Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 08:54
Behavioral task
behavioral1
Sample
2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240611-en
General
-
Target
2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
89bd6415f400bafaf335ace48e0691c8
-
SHA1
451a05b7c2531523108488d6f5ab03cc9ff3487c
-
SHA256
2f3f74dd2e0ca6101248ec33d475c73ba34c1c43015893578491093eaaa16045
-
SHA512
975249530e045ff39c7c515bb2bfbb0dddf0f6a2c0328cd0a070fbcac1a8835474e793409ca1410dc127c54e44fe33f2af58520b49c17fd450875989ff947d12
-
SSDEEP
98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lUN:Q+856utgpPF8u/7N
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\jzwhznN.exe cobalt_reflective_dll C:\Windows\system\ylUbueS.exe cobalt_reflective_dll C:\Windows\system\sXFIVxl.exe cobalt_reflective_dll \Windows\system\myHTCjq.exe cobalt_reflective_dll C:\Windows\system\CmnFeak.exe cobalt_reflective_dll C:\Windows\system\kZKqYyu.exe cobalt_reflective_dll C:\Windows\system\MrcvupK.exe cobalt_reflective_dll \Windows\system\pFHGXRF.exe cobalt_reflective_dll C:\Windows\system\lGAuzrZ.exe cobalt_reflective_dll \Windows\system\lDkAesH.exe cobalt_reflective_dll C:\Windows\system\crGxLAq.exe cobalt_reflective_dll C:\Windows\system\muHqEsa.exe cobalt_reflective_dll C:\Windows\system\bludnCn.exe cobalt_reflective_dll C:\Windows\system\jOCgGCj.exe cobalt_reflective_dll \Windows\system\RsaTOJi.exe cobalt_reflective_dll C:\Windows\system\sBQheAP.exe cobalt_reflective_dll C:\Windows\system\IVQXnhf.exe cobalt_reflective_dll C:\Windows\system\MsBoNQk.exe cobalt_reflective_dll C:\Windows\system\dlsamby.exe cobalt_reflective_dll C:\Windows\system\oyifRkS.exe cobalt_reflective_dll C:\Windows\system\gKWNKWt.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule \Windows\system\jzwhznN.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\ylUbueS.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\sXFIVxl.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\myHTCjq.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\CmnFeak.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\kZKqYyu.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\MrcvupK.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\pFHGXRF.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\lGAuzrZ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\lDkAesH.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\crGxLAq.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\muHqEsa.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\bludnCn.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\jOCgGCj.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\RsaTOJi.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\sBQheAP.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\IVQXnhf.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\MsBoNQk.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\dlsamby.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\oyifRkS.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\gKWNKWt.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 59 IoCs
Processes:
resource yara_rule behavioral1/memory/2208-0-0x000000013F6D0000-0x000000013FA24000-memory.dmp UPX \Windows\system\jzwhznN.exe UPX behavioral1/memory/1708-9-0x000000013FEC0000-0x0000000140214000-memory.dmp UPX C:\Windows\system\ylUbueS.exe UPX C:\Windows\system\sXFIVxl.exe UPX behavioral1/memory/2588-21-0x000000013F200000-0x000000013F554000-memory.dmp UPX behavioral1/memory/2352-19-0x000000013F2B0000-0x000000013F604000-memory.dmp UPX \Windows\system\myHTCjq.exe UPX C:\Windows\system\CmnFeak.exe UPX behavioral1/memory/2704-33-0x000000013F3C0000-0x000000013F714000-memory.dmp UPX behavioral1/memory/2484-37-0x000000013F5F0000-0x000000013F944000-memory.dmp UPX C:\Windows\system\kZKqYyu.exe UPX behavioral1/memory/2736-45-0x000000013F910000-0x000000013FC64000-memory.dmp UPX behavioral1/memory/2616-48-0x000000013F1F0000-0x000000013F544000-memory.dmp UPX C:\Windows\system\MrcvupK.exe UPX behavioral1/memory/2480-56-0x000000013F050000-0x000000013F3A4000-memory.dmp UPX \Windows\system\pFHGXRF.exe UPX C:\Windows\system\lGAuzrZ.exe UPX behavioral1/memory/2552-67-0x000000013F3F0000-0x000000013F744000-memory.dmp