll C:\Windows\system\oGOxqZI.exe cobalt_reflective_dll C:\Windows\system\UxdOxDI.exe cobalt_reflective_dll C:\Windows\system\CjlIUyL.exe cobalt_reflective_dll C:\Windows\system\GGtNIZX.exe cobalt_reflective_dll C:\Windows\system\yIcxNxM.exe cobalt_reflective_dll C:\Windows\system\zwKtAqk.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule \Windows\system\OdtsMqK.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\rhctgvZ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\PyvgALk.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\RcgrNEG.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\RmdIWuD.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\QRJbpSF.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\OvPkODC.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\kxTzmfC.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\TbticyZ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\HNSckit.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\Rwntsgo.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\BoXaozE.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\qlSBgqW.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\CSgtXQS.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\BVprAzH.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\oGOxqZI.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\UxdOxDI.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\CjlIUyL.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\GGtNIZX.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\yIcxNxM.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\zwKtAqk.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 59 IoCs
Processes:
resource yara_rule behavioral1/memory/2328-0-0x000000013F9C0000-0x000000013FD14000-memory.dmp UPX \Windows\system\OdtsMqK.exe UPX behavioral1/memory/2328-6-0x00000000021C0000-0x0000000002514000-memory.dmp UPX behavioral1/memory/1680-9-0x000000013F9F0000-0x000000013FD44000-memory.dmp UPX \Windows\system\rhctgvZ.exe UPX C:\Windows\system\PyvgALk.exe UPX behavioral1/memory/2848-16-0x000000013F1D0000-0x000000013F524000-memory.dmp UPX C:\Windows\system\RcgrNEG.exe UPX behavioral1/memory/2944-22-0x000000013FF30000-0x0000000140284000-memory.dmp UPX behavioral1/memory/2516-29-0x000000013FB80000-0x000000013FED4000-memory.dmp UPX C:\Windows\system\RmdIWuD.exe UPX C:\Windows\system\QRJbpSF.exe UPX C:\Windows\system\OvPkODC.exe UPX behavioral1/memory/2800-35-0x000000013F8A0000-0x000000013FBF4000-memory.dmp UPX behavioral1/memory/2940-57-0x000000013F090000-0x000000013F3E4000-memory.dmp UPX behavioral1/memory/2328-56-0x000000013F9C0000-0x000000013FD14000-memory.dmp UPX \Windows\system\kxTzmfC.exe UPX behavioral1/memory/1680-70-0x000000013F9F0000-0x000000013FD44000-memory.dmp UPX \Windows\system\TbticyZ.exe UPX behavioral1/memory/2440-71-0x000000013FD20000-0x0000000140074000-memory.dmp UPX behavioral1/memory/2536-63-0x000000013FA10000-0x000000013FD64000-memory.dmp UPX behavioral1/memory/2748-79-0x000000013FAD0000-0x000000013FE24000-memory.dmp UPX behavioral1/memory/2848-77-0x000000013F1D0000-0x000000013F524000-memory.dmp UPX C:\Windows\system\HNSckit.exe UPX behavioral1/memory/2668-44-0x000000013F940000-0x000000013FC94000-memory.dmp UPX \Windows\system\Rwntsgo.exe UPX behavioral1/memory/2688-54-0x000000013F5D0000-0x000000013F924000-memory.dmp UPX C:\Windows\system\BoXaozE.exe UPX \Windows\system\qlSBgqW.exe UPX behavioral1/memory/2516-93-0x000000013FB80000-0x000000013FED4000-memory.dmp UPX behavioral1/memory/320-95-0x000000013F630000-0x000000013F984000-memory.dmp UPX behavioral1/memory/1820-87-0x000000013F9E0000-0x000000013FD34000-memory.dmp UPX behavioral1/memory/2944-85-0x000000013FF30000-0x0000000140284000-memory.dmp UPX C:\Windows\system\CSgtXQS.exe UPX behavioral1/memory/1616-101-0x000000013FD30000-0x0000000140084000-memory.dmp UPX \Windows\system\BVprAzH.exe UPX behavioral1/memory/2800-105-0x000000013F8A0000-0x000000013FBF4000-memory.dmp UPX C:\Windows\system\oGOxqZI.exe UPX C:\Windows\system\UxdOxDI.exe UPX C:\Windows\system\CjlIUyL.exe UPX C:\Windows\system\GGtNIZX.exe UPX C:\Windows\system\yIcxNxM.exe UPX C:\Windows\system\zwKtAqk.exe UPX behavioral1/memory/2668-108-0x000000013F940000-0x000000013FC94000-memory.dmp UPX behavioral1/memory/2940-139-0x000000013F090000-0x000000013F3E4000-memory.dmp UPX behavioral1/memory/1680-145-0x000000013F9F0000-0x000000013FD44000-memory.dmp UPX behavioral1/memory/2848-146-0x000000013F1D0000-0x000000013F524000-memory.dmp UPX behavioral1/memory/2944-147-0x000000013FF30000-0x0000000140284000-memory.dmp UPX behavioral1/memory/2516-148-0x000000013FB80000-0x000000013FED4000-memory.dmp UPX behavioral1/memory/2668-149-0x000000013F940000-0x000000013FC94000-memory.dmp UPX behavioral1/memory/2688-151-0x000000013F5D0000-0x000000013F924000-memory.dmp UPX behavioral1/memory/2800-150-0x000000013F8A0000-0x000000013FBF4000-memory.dmp UPX behavioral1/memory/2536-152-0x000000013FA10000-0x000000013FD64000-memory.dmp UPX behavioral1/memory/2940-153-0x000000013F090000-0x000000013F3E4000-memory.dmp UPX behavioral1/memory/2440-154-0x000000013FD20000-0x0000000140074000-memory.dmp UPX behavioral1/memory/2748-155-0x000000013FAD0000-0x000000013FE24000-memory.dmp UPX behavioral1/memory/1820-156-0x000000013F9E0000-0x000000013FD34000-memory.dmp UPX behavioral1/memory/320-157-0x000000013F630000-0x000000013F984000-memory.dmp UPX behavioral1/memory/1616-158-0x000000013FD30000-0x0000000140084000-memory.dmp UPX -
XMRig Miner payload 60 IoCs
Processes:
resource yara_rule behavioral1/memory/2328-0-0x000000013F9C0000-0x000000013FD14000-memory.dmp xmrig \Windows\system\OdtsMqK.exe xmrig behavioral1/memory/2328-6-0x00000000021C0000-0x0000000002514000-memory.dmp xmrig behavioral1/memory/1680-9-0x000000013F9F0000-0x000000013FD44000-memory.dmp xmrig \Windows\system\rhctgvZ.exe xmrig C:\Windows\system\PyvgALk.exe xmrig behavioral1/memory/2848-16-0x000000013F1D0000-0x000000013F524000-memory.dmp xmrig C:\Windows\system\RcgrNEG.exe xmrig behavioral1/memory/2944-22-0x000000013FF30000-0x0000000140284000-memory.dmp xmrig behavioral1/memory/2516-29-0x000000013FB80000-0x000000013FED4000-memory.dmp xmrig C:\Windows\system\RmdIWuD.exe xmrig C:\Windows\system\QRJbpSF.exe xmrig C:\Windows\system\OvPkODC.exe xmrig behavioral1/memory/2800-35-0x000000013F8A0000-0x000000013FBF4000-memory.dmp xmrig behavioral1/memory/2940-57-0x000000013F090000-0x000000013F3E4000-memory.dmp xmrig behavioral1/memory/2328-56-0x000000013F9C0000-0x000000013FD14000-memory.dmp xmrig \Windows\system\kxTzmfC.exe xmrig behavioral1/memory/1680-70-0x000000013F9F0000-0x000000013FD44000-memory.dmp xmrig \Windows\system\TbticyZ.exe xmrig behavioral1/memory/2440-71-0x000000013FD20000-0x0000000140074000-memory.dmp xmrig behavioral1/memory/2536-63-0x000000013FA10000-0x000000013FD64000-memory.dmp xmrig behavioral1/memory/2748-79-0x000000013FAD0000-0x000000013FE24000-memory.dmp xmrig behavioral1/memory/2848-77-0x000000013F1D0000-0x000000013F524000-memory.dmp xmrig C:\Windows\system\HNSckit.exe xmrig behavioral1/memory/2668-44-0x000000013F940000-0x000000013FC94000-memory.dmp xmrig \Windows\system\Rwntsgo.exe xmrig behavioral1/memory/2688-54-0x000000013F5D0000-0x000000013F924000-memory.dmp xmrig C:\Windows\system\BoXaozE.exe xmrig \Windows\system\qlSBgqW.exe xmrig behavioral1/memory/2516-93-0x000000013FB80000-0x000000013FED4000-memory.dmp xmrig behavioral1/memory/320-95-0x000000013F630000-0x000000013F984000-memory.dmp xmrig behavioral1/memory/1820-87-0x000000013F9E0000-0x000000013FD34000-memory.dmp xmrig behavioral1/memory/2944-85-0x000000013FF30000-0x0000000140284000-memory.dmp xmrig C:\Windows\system\CSgtXQS.exe xmrig behavioral1/memory/1616-101-0x000000013FD30000-0x0000000140084000-memory.dmp xmrig \Windows\system\BVprAzH.exe xmrig behavioral1/memory/2800-105-0x000000013F8A0000-0x000000013FBF4000-memory.dmp xmrig C:\Windows\system\oGOxqZI.exe xmrig C:\Windows\system\UxdOxDI.exe xmrig C:\Windows\system\CjlIUyL.exe xmrig C:\Windows\system\GGtNIZX.exe xmrig C:\Windows\system\yIcxNxM.exe xmrig C:\Windows\system\zwKtAqk.exe xmrig behavioral1/memory/2668-108-0x000000013F940000-0x000000013FC94000-memory.dmp xmrig behavioral1/memory/2940-139-0x000000013F090000-0x000000013F3E4000-memory.dmp xmrig behavioral1/memory/2328-144-0x000000013F400000-0x000000013F754000-memory.dmp xmrig behavioral1/memory/1680-145-0x000000013F9F0000-0x000000013FD44000-memory.dmp xmrig behavioral1/memory/2848-146-0x000000013F1D0000-0x000000013F524000-memory.dmp xmrig behavioral1/memory/2944-147-0x000000013FF30000-0x0000000140284000-memory.dmp xmrig behavioral1/memory/2516-148-0x000000013FB80000-0x000000013FED4000-memory.dmp xmrig behavioral1/memory/2668-149-0x000000013F940000-0x000000013FC94000-memory.dmp xmrig behavioral1/memory/2688-151-0x000000013F5D0000-0x000000013F924000-memory.dmp xmrig