UPX behavioral1/memory/3032-68-0x000000013F730000-0x000000013FA84000-memory.dmp UPX behavioral1/memory/2208-60-0x000000013F6D0000-0x000000013FA24000-memory.dmp UPX \Windows\system\lDkAesH.exe UPX behavioral1/memory/1624-80-0x000000013FAD0000-0x000000013FE24000-memory.dmp UPX behavioral1/memory/2820-85-0x000000013F630000-0x000000013F984000-memory.dmp UPX C:\Windows\system\crGxLAq.exe UPX behavioral1/memory/2852-100-0x000000013FD10000-0x0000000140064000-memory.dmp UPX C:\Windows\system\muHqEsa.exe UPX C:\Windows\system\bludnCn.exe UPX C:\Windows\system\jOCgGCj.exe UPX \Windows\system\RsaTOJi.exe UPX C:\Windows\system\sBQheAP.exe UPX C:\Windows\system\IVQXnhf.exe UPX behavioral1/memory/2616-137-0x000000013F1F0000-0x000000013F544000-memory.dmp UPX C:\Windows\system\MsBoNQk.exe UPX behavioral1/memory/2792-92-0x000000013F4F0000-0x000000013F844000-memory.dmp UPX C:\Windows\system\dlsamby.exe UPX C:\Windows\system\oyifRkS.exe UPX behavioral1/memory/2484-78-0x000000013F5F0000-0x000000013F944000-memory.dmp UPX behavioral1/memory/2588-77-0x000000013F200000-0x000000013F554000-memory.dmp UPX C:\Windows\system\gKWNKWt.exe UPX behavioral1/memory/2552-139-0x000000013F3F0000-0x000000013F744000-memory.dmp UPX behavioral1/memory/3032-140-0x000000013F730000-0x000000013FA84000-memory.dmp UPX behavioral1/memory/2820-143-0x000000013F630000-0x000000013F984000-memory.dmp UPX behavioral1/memory/2792-145-0x000000013F4F0000-0x000000013F844000-memory.dmp UPX behavioral1/memory/2852-147-0x000000013FD10000-0x0000000140064000-memory.dmp UPX behavioral1/memory/1708-149-0x000000013FEC0000-0x0000000140214000-memory.dmp UPX behavioral1/memory/2352-150-0x000000013F2B0000-0x000000013F604000-memory.dmp UPX behavioral1/memory/2588-151-0x000000013F200000-0x000000013F554000-memory.dmp UPX behavioral1/memory/2484-153-0x000000013F5F0000-0x000000013F944000-memory.dmp UPX behavioral1/memory/2736-154-0x000000013F910000-0x000000013FC64000-memory.dmp UPX behavioral1/memory/2704-152-0x000000013F3C0000-0x000000013F714000-memory.dmp UPX behavioral1/memory/2616-155-0x000000013F1F0000-0x000000013F544000-memory.dmp UPX behavioral1/memory/2480-156-0x000000013F050000-0x000000013F3A4000-memory.dmp UPX behavioral1/memory/2552-158-0x000000013F3F0000-0x000000013F744000-memory.dmp UPX behavioral1/memory/3032-157-0x000000013F730000-0x000000013FA84000-memory.dmp UPX behavioral1/memory/1624-159-0x000000013FAD0000-0x000000013FE24000-memory.dmp UPX behavioral1/memory/2820-160-0x000000013F630000-0x000000013F984000-memory.dmp UPX behavioral1/memory/2792-161-0x000000013F4F0000-0x000000013F844000-memory.dmp UPX behavioral1/memory/2852-162-0x000000013FD10000-0x0000000140064000-memory.dmp UPX -
XMRig Miner payload 64 IoCs
Processes:
resource yara_rule behavioral1/memory/2208-0-0x000000013F6D0000-0x000000013FA24000-memory.dmp xmrig \Windows\system\jzwhznN.exe xmrig behavioral1/memory/1708-9-0x000000013FEC0000-0x0000000140214000-memory.dmp xmrig C:\Windows\system\ylUbueS.exe xmrig C:\Windows\system\sXFIVxl.exe xmrig behavioral1/memory/2208-22-0x000000013F200000-0x000000013F554000-memory.dmp xmrig behavioral1/memory/2588-21-0x000000013F200000-0x000000013F554000-memory.dmp xmrig behavioral1/memory/2352-19-0x000000013F2B0000-0x000000013F604000-memory.dmp xmrig \Windows\system\myHTCjq.exe xmrig C:\Windows\system\CmnFeak.exe xmrig behavioral1/memory/2704-33-0x000000013F3C0000-0x000000013F714000-memory.dmp xmrig behavioral1/memory/2484-37-0x000000013F5F0000-0x000000013F944000-memory.dmp xmrig C:\Windows\system\kZKqYyu.exe xmrig behavioral1/memory/2736-45-0x000000013F910000-0x000000013FC64000-memory.dmp xmrig behavioral1/memory/2616-48-0x000000013F1F0000-0x000000013F544000-memory.dmp xmrig C:\Windows\system\MrcvupK.exe xmrig behavioral1/memory/2208-46-0x000000013F1F0000-0x000000013F544000-memory.dmp xmrig behavioral1/memory/2480-56-0x000000013F050000-0x000000013F3A4000-memory.dmp xmrig \Windows\system\pFHGXRF.exe xmrig C:\Windows\system\lGAuzrZ.exe xmrig behavioral1/memory/2552-67-0x000000013F3F0000-0x000000013F744000-memory.dmp xmrig behavioral1/memory/3032-68-0x000000013F730000-0x000000013FA84000-memory.dmp xmrig behavioral1/memory/2208-60-0x000000013F6D0000-0x000000013FA24000-memory.dmp xmrig \Windows\system\lDkAesH.exe xmrig behavioral1/memory/2208-62-0x0000000002280000-0x00000000025D4000-memory.dmp xmrig behavioral1/memory/1624-80-0x000000013FAD0000-0x000000013FE24000-memory.dmp xmrig behavioral1/memory/2820-85-0x000000013F630000-0x000000013F984000-memory.dmp xmrig C:\Windows\system\crGxLAq.exe xmrig behavioral1/memory/2852-100-0x000000013FD10000-0x0000000140064000-memory.dmp xmrig C:\Windows\system\muHqEsa.exe xmrig behavioral1/memory/2208-106-0x0000000002280000-0x00000000025D4000-memory.dmp xmrig C:\Windows\system\bludnCn.exe xmrig C:\Windows\system\jOCgGCj.exe xmrig \Windows\system\RsaTOJi.exe xmrig C:\Windows\system\sBQheAP.exe xmrig C:\Windows\system\IVQXnhf.exe xmrig behavioral1/memory/2616-137-0x000000013F1F0000-0x000000013F544000-memory.dmp xmrig C:\Windows\system\MsBoNQk.exe xmrig behavioral1/memory/2792-92-0x000000013F4F0000-0x000000013F844000-memory.dmp xmrig C:\Windows\system\dlsamby.exe xmrig C:\Windows\system\oyifRkS.exe xmrig behavioral1/memory/2484-78-0x000000013F5F0000-0x000000013F944000-memory.dmp xmrig behavioral1/memory/2588-77-0x000000013F200000-0x000000013F554000-memory.dmp xmrig C:\Windows\system\gKWNKWt.exe xmrig behavioral1/memory/2552-139-0x000000013F3F0000-0x000000013F744000-memory.dmp xmrig behavioral1/memory/3032-140-0x000000013F730000-0x000000013FA84000-memory.dmp xmrig behavioral1/memory/2208-141-0x000000013FAD0000-0x000000013FE24000-memory.dmp xmrig behavioral1/memory/2820-143-0x000000013F630000-0x000000013F984000-memory.dmp xmrig behavioral1/memory/2792-145-0x000000013F4F0000-0x000000013F844000-memory.dmp xmrig behavioral1/memory/2852-147-0x000000013FD10000-0x0000000140064000-memory.dmp xmrig behavioral1/memory/1708-149-0x000000013FEC0000-0x0000000140214000-memory.dmp xmrig behavioral1/memory/2352-150-0x000000013F2B0000-0x000000013F604000-memory.dmp xmrig behavioral1/memory/2588-151-0x000000013F200000-0x000000013F554000-memory.dmp xmrig behavioral1/memory/2484-153-0x000000013F5F0000-0x000000013F944000-memory.dmp xmrig behavioral1/memory/2736-154-0x000000013F910000-0x000000013FC64000-memory.dmp xmrig behavioral1/memory/2704-152-0x000000013F3C0000-0x000000013F714000-memory.dmp xmrig behavioral1/memory/2616-155-0x000000013F1F0000-0x000000013F544000-memory.dmp xmrig behavioral1/memory/2480-156-0x000000013F050000-0x000000013F3A4000-memory.dmp xmrig behavioral1/memory/2552-158-0x000000013F3F0000-0x000000013F744000-memory.dmp xmrig behavioral1/memory/3032-157-0x000000013F730000-0x000000013FA84000-memory.dmp xmrig behavioral1/memory/1624-159-0x000000013FAD0000-0x000000013FE24000-memory.dmp xmrig behavioral1/memory/2820-160-0x000000013F630000-0x000000013F984000-memory.dmp xmrig behavioral1/memory/2792-161-0x000000013F4F0000-0x000000013F844000-memory.dmp xmrig behavioral1/memory/2852-162-0x000000013FD10000-0x0000000140064000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
jzwhznN.exeylUbueS.exesXFIVxl.exemyHTCjq.exekZKqYyu.exeCmnFeak.exeMrcvupK.exegKWNKWt.exelGAuzrZ.exepFHGXRF.exelDkAesH.exeoyifRkS.exedlsamby.execrGxLAq.exemuHqEsa.exeMsBoNQk.exeIVQXnhf.exebludnCn.exejOCgGCj.exesBQheAP.exeRsaTOJi.exepid process 1708 jzwhznN.exe 2352 ylUbueS.exe 2588 sXFIVxl.exe 2704 myHTCjq.exe 2484 kZKqYyu.exe 2736 CmnFeak.exe 2616 MrcvupK.exe 2480 gKWNKWt.exe 2552 lGAuzrZ.exe 3032 pFHGXRF.exe 1624 lDkAesH.exe 2820 oyifRkS.exe 2792 dlsamby.exe 2852 crGxLAq.exe 1332 muHqEsa.exe 1628 MsBoNQk.exe 2864 IVQXnhf.exe 1984 bludnCn.exe 2164 jOCgGCj.exe 848 sBQheAP.exe 276 RsaTOJi.exe -
Loads dropped DLL 21 IoCs
Processes:
2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exepid process 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe -
Processes:
resource yara_rule behavioral1/memory/2208-0-0x000000013F6D0000-0x000000013FA24000-memory.dmp upx \Windows\system\jzwhznN.exe upx behavioral1/memory/1708-9-0x000000013FEC0000-0x0000000140214000-memory.dmp upx C:\Windows\system\ylUbueS.exe upx C:\Windows\system\sXFIVxl.exe upx behavioral1/memory/2588-21-0x000000013F200000-0x000000013F554000-memory.dmp upx behavioral1/memory/2352-19-0x000000013F2B0000-0x000000013F604000-memory.dmp upx \Windows\system\myHTCjq.exe upx C:\Windows\system\CmnFeak.exe upx behavioral1/memory/2704-33-0x000000013F3C0000-0x000000013F714000-memory.dmp upx behavioral1/memory/2484-37-0x000000013F5F0000-0x000000013F944000-memory.dmp upx C:\Windows\system\kZKqYyu.exe upx behavioral1/memory/2736-45-0x000000013F910000-0x000000013FC64000-memory.dmp upx behavioral1/memory/2616-48-0x000000013F1F0000-0x000000013F544000-memory.dmp upx C:\Windows\system\MrcvupK.exe upx behavioral1/memory/2480-56-0x000000013F050000-0x000000013F3A4000-memory.dmp upx \Windows\system\pFHGXRF.exe upx C:\Windows\system\lGAuzrZ.exe upx behavioral1/memory/2552-67-0x000000013F3F0000-0x000000013F744000-memory.dmp upx behavioral1/memory/3032-68-0x000000013F730000-0x000000013FA84000-memory.dmp upx behavioral1/memory/2208-60-0x000000013F6D0000-0x000000013FA24000-memory.dmp upx \Windows\system\lDkAesH.exe upx behavioral1/memory/1624-80-0x000000013FAD0000-0x000000013FE24000-memory.dmp upx behavioral1/memory/2820-85-0x000000013F630000-0x000000013F984000-memory.dmp upx C:\Windows\system\crGxLAq.exe upx behavioral1/memory/2852-100-0x000000013FD10000-0x0000000140064000-memory.dmp upx C:\Windows\system\muHqEsa.exe upx C:\Windows\system\bludnCn.exe upx C:\Windows\system\jOCgGCj.exe upx \Windows\system\RsaTOJi.exe upx C:\Windows\system\sBQheAP.exe upx C:\Windows\system\IVQXnhf.exe upx behavioral1/memory/2616-137-0x000000013F1F0000-0x000000013F544000-memory.dmp upx C:\Windows\system\MsBoNQk.exe upx behavioral1/memory/2792-92-0x000000013F4F0000-0x000000013F844000-memory.dmp upx C:\Windows\system\dlsamby.exe upx C:\Windows\system\oyifRkS.exe upx behavioral1/memory/2484-78-0x000000013F5F0000-0x000000013F944000-memory.dmp upx behavioral1/memory/2588-77-0x000000013F200000-0x000000013F554000-memory.dmp upx C:\Windows\system\gKWNKWt.exe upx behavioral1/memory/2552-139-0x000000013F3F0000-0x000000013F744000-memory.dmp upx behavioral1/memory/3032-140-0x000000013F730000-0x000000013FA84000-memory.dmp upx behavioral1/memory/2820-143-0x000000013F630000-0x000000013F984000-memory.dmp upx behavioral1/memory/2792-145-0x000000013F4F0000-0x000000013F844000-memory.dmp upx behavioral1/memory/2852-147-0x000000013FD10000-0x0000000140064000-memory.dmp upx behavioral1/memory/1708-149-0x000000013FEC0000-0x0000000140214000-memory.dmp upx behavioral1/memory/2352-150-0x000000013F2B0000-0x000000013F604000-memory.dmp upx behavioral1/memory/2588-151-0x000000013F200000-0x000000013F554000-memory.dmp upx behavioral1/memory/2484-153-0x000000013F5F0000-0x000000013F944000-memory.dmp upx behavioral1/memory/2736-154-0x000000013F910000-0x000000013FC64000-memory.dmp upx behavioral1/memory/2704-152-0x000000013F3C0000-0x000000013F714000-memory.dmp upx behavioral1/memory/2616-155-0x000000013F1F0000-0x000000013F544000-memory.dmp upx behavioral1/memory/2480-156-0x000000013F050000-0x000000013F3A4000-memory.dmp upx behavioral1/memory/2552-158-0x000000013F3F0000-0x000000013F744000-memory.dmp upx behavioral1/memory/3032-157-0x000000013F730000-0x000000013FA84000-memory.dmp upx behavioral1/memory/1624-159-0x000000013FAD0000-0x000000013FE24000-memory.dmp upx behavioral1/memory/2820-160-0x000000013F630000-0x000000013F984000-memory.dmp upx behavioral1/memory/2792-161-0x000000013F4F0000-0x000000013F844000-memory.dmp upx behavioral1/memory/2852-162-0x000000013FD10000-0x0000000140064000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exedescription ioc process File created C:\Windows\System\myHTCjq.exe 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\CmnFeak.exe 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\lGAuzrZ.exe 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\sBQheAP.exe 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\gKWNKWt.exe 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\pFHGXRF.exe 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\muHqEsa.exe 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\IVQXnhf.exe 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\jOCgGCj.exe 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\RsaTOJi.exe 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\jzwhznN.exe 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\kZKqYyu.exe 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\dlsamby.exe 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\crGxLAq.exe 