behavioral1/memory/2800-150-0x000000013F8A0000-0x000000013FBF4000-memory.dmp xmrig behavioral1/memory/2536-152-0x000000013FA10000-0x000000013FD64000-memory.dmp xmrig behavioral1/memory/2940-153-0x000000013F090000-0x000000013F3E4000-memory.dmp xmrig behavioral1/memory/2440-154-0x000000013FD20000-0x0000000140074000-memory.dmp xmrig behavioral1/memory/2748-155-0x000000013FAD0000-0x000000013FE24000-memory.dmp xmrig behavioral1/memory/1820-156-0x000000013F9E0000-0x000000013FD34000-memory.dmp xmrig behavioral1/memory/320-157-0x000000013F630000-0x000000013F984000-memory.dmp xmrig behavioral1/memory/1616-158-0x000000013FD30000-0x0000000140084000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
OdtsMqK.exerhctgvZ.exePyvgALk.exeRcgrNEG.exeRmdIWuD.exeQRJbpSF.exeOvPkODC.exeRwntsgo.exekxTzmfC.exeHNSckit.exeTbticyZ.exeBoXaozE.exeqlSBgqW.exeCSgtXQS.exeBVprAzH.exezwKtAqk.exeyIcxNxM.exeGGtNIZX.exeUxdOxDI.exeCjlIUyL.exeoGOxqZI.exepid process 1680 OdtsMqK.exe 2848 rhctgvZ.exe 2944 PyvgALk.exe 2516 RcgrNEG.exe 2800 RmdIWuD.exe 2668 QRJbpSF.exe 2688 OvPkODC.exe 2940 Rwntsgo.exe 2536 kxTzmfC.exe 2440 HNSckit.exe 2748 TbticyZ.exe 1820 BoXaozE.exe 320 qlSBgqW.exe 1616 CSgtXQS.exe 924 BVprAzH.exe 1620 zwKtAqk.exe 928 yIcxNxM.exe 1944 GGtNIZX.exe 1260 UxdOxDI.exe 2720 CjlIUyL.exe 1668 oGOxqZI.exe -
Loads dropped DLL 21 IoCs
Processes:
2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exepid process 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe -
Processes:
resource yara_rule behavioral1/memory/2328-0-0x000000013F9C0000-0x000000013FD14000-memory.dmp upx \Windows\system\OdtsMqK.exe upx behavioral1/memory/2328-6-0x00000000021C0000-0x0000000002514000-memory.dmp upx behavioral1/memory/1680-9-0x000000013F9F0000-0x000000013FD44000-memory.dmp upx \Windows\system\rhctgvZ.exe upx C:\Windows\system\PyvgALk.exe upx behavioral1/memory/2848-16-0x000000013F1D0000-0x000000013F524000-memory.dmp upx C:\Windows\system\RcgrNEG.exe upx behavioral1/memory/2944-22-0x000000013FF30000-0x0000000140284000-memory.dmp upx behavioral1/memory/2516-29-0x000000013FB80000-0x000000013FED4000-memory.dmp upx C:\Windows\system\RmdIWuD.exe upx C:\Windows\system\QRJbpSF.exe upx C:\Windows\system\OvPkODC.exe upx behavioral1/memory/2800-35-0x000000013F8A0000-0x000000013FBF4000-memory.dmp upx behavioral1/memory/2940-57-0x000000013F090000-0x000000013F3E4000-memory.dmp upx behavioral1/memory/2328-56-0x000000013F9C0000-0x000000013FD14000-memory.dmp upx \Windows\system\kxTzmfC.exe upx behavioral1/memory/1680-70-0x000000013F9F0000-0x000000013FD44000-memory.dmp upx \Windows\system\TbticyZ.exe upx behavioral1/memory/2440-71-0x000000013FD20000-0x0000000140074000-memory.dmp upx behavioral1/memory/2536-63-0x000000013FA10000-0x000000013FD64000-memory.dmp upx behavioral1/memory/2748-79-0x000000013FAD0000-0x000000013FE24000-memory.dmp upx behavioral1/memory/2848-77-0x000000013F1D0000-0x000000013F524000-memory.dmp upx C:\Windows\system\HNSckit.exe upx behavioral1/memory/2668-44-0x000000013F940000-0x000000013FC94000-memory.dmp upx \Windows\system\Rwntsgo.exe upx behavioral1/memory/2688-54-0x000000013F5D0000-0x000000013F924000-memory.dmp upx C:\Windows\system\BoXaozE.exe upx \Windows\system\qlSBgqW.exe upx behavioral1/memory/2516-93-0x000000013FB80000-0x000000013FED4000-memory.dmp upx behavioral1/memory/320-95-0x000000013F630000-0x000000013F984000-memory.dmp upx behavioral1/memory/1820-87-0x000000013F9E0000-0x000000013FD34000-memory.dmp upx behavioral1/memory/2944-85-0x000000013FF30000-0x0000000140284000-memory.dmp upx C:\Windows\system\CSgtXQS.exe upx behavioral1/memory/1616-101-0x000000013FD30000-0x0000000140084000-memory.dmp upx \Windows\system\BVprAzH.exe upx behavioral1/memory/2800-105-0x000000013F8A0000-0x000000013FBF4000-memory.dmp upx C:\Windows\system\oGOxqZI.exe upx C:\Windows\system\UxdOxDI.exe upx C:\Windows\system\CjlIUyL.exe upx C:\Windows\system\GGtNIZX.exe upx C:\Windows\system\yIcxNxM.exe upx C:\Windows\system\zwKtAqk.exe upx behavioral1/memory/2668-108-0x000000013F940000-0x000000013FC94000-memory.dmp upx behavioral1/memory/2940-139-0x000000013F090000-0x000000013F3E4000-memory.dmp upx behavioral1/memory/1680-145-0x000000013F9F0000-0x000000013FD44000-memory.dmp upx behavioral1/memory/2848-146-0x000000013F1D0000-0x000000013F524000-memory.dmp upx behavioral1/memory/2944-147-0x000000013FF30000-0x0000000140284000-memory.dmp upx behavioral1/memory/2516-148-0x000000013FB80000-0x000000013FED4000-memory.dmp upx behavioral1/memory/2668-149-0x000000013F940000-0x000000013FC94000-memory.dmp upx behavioral1/memory/2688-151-0x000000013F5D0000-0x000000013F924000-memory.dmp upx behavioral1/memory/2800-150-0x000000013F8A0000-0x000000013FBF4000-memory.dmp upx behavioral1/memory/2536-152-0x000000013FA10000-0x000000013FD64000-memory.dmp upx behavioral1/memory/2940-153-0x000000013F090000-0x000000013F3E4000-memory.dmp upx behavioral1/memory/2440-154-0x000000013FD20000-0x0000000140074000-memory.dmp upx behavioral1/memory/2748-155-0x000000013FAD0000-0x000000013FE24000-memory.dmp upx behavioral1/memory/1820-156-0x000000013F9E0000-0x000000013FD34000-memory.dmp upx behavioral1/memory/320-157-0x000000013F630000-0x000000013F984000-memory.dmp upx behavioral1/memory/1616-158-0x000000013FD30000-0x0000000140084000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exedescription ioc process File created C:\Windows\System\zwKtAqk.exe 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\GGtNIZX.exe 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\kxTzmfC.exe 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\BoXaozE.exe 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\BVprAzH.exe 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\OvPkODC.exe 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\OdtsMqK.exe 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\rhctgvZ.exe 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\QRJbpSF.exe 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\CSgtXQS.exe 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\PyvgALk.exe 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\HNSckit.exe 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\TbticyZ.exe 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\qlSBgqW.exe 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\yIcxNxM.exe 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\UxdOxDI.exe 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\CjlIUyL.exe 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\oGOxqZI.exe 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\RcgrNEG.exe 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\RmdIWuD.exe 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\Rwntsgo.exe 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process Token: SeLockMemoryPrivilege 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process target process PID 2328 wrote to memory of 1680 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe OdtsMqK.exe PID 2328 wrote to memory of 1680 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe OdtsMqK.exe PID 2328 wrote to memory of 1680 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe OdtsMqK.exe PID 2328 wrote to memory of 2848 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe rhctgvZ.exe PID 2328 wrote to memory of 2848 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe rhctgvZ.exe PID 2328 wrote to memory of 2848 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe rhctgvZ.exe PID 2328 wrote to memory of 2944 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe PyvgALk.exe PID 2328 wrote to memory of 2944 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe PyvgALk.exe PID 2328 wrote to memory of 2944 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe PyvgALk.exe PID 2328 wrote to memory of 2516 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe RcgrNEG.exe PID 2328 wrote to memory of 2516 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe RcgrNEG.exe PID 2328 wrote to memory of 2516 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe RcgrNEG.exe PID 2328 wrote to memory of 2800 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe RmdIWuD.exe PID 2328 wrote to memory of 2800 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe RmdIWuD.exe PID 2328 wrote to memory of 2800 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe RmdIWuD.exe PID 2328 wrote to memory of 2668 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe QRJbpSF.exe PID 2328 wrote to memory of 2668 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe QRJbpSF.exe PID 2328 wrote to memory of 2668 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe QRJbpSF.exe PID 2328 wrote to memory of 2940 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe Rwntsgo.exe PID 2328 wrote to memory of 2940 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe Rwntsgo.exe