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\bludnCn.exe 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\MsBoNQk.exe 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ylUbueS.exe 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\sXFIVxl.exe 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\MrcvupK.exe 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\lDkAesH.exe 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\oyifRkS.exe 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process Token: SeLockMemoryPrivilege 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process target process PID 2208 wrote to memory of 1708 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe jzwhznN.exe PID 2208 wrote to memory of 1708 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe jzwhznN.exe PID 2208 wrote to memory of 1708 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe jzwhznN.exe PID 2208 wrote to memory of 2352 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe ylUbueS.exe PID 2208 wrote to memory of 2352 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe ylUbueS.exe PID 2208 wrote to memory of 2352 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe ylUbueS.exe PID 2208 wrote to memory of 2588 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe sXFIVxl.exe PID 2208 wrote to memory of 2588 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe sXFIVxl.exe PID 2208 wrote to memory of 2588 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe sXFIVxl.exe PID 2208 wrote to memory of 2704 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe myHTCjq.exe PID 2208 wrote to memory of 2704 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe myHTCjq.exe PID 2208 wrote to memory of 2704 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe myHTCjq.exe PID 2208 wrote to memory of 2484 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe kZKqYyu.exe PID 2208 wrote to memory of 2484 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe kZKqYyu.exe PID 2208 wrote to memory of 2484 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe kZKqYyu.exe PID 2208 wrote to memory of 2736 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe CmnFeak.exe PID 2208 wrote to memory of 2736 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe CmnFeak.exe PID 2208 wrote to memory of 2736 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe CmnFeak.exe PID 2208 wrote to memory of 2616 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe MrcvupK.exe PID 2208 wrote to memory of 2616 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe MrcvupK.exe PID 2208 wrote to memory of 2616 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe MrcvupK.exe PID 2208 wrote to memory of 2480 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe gKWNKWt.exe PID 2208 wrote to memory of 2480 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe gKWNKWt.exe PID 2208 wrote to memory of 2480 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe gKWNKWt.exe PID 2208 wrote to memory of 2552 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe lGAuzrZ.exe PID 2208 wrote to memory of 2552 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe lGAuzrZ.exe PID 2208 wrote to memory of 2552 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe lGAuzrZ.exe PID 2208 wrote to memory of 3032 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe pFHGXRF.exe PID 2208 wrote to memory of 3032 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe pFHGXRF.exe PID 2208 wrote to memory of 3032 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe pFHGXRF.exe PID 2208 wrote to memory of 1624 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe lDkAesH.exe PID 2208 wrote to memory of 1624 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe lDkAesH.exe PID 2208 wrote to memory of 1624 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe lDkAesH.exe PID 2208 wrote to memory of 2820 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe oyifRkS.exe PID 2208 wrote to memory of 2820 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe oyifRkS.exe PID 2208 wrote to memory of 2820 