PID 2328 wrote to memory of 2940 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe Rwntsgo.exe PID 2328 wrote to memory of 2688 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe OvPkODC.exe PID 2328 wrote to memory of 2688 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe OvPkODC.exe PID 2328 wrote to memory of 2688 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe OvPkODC.exe PID 2328 wrote to memory of 2536 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe kxTzmfC.exe PID 2328 wrote to memory of 2536 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe kxTzmfC.exe PID 2328 wrote to memory of 2536 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe kxTzmfC.exe PID 2328 wrote to memory of 2440 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe HNSckit.exe PID 2328 wrote to memory of 2440 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe HNSckit.exe PID 2328 wrote to memory of 2440 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe HNSckit.exe PID 2328 wrote to memory of 2748 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe TbticyZ.exe PID 2328 wrote to memory of 2748 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe TbticyZ.exe PID 2328 wrote to memory of 2748 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe TbticyZ.exe PID 2328 wrote to memory of 1820 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe BoXaozE.exe PID 2328 wrote to memory of 1820 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe BoXaozE.exe PID 2328 wrote to memory of 1820 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe BoXaozE.exe PID 2328 wrote to memory of 320 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe qlSBgqW.exe PID 2328 wrote to memory of 320 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe qlSBgqW.exe PID 2328 wrote to memory of 320 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe qlSBgqW.exe PID 2328 wrote to memory of 1616 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe CSgtXQS.exe PID 2328 wrote to memory of 1616 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe CSgtXQS.exe PID 2328 wrote to memory of 1616 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe CSgtXQS.exe PID 2328 wrote to memory of 924 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe BVprAzH.exe PID 2328 wrote to memory of 924 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe BVprAzH.exe PID 2328 wrote to memory of 924 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe BVprAzH.exe PID 2328 wrote to memory of 1620 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe zwKtAqk.exe PID 2328 wrote to memory of 1620 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe zwKtAqk.exe PID 2328 wrote to memory of 1620 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe zwKtAqk.exe PID 2328 wrote to memory of 928 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe yIcxNxM.exe PID 2328 wrote to memory of 928 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe yIcxNxM.exe PID 2328 wrote to memory of 928 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe yIcxNxM.exe PID 2328 wrote to memory of 1944 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe GGtNIZX.exe PID 2328 wrote to memory of 1944 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe GGtNIZX.exe PID 2328 wrote to memory of 1944 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe GGtNIZX.exe PID 2328 wrote to memory of 1260 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe UxdOxDI.exe PID 2328 wrote to memory of 1260 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe UxdOxDI.exe PID 2328 wrote to memory of 1260 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe UxdOxDI.exe PID 2328 wrote to memory of 2720 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe CjlIUyL.exe PID 2328 wrote to memory of 2720 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe CjlIUyL.exe PID 2328 wrote to memory of 2720 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe CjlIUyL.exe PID 2328 wrote to memory of 1668 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe oGOxqZI.exe PID 2328 wrote to memory of 1668 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe oGOxqZI.exe PID 2328 wrote to memory of 1668 2328 2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe oGOxqZI.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-28_08966a06b7f762db90c1966d10fed0ba_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\OdtsMqK.exeC:\Windows\System\OdtsMqK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\rhctgvZ.exeC:\Windows\System\rhctgvZ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\PyvgALk.exeC:\Windows\System\PyvgALk.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RcgrNEG.exeC:\Windows\System\RcgrNEG.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RmdIWuD.exeC:\Windows\System\RmdIWuD.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\QRJbpSF.exeC:\Windows\System\QRJbpSF.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\Rwntsgo.exeC:\Windows\System\Rwntsgo.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\OvPkODC.exeC:\Windows\System\OvPkODC.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\kxTzmfC.exeC:\Windows\System\kxTzmfC.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\HNSckit.exeC:\Windows\System\HNSckit.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\TbticyZ.exeC:\Windows\System\TbticyZ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\BoXaozE.exeC:\Windows\System\BoXaozE.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\qlSBgqW.exeC:\Windows\System\qlSBgqW.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CSgtXQS.exeC:\Windows\System\CSgtXQS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\BVprAzH.exeC:\Windows\System\BVprAzH.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zwKtAqk.exeC:\Windows\System\zwKtAqk.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\yIcxNxM.exeC:\Windows\System\yIcxNxM.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\GGtNIZX.exeC:\Windows\System\GGtNIZX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\UxdOxDI.exeC:\Windows\System\UxdOxDI.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CjlIUyL.exeC:\Windows\System\CjlIUyL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\oGOxqZI.exeC:\Windows\System\oGOxqZI.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\BoXaozE.exeFilesize
5.9MB
MD542a839fe0edf730f05d88171e86ddb31
SHA1973c124b50a2b432d0d2aa19267bce030698e2a7
SHA256dfd6b3f2a363d6b6c3dc49e58ac8069243aa7d00ad45c2de2865d158dd2b57a3
SHA51222f4c628efedd3fac6b5e37122b8bbf9412eaa879e0c70b857ffe9b2fd3e1314fe4f1d57d3179563a8c5f172c2528e68d5d4346e01cd9614b0d0067f310855d8
-
C:\Windows\system\CSgtXQS.exeFilesize
5.9MB
MD598614f28b91045a7ab899b1125a6cebb
SHA1f7363cd18079f4fcf6c4e9275444b104700458a0
SHA256561a7d2e0987aeb012d2e3ded016ab469e95888596284eead7ea8307362d6d96
SHA512d23718f8155b3ab9a115585d1a25be0048ff4188c21fe8cba1e00d516b799b6efb8132543a23e2f55cd4f75d624ec72ff2c46a9df0579d4f565088865c0063ce
-
C:\Windows\system\CjlIUyL.exeFilesize
5.9MB
MD5d6dc2ff77d2bab09597c3bc645e49c10
SHA1e53d7756a0aff88a29b2c91c8805e4022d691338
SHA25628219a0420068ff68595f9223b1a71f31c4aeca3943b5e324b9d14e59890d9fd
SHA5126da486e46e05f2a40f3f78c2c3c0bf59f68032ce19da69bbd612b3666c08d8659e92fcc9294cfdd418fe9ba317c85a8fe9066eb1ba5c4c2f65ed6e0023f02aa7
-
C:\Windows\system\GGtNIZX.exeFilesize
5.9MB
MD50b561719474cc9ac950f38431dad5412
SHA105f7f153e879447ae65ea08229fb27eb68767071
SHA256bf52e816c057e285e836528a1eea5f0b602c6950ce5ecf630acf7f459f3f07bc
SHA51236e56bc2fb2fd4a379b6f2bd7d359abf599d06c03191aa673fcba6667058b9273bb53b7ed912eaa40f7b9507a4ea245e1d57e83431660e9adb5b5cad8b257d90
-
C:\Windows\system\HNSckit.exeFilesize
5.9MB
MD53dedcfbf23b4d57b433757ad0a420f7b
SHA1dc52eca8bada05e57585e39c88a8ef2e5be6a9c7
SHA2561ddab5697f50d1b33b78be622982ea51767805a06203e2723b84c93a0308488d
SHA5125fb46d78a636203a38c7970766974b645a9791d2f002606dddedb86273bb17da22ab71dcdede7d9689eecff587de4932a0c5f211b663adcbf716a2208d4f1a16
-
C:\Windows\system\OvPkODC.exeFilesize
5.9MB
MD5098c5ee61ea5d5674a8b3137cacc28b7
SHA1584ab70dff9cee56ccfd7fc0f2a0498285f15a5a
SHA2564f46196f9d07252f25b1aeaef49ea83d83dd311ab43c322d98a547fa52e71f4d
SHA51278a1bcf3bf640866c1b6243c156ea3e00d49bbddcedfbb599c35f6136b20a5722fc3709762e76e42858899057405ab32349b17f5576940236114c2c1648a75c6
-
C:\Windows\system\PyvgALk.exeFilesize
5.9MB
MD5c51c4596c753e8ad5a8d83d64d8f77fe
SHA13a609f43ff02ad4eec18f9e14dfbbe46f22e961b
SHA256d3a9616762f4aaf9afb2fdf1dbd5d0a892bf53ac9181b2d67cafd8e53c3daf42
SHA51250da19f2ca7be08c0ea306245e98215586698a72da31dbfb1ec9e66b29852a84b387be31af25bfca19ae9d5eb794ff050eb6cad748eaefbf3db9d8737bb5e38c
-
C:\Windows\system\QRJbpSF.exeFilesize
5.9MB
MD52a686a95de01390a7804a2c062e5844c
SHA1e090c5861f67b0f78c2b9946883c0751e08fb03d
SHA25602edf3af76a0196bee6f7fcad199f7c98c8a0b9aaa5b2ca50fe372caa901367d