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe oyifRkS.exe PID 2208 wrote to memory of 2792 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe dlsamby.exe PID 2208 wrote to memory of 2792 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe dlsamby.exe PID 2208 wrote to memory of 2792 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe dlsamby.exe PID 2208 wrote to memory of 2852 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe crGxLAq.exe PID 2208 wrote to memory of 2852 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe crGxLAq.exe PID 2208 wrote to memory of 2852 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe crGxLAq.exe PID 2208 wrote to memory of 1332 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe muHqEsa.exe PID 2208 wrote to memory of 1332 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe muHqEsa.exe PID 2208 wrote to memory of 1332 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe muHqEsa.exe PID 2208 wrote to memory of 1628 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe MsBoNQk.exe PID 2208 wrote to memory of 1628 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe MsBoNQk.exe PID 2208 wrote to memory of 1628 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe MsBoNQk.exe PID 2208 wrote to memory of 2864 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe IVQXnhf.exe PID 2208 wrote to memory of 2864 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe IVQXnhf.exe PID 2208 wrote to memory of 2864 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe IVQXnhf.exe PID 2208 wrote to memory of 1984 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe bludnCn.exe PID 2208 wrote to memory of 1984 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe bludnCn.exe PID 2208 wrote to memory of 1984 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe bludnCn.exe PID 2208 wrote to memory of 2164 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe jOCgGCj.exe PID 2208 wrote to memory of 2164 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe jOCgGCj.exe PID 2208 wrote to memory of 2164 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe jOCgGCj.exe PID 2208 wrote to memory of 848 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe sBQheAP.exe PID 2208 wrote to memory of 848 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe sBQheAP.exe PID 2208 wrote to memory of 848 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe sBQheAP.exe PID 2208 wrote to memory of 276 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe RsaTOJi.exe PID 2208 wrote to memory of 276 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe RsaTOJi.exe PID 2208 wrote to memory of 276 2208 2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe RsaTOJi.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-28_89bd6415f400bafaf335ace48e0691c8_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\jzwhznN.exeC:\Windows\System\jzwhznN.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ylUbueS.exeC:\Windows\System\ylUbueS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\sXFIVxl.exeC:\Windows\System\sXFIVxl.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\myHTCjq.exeC:\Windows\System\myHTCjq.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\kZKqYyu.exeC:\Windows\System\kZKqYyu.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CmnFeak.exeC:\Windows\System\CmnFeak.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\MrcvupK.exeC:\Windows\System\MrcvupK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\gKWNKWt.exeC:\Windows\System\gKWNKWt.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lGAuzrZ.exeC:\Windows\System\lGAuzrZ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\pFHGXRF.exeC:\Windows\System\pFHGXRF.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lDkAesH.exeC:\Windows\System\lDkAesH.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\oyifRkS.exeC:\Windows\System\oyifRkS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\dlsamby.exeC:\Windows\System\dlsamby.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\crGxLAq.exeC:\Windows\System\crGxLAq.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\muHqEsa.exeC:\Windows\System\muHqEsa.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\MsBoNQk.exeC:\Windows\System\MsBoNQk.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\IVQXnhf.exeC:\Windows\System\IVQXnhf.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bludnCn.exeC:\Windows\System\bludnCn.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\jOCgGCj.exeC:\Windows\System\jOCgGCj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\sBQheAP.exeC:\Windows\System\sBQheAP.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RsaTOJi.exeC:\Windows\System\RsaTOJi.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\CmnFeak.exeFilesize
5.9MB
MD5ecc743a81a9eaa246d9d72d28a0bc8c9
SHA19c83719e43c226de8b728b8be4b39f508d40116b
SHA25626f0fc6e6ff4d53502d2629e9e40ba6f39bfbbfe6a0225923950f0291180c906
SHA512546576aba1abe781b521d95535820484cd8c740b4f03e957dd8f509d5dd42a58f2eea76afc8bb49a3a2f0fbad5daa0f867b3d6fa1f48b30294de798689c70a43
-
C:\Windows\system\IVQXnhf.exeFilesize
5.9MB
MD553433358aa71179dee7e30bb8d044fb9
SHA14bb58199b3e6bb81a421ace1347ec6400f51c3c8
SHA2567ad3ea671f41ddd0f8b413fece4ff2eeffc72900abaca2d54f6acadfc57ff839
SHA51214ad8a65f3ed7348ecd3a99e820376ab741d9798234abb9e143b625b07c5f1edc9f942fd9f0b36e5cfbf31d473628b0ad8a455f0fada51a868a3fd56dcca6c3c
-
C:\Windows\system\MrcvupK.exeFilesize
5.9MB
MD5e92968ac6ed825a650296d6f9c1546e9
SHA1374e0fe1fc3197c92e926389f2115c24c3c835b0
SHA256213cbd3ba6ee8bb0b1238e971c31a5552e1ffcfc9afeac8ff6adc6a8f857faee
SHA512fb0b3ff689c539843fed2f78692acc06bc1d3272ec18368e3a2ba18723001b2b7876397a3d07ff6981f3873fce7c970964e11f64fda1b95628a490c5de8ae0a9
-
C:\Windows\system\MsBoNQk.exeFilesize
5.9MB
MD50442ea9eebab2cfef71dcda7220314d1
SHA12ef93edc0de993b4a9eb22283e2d3835503def09
SHA256e3cf4f3dd9d66d6c55498e9665a16d2ec60e1b05d6df3601a9ff42c6a2680c2a
SHA512ac91cf2bdd670dbf57cc5250d64750b434bb7b9feab37d07babba4bc30bf53ca0f0ba13b277ec28935bba0350f78485fc1d5496f354705815f252064a519b6ff
-
C:\Windows\system\bludnCn.exeFilesize
5.9MB
MD59dad1ab64f42c0376100563007c26c8e
SHA10fbaf533b69c077d31f9bcb8964c45648be7bd61
SHA2566950c00d9c29964293b711646aafc36d6b4003b38b57dc225a42ab6b005cf821
SHA5127ed831332c6a89b409a6d9aa9a29eaac98a7227c68bf7fca7e1048e6a448d58cf873915d33e2620e0a4fc3b45ff4e64370536801294bfe1d6ea693a66842fc02
-
C:\Windows\system\crGxLAq.exeFilesize
5.9MB
MD5d80d0abe49b41186e3567473f0b15277
SHA193cbe7817e58120d315dde4ea0998405c6acf3cd
SHA256cda7fcff9c72da45de746545b9ce2bd94b1bbcd3532a1d7f4b5bc4a3873545ab
SHA512c0d2989a209125d3d9b4efeba5cc692e4240acf01210b5c4adb2b56d11c9734d81f84f40c0a1d42187501bce794efe2847b1d2020398ed396478df1361fbffc8
-
C:\Windows\system\dlsamby.exeFilesize
5.9MB
MD5a9f4c347b65675b19ca783a2de332a20
SHA13389c98302319a73da3552d953058eabc591c749
SHA2567fcef199989ff68fbb768118d3b0e9d731a694870ce62c7aa1bcf5e132551f7c
SHA512825a235b1bbf5fbcae416cb858a92ae5090cf7987e4522f44f994e187eb465792810874d6db0fe5bb378bff416089f82795de15f1f2ced6060509d9761183d37
-
C:\Windows\system\gKWNKWt.exeFilesize
5.9MB
MD5d99f92f062da6539221f0da0f54fc649
SHA143ca18d322a878b4626a5785668c2aa92b249880
SHA256120ef754360950452f59696bd05df21233458c046bf9a2a0639da4f79bace97e
SHA512ac0631e821de29315707d66e23ac3f036afde6ad6d5c625e75ef857a9a485235349804c247f0dbf2c7a9cee589590fa5915330dba43616cbf8fd3e6e7e7050d0
-
C:\Windows\system\jOCgGCj.exeFilesize
5.9MB
MD54719290b7aed3c852fded4cf2924a9ae
SHA1df9efff468fe05c56c2cb2ce1f365475b9894233
SHA2564b62a8221931c836ce713e88379126f5e8f3019ef7b934b30e3bceaf254393ae
SHA5124e9cba5dcc432d3a6b24ad127831e57736b4190edab7a6fbf9e695596c974db810228c0d115c2060a4967f233adbd61b9a000cc770d4d65c9299300ad6846ea7
-
C:\Windows\system\kZKqYyu.exeFilesize
5.9MB
MD5c8cee0fd3d877e0086512364a2d4f076
SHA1f22308158d3c3500d0df97fda11181606da2762c
SHA2560190aa0bc19a6a31ba80f75e338f491824abc781884207b619fd398c34327fba
SHA51245630c653877ad7693abd0e63bd345595e066b0fb99299fdade5f414e00b17105b55c0f5a5d3eb6b689fd953f0b2c2bc709b5309043a3042c3833b04a64463bc
-
C:\Windows\system\lGAuzrZ.exeFilesize
5.9MB
MD5ceaccb77fff0ab7af75c5cbcae0f769d
SHA10a86f7f0f9f0129a8f48bcd1aeae52ec5f8c7a1e
SHA25600f682c1c07e168a98f10d795dc8757ef0e106da391ff1af982be455c06fdb15
SHA512d63ceec8a54cd782caefcabc5f04b91ab6e9f58c202bdb29e489d493cc332bfb99a20dd6e58d9ac4d167d38734c333eef335479e772104d400baed0e8416af3f
-
C:\Windows\system\muHqEsa.exeFilesize
5.9MB
MD521c6c4b8ca17e09ff67508695c69a0e0
SHA1e992fef3e53ba09e52deb57ddfeb95d2203015be
SHA256398cb21553db5f76926ddeaba72f1bc6e0d5de165037ebde60d087c0d88d6fc8
SHA5126dd543592c7b4d4223eb5a69623069cbe1b4cf0fcb2ee66c5dbec5b0d17629fe7e7cd9520aee2745b27cda48b2a48d4974edd7f93ed3712ecec2d17d55a97bae
-
C:\Windows\system\oyifRkS.exeFilesize
5.9MB
MD58caf9f92d9adc013578fb41f9e6066f3
SHA1f9799f5ecfa703e16ff44adb0eba65aa7290c35e
SHA25684c14b55221f1b0ede2dd2d9ac7689c5b734820949cde34bc640d57b020e4ce2
SHA51250810509990a56ca467d1c56b061d92b46bceec2dc252b6bacf0418f03d95d6c30cd5766aab64df0256c1cf9fe9d5233c5ccd32ce376c0e1eba7dbe53eceeb85
-
C:\Windows\system\sBQheAP.exeFilesize
5.9MB
MD55c77f98353de222fd7186e52da695999
SHA11cedda969a5713d12c50fd1ac5a04b6980a7e87a
SHA256c5b2808da02e66ac8f4d496c8ac20407f577e9b54e760631219453ea58f3d9ae
SHA51285fce90b213db623fb3804330b4ecf36e10e8856f1e48babc9e49351eb58cea42accd1820bd0e4c2202131a7bf92f924ad0c7e9aab5d31d473da875db1172b80
-
C:\Windows\system\sXFIVxl.exeFilesize
5.9MB
MD547ce30f018104f8bffa48c7db6d06010
SHA1f6ce14ed1f80468ee4fba2cdf439f8975d1ac5e1
SHA256cef7ae694a009d4e93b3d11623f89265f67f98f2c4b1f769a6ef1a11c6dc5b7a
SHA512541d731f41f99177c36f65106835418e607314c58faf717619b0e9367cc95abafcdde2ed623ca6064fbdb70f1f5d718fc2bcbdc8316d13e40d9a4909b7290cbd
-
C:\Windows\system\ylUbueS.exeFilesize
5.9MB
MD5d90fe16f1f4d7441cffc678cfe1ee3c8
SHA14b11a7c0c561693bf71344cb40dd7951ff318055
SHA2560806f5f4be4006192a445322534fe8f150621b67d9d59d4d4aaae42bc6f9c458
SHA512052c5d879b2f3ad4fb168fb25d5c87f04219fd33fb481ca3f8d895bf2f1975ebd4ebe537744fb00d4d507996ef9b0dc4ec02ac1b336963da16f64f4ef5842d1d
-
\Windows\system\RsaTOJi.exeFilesize
5.9MB
MD5c5894dba8cc845157776aecc776844f1
SHA1e094c988ab37f7ca89adfb418692b12cb95547e6
SHA2568a6c4949a7550166e2b932b2c52121519eee6607c7764d4ce826ae4476e259fa
SHA51204b36cf98bb76e6c2099480d28bce1949a57b87025c7ab45a70be60f62120f449c0d3a87f1ae130b4fbbc9c5f096a9d1d0cb478af8fb4bca715e2355408e5011
-
\Windows\system\jzwhznN.exeFilesize
5.9MB
MD551729c3da86c1b4728ca6e9ddc809131
SHA1cc6e15ad9e3910354e372d2f05878c142af2cde7
SHA256e8b818ec3aa0a4874357d562f97ab1d13e8c496dbf3c64e98afbd32622c74f17
SHA5124f0ed8125365a6847df6478031e3030fd7c4340265dfbba76fc7647c4af2c9cbd9486e48bf0c8920ef16d18065e03c3d0f59162644478ae2b0d7dbe560e1a7c4
-
\Windows\system\lDkAesH.exeFilesize
5.9MB
MD504a769ccf1b395e0a420b4f7db88ed73
SHA1fb515c25af84da0abd26af16d84be39a1c90131f
SHA25641fbeac887d0b9018b49d8101b4d5e052dc05704459e7a01c874788d613110e7
SHA51235b515ddb01582711eb039796312875d25fb3dfb91ec780e52cb09c45f1d6ff39674cc766dd683a4728d196631f7bdbb68f8f11884d0682931356f1d25ec1ab6
-
\Windows\system\myHTCjq.exeFilesize
5.9MB
MD5c3ab34d1ed5fb21a4d2b6a549e25fe03
SHA16310fd15c68a80443e4f3c346e22d8a4ab88b12f
SHA2568c709f15465464cc077fc691be477810cb9e7f111b8e444e196a6fcc1594e7ca
SHA5128f247392ea977ba41c45a0c0d51688c825d80b97869c129c5e40dfb75aee739dc3d91a64b797445e10b354b3cc1f0f45cbabc5a4442eaa97f0ddcbcf3defd0bd
-
\Windows\system\pFHGXRF.exeFilesize
5.9MB
MD5b72fe27debb83eb8b85976d1dec4e017
SHA1d2886586116af260f694f7245bc3204b521324cb
SHA2563a839a17f075528efe150d1bfddb035362e939b7ced9308a64356486229488e7
SHA51298c59117256f95e508858856094295069b81dbafea51a11987f5f823bb7f47de6baac0da44ce052096b4a6445341d9bc66de0fe403b93b05df4e911df5f3f27d
-
memory/1624-159-0x000000013FAD0000-0x000000013FE24000-memory.dmpFilesize
3.3MB
-
memory/1624-80-0x000000013FAD0000-0x000000013FE24000-memory.dmpFilesize
3.3MB
-
memory/1708-9-0x000000013FEC0000-0x0000000140214000-memory.dmpFilesize
3.3MB
-
memory/1708-149-0x000000013FEC0000-0x0000000140214000-memory.dmpFilesize
3.3MB
-
memory/2208-46-0x000000013F1F0000-0x000000013F544000-memory.dmpFilesize
3.3MB
-
memory/2208-8-0x000000013FEC0000-0x0000000140214000-memory.dmpFilesize
3.3MB
-
memory/2208-60-0x000000013F6D0000-0x000000013FA24000-memory.dmpFilesize
3.3MB
-
memory/2208-1-0x00000000000F0000-0x0000000000100000-memory.dmpFilesize
64KB
-
memory/2208-66-0x000000013F2B0000-0x000000013F604000-memory.dmpFilesize
3.3MB
-
memory/2208-62-0x0000000002280000-0x00000000025D4000-memory.dmpFilesize
3.3MB
-
memory/2208-79-0x000000013FAD0000-0x