SHA5128d1a06edeac084a8ee3e43869c1d982bfa4e70cfd105bb21964e71061b7e7b02f7ba94f7d483c1987e48b464e41f9a8eb1d45f0823084159d9fea99ca8145f93
-
C:\Windows\system\RcgrNEG.exeFilesize
5.9MB
MD52d1b0f6c012bd5703dcfabe3f737f18b
SHA1c8e2006c86dff15502e4d7c5c9df0cd9f0a34e1d
SHA256ee4f9afb83e45fb03a30b2a832040c6f7f73d07204a40a53e1ed2f3cb49f134e
SHA512e1b486a9e18ed5a8f6745db97037dab65c0cd9223a97435904a39815891dabb0bc08f92614022ce7cbb3666d140f94de14f5b7cf4aad1a12eef17e6215e4d44e
-
C:\Windows\system\RmdIWuD.exeFilesize
5.9MB
MD5fe4daa6d9aac4c3a1f43314b264e9404
SHA167911e3a2146359c8b3dc2619c8e1f507860a59b
SHA256ea8ac368038aa04abcce142fd95e34c797bfa19f05736b32412bdfa784266b41
SHA512d9c7f6b20d19a4bb5c9573be792b32fa1f0f125fbed6ed91f18c756c7b1130a3a3a62a3044a2e425165d8a606896d2367eafaedafe8466bdcef2b7cd84fcdf5a
-
C:\Windows\system\UxdOxDI.exeFilesize
5.9MB
MD57d399081df8620dc05a689950d30257d
SHA1193ba7cd6cd3e5624479a45a7bb80f933e845b11
SHA2567a73ab0b2df6161579a700bdbf983239a20e1855e07abcddef45c54c3ae3cb37
SHA512ebf7c611eac9ee0786478b39c21a905adf56f62b10a36ef1921487d2670e129a7b68526651bbea7c6017c871d99657596e677fe54a346dac3e8e4c463c293df1
-
C:\Windows\system\oGOxqZI.exeFilesize
5.9MB
MD5059679b0f85d8656f3979fbe60aa4a96
SHA1a58bc043cc792ee54cda517686d7299025a29d51
SHA2565f6fa5f435042a1256cea75890f3a4c9738a6b8f04dad4b454f702f94155613f
SHA51235c825b969d6bd1eda0b631bc33748d0e7f4ce0656c2c8c888be22d28949bc90392b5b5ca8bb65d823f921bcf7026b3a639047240aa0155a5d854eab80578b83
-
C:\Windows\system\yIcxNxM.exeFilesize
5.9MB
MD58feba02613a8e054d33b466c2f9b56de
SHA1a778f92fb8216ec30fd965b540160974403817a1
SHA256ce25e4c15d12ff9f9ff66c574e239ecc6116af921ab0ee5c8e2b5a52e50be0df
SHA5123f096aa891418ea6e5c793ac85ff595103e033c1f57907b4e5d7f3a453e4fa6a66439bfcd1de2a5aabfe30d6394beef393c13dbdee41d4e69b3b5eea6490bbc4
-
C:\Windows\system\zwKtAqk.exeFilesize
5.9MB
MD591d420f5146a1172a444ce866a717c94
SHA11b99dcc60017d2f6b6baf217c93581a545b043fd
SHA25654952693349c94fc130f10fd5b294a1f6299cf0d6331713fb75ef44053e71ef7
SHA5126c8f3e0af527bdabd3a7bba3b49ef2e72206cbed9df511f1c117d8c64b5c37bb25a867e7a23129346f1e0fc5bfa26eea0550f53fe79874c9b1944ff54fedb228
-
\Windows\system\BVprAzH.exeFilesize
5.9MB
MD5f12e6a2881f195e3ac4f33c8d1039091
SHA1ee38cbab8a4f13c7aee4b22e3b5a513fb8ac0033
SHA2567f2540408f41fc6465d4376d0db7ed42817ad868d1fe088090dd263f3c37b090
SHA512d9be00ef3d46bb78c834830a9bb7d83e5b3abc47cafe6a5de6d8bfb8c914e904d7b1e832da3e4f964adb5f753f7474cd109aec3cc0d1bcb1ff4f4a343c50536d
-
\Windows\system\OdtsMqK.exeFilesize
5.9MB
MD56d1e415b8d0072b1127c3823dfecc306
SHA16345a3b2334b4d8324d507166458aa2592be6e47
SHA2567e7a349631dbe65eee02ad701a67125df024fdf47b5fa61e409afdbc5e35b3db
SHA512f1ba944510515e4e7b226ed41c07b3987dc3656b53207501e75586b60c8217536467f805a4a082fe6171d4a7c1cc228652046efdf8f5004242ac637a95a9ac2c
-
\Windows\system\Rwntsgo.exeFilesize
5.9MB
MD53c044a814d50c096863173d7e65b2d8a
SHA1fa4496abff2e99b3ebed6e0a5b2269ce39480668
SHA256d1cb2ae121bf68d11a4e46deffad974e6501807cfc88f7793140d67097967992
SHA51228651ada73da505887218eba55d0d19082d08525847dc23022dfe7974d6a675119859977651e3f4ed3577516d3cd74e6bcc66ec15cc80ccaf881d5f39902192c
-
\Windows\system\TbticyZ.exeFilesize
5.9MB
MD5decea9837b6feb85eaa6755c42f48579
SHA13223c3c02b7494f0fdab1dac425801aae0ab4aaa
SHA256f72424f004d1e942bcba0793267fb950b240c33227c65f29223b200fc5141084
SHA51291d56ccb08cfc8b2459d924f0543a53afd91d73788ab14f7a3b32f8ac92ca11b6414248b3e8492257d3543a2741000c4ccc4e9d31347b8a0f5e171fd65582817
-
\Windows\system\kxTzmfC.exeFilesize
5.9MB
MD55255c03e20a64e130a054e1639fb3ef0
SHA123247f38ef332e7875a32fee1fc5582adeaec189
SHA2562b902a38743ead5d385ba61d1381a65b9ffa0b31e6482761c3dcb7025aea7a76
SHA512b08147b5b91144c93ca9840a694aa086e2e5d9d719da829754d2f00b0466b9286b873ee954055e3b6a61f629841d42fb4a31f1196b617b139d8096e043653305
-
\Windows\system\qlSBgqW.exeFilesize
5.9MB
MD56d8a0ab343822ef18834472bc9f5e8c7
SHA1e9531d7c204233dd9e6e16140c117d61729327f9
SHA25689a93ec4440e5ef18a2982bfdd406666f6334eda31c6d481b9873d355448ebd0
SHA5127a5b000c4d299ed1bbf5b5a6f76bf3728d96c190e3308bb621ab8e4d2a94adb3b641ce92120d8dc83a2487ff20a6689f90b6b7839b688b2ab80cfea9adf5fc14
-
\Windows\system\rhctgvZ.exeFilesize
5.9MB
MD51e5db293bd1b7f57f7dafc5918c36df0
SHA1963b0658e5ed416c9efeac27c2a5ee6526963679
SHA2561d851753beb075455e9ba66c16fa97d0ab2f8603798f3a27b12d3f337c0affd8
SHA5120c67e67b77ce3230fcde9b985f42dd41b66700993e782bf2aa063897b6a5a08b910d863bd3103384f3e93672993f93f7ddb6099a285687f1c20f18e598d1a8d9
-
memory/320-95-0x000000013F630000-0x000000013F984000-memory.dmpFilesize
3.3MB
-
memory/320-157-0x000000013F630000-0x000000013F984000-memory.dmpFilesize
3.3MB
-
memory/1616-101-0x000000013FD30000-0x0000000140084000-memory.dmpFilesize
3.3MB
-
memory/1616-158-0x000000013FD30000-0x0000000140084000-memory.dmpFilesize
3.3MB
-
memory/1680-70-0x000000013F9F0000-0x000000013FD44000-memory.dmpFilesize
3.3MB
-
memory/1680-9-0x000000013F9F0000-0x000000013FD44000-memory.dmpFilesize
3.3MB
-
memory/1680-145-0x000000013F9F0000-0x000000013FD44000-memory.dmpFilesize
3.3MB
-
memory/1820-87-0x000000013F9E0000-0x000000013FD34000-memory.dmpFilesize
3.3MB
-
memory/1820-156-0x000000013F9E0000-0x000000013FD34000-memory.dmpFilesize
3.3MB
-
memory/2328-109-0x000000013F400000-0x000000013F754000-memory.dmpFilesize
3.3MB
-
memory/2328-28-0x00000000021C0000-0x0000000002514000-memory.dmpFilesize
3.3MB
-
memory/2328-143-0x000000013FD30000-0x0000000140084000-memory.dmpFilesize
3.3MB
-
memory/2328-78-0x00000000021C0000-0x0000000002514000-memory.dmpFilesize
3.3MB
-
memory/2328-40-0x00000000021C0000-0x0000000002514000-memory.dmpFilesize
3.3MB
-
memory/2328-0-0x000000013F9C0000-0x000000013FD14000-memory.dmpFilesize
3.3MB
-
memory/2328-86-0x00000000021C0000-0x0000000002514000-memory.dmpFilesize
3.3MB
-
memory/2328-1-0x00000000001F0000-0x0000000000200000-memory.dmpFilesize
64KB
-
memory/2328-6-0x00000000021C0000-0x0000000002514000-memory.dmpFilesize
3.3MB
-
memory/2328-56-0x000000013F9C0000-0x000000013FD14000-memory.dmpFilesize
3.3MB
-
memory/2328-94-0x000000013F630000-0x000000013F984000-memory.dmpFilesize
3.3MB
-
memory/2328-140-0x00000000021C0000-0x0000000002514000-memory.dmpFilesize
3.3MB
-
memory/2328-141-0x00000000021C0000-0x0000000002514000-memory.dmpFilesize
3.3MB
-
memory/2328-144-0x000000013F400000-0x000000013F754000-memory.dmpFilesize
3.3MB
-
memory/2328-50-0x000000013F5D0000-0x000000013F924000-memory.dmpFilesize
3.3MB
-
memory/2328-53-0x000000013F090000-0x000000013F3E4000-memory.dmpFilesize
3.3MB
-
memory/2328-142-0x000000013F630000-0x000000013F984000-memory.dmpFilesize
3.3MB
-
memory/2328-21-0x000000013FF30000-0x0000000140284000-memory.dmpFilesize
3.3MB
-
memory/2328-14-0x000000013F1D0000-0x000000013F524000-memory.dmpFilesize
3.3MB
-
memory/2440-71-0x000000013FD20000-0x0000000140074000-memory.dmpFilesize
3.3MB
-
memory/2440-154-0x000000013FD20000-0x0000000140074000-memory.dmpFilesize
3.3MB
-
memory/2516-29-0x000000013FB80000-0x000000013FED4000-memory.dmpFilesize
3.3MB
-
memory/2516-148-0x000000013FB80000-0x000000013FED4000-memory.dmpFilesize
3.3MB
-
memory/2516-93-0x000000013FB80000-0x000000013FED4000-memory.dmpFilesize
3.3MB
-
memory/2536-152-0x000000013FA10000-0x000000013FD64000-memory.dmpFilesize
3.3MB
-
memory/2536-63-0x000000013FA10000-0x000000013FD64000-memory.dmpFilesize
3.3MB
-
memory/2668-108-0x000000013F940000-0x000000013FC94000-memory.dmpFilesize
3.3MB
-
memory/2668-149-0x000000013F940000-0x000000013FC94000-memory.dmpFilesize
3.3MB
-
memory/2668-44-0x000000013F940000-0x000000013FC94000-memory.dmpFilesize
3.3MB
-
memory/2688-151-0x000000013F5D0000-0x000000013F924000-memory.dmpFilesize
3.3MB
-
memory/2688-54-0x000000013F5D0000-0x000000013F924000-memory.dmpFilesize
3.3MB
-
memory/2748-155-0x000000013FAD0000-0x000000013FE24000-memory.dmpFilesize
3.3MB
-
memory/2748-79-0x000000013FAD0000-0x000000013FE24000-memory.dmpFilesize
3.3MB
-
memory/2800-150-0x000000013F8A0000-0x000000013FBF4000-memory.dmpFilesize
3.3MB
-
memory/2800-105-0x000000013F8A0000-0x000000013FBF4000-memory.dmpFilesize
3.3MB
-
memory/2800-35-0x000000013F8A0000-0x000000013FBF4000-memory.dmpFilesize
3.3MB
-
memory/2848-77-0x000000013F1D0000-0x000000013F524000-memory.dmpFilesize
3.3MB
-
memory/2848-146-0x000000013F1D0000-0x000000013F524000-memory.dmpFilesize
3.3MB
-
memory/2848-16-0x000000013F1D0000-0x000000013F524000-memory.dmpFilesize
3.3MB
-
memory/2940-139-0x000000013F090000-0x000000013F3E4000-memory.dmpFilesize
3.3MB
-
memory/2940-153-0x000000013F090000-0x000000013F3E4000-memory.dmpFilesize
3.3MB
-
memory/2940-57-0x000000013F090000-0x000000013F3E4000-memory.dmpFilesize
3.3MB
-
memory/2944-147-0x000000013FF30000-0x0000000140284000-memory.dmpFilesize
3.3MB
-
memory/2944-85-0x000000013FF30000-0x0000000140284000-memory.dmpFilesize
3.3MB
-
memory/2944-22-0x000000013FF30000-0x0000000140284000-memory.dmpFilesize
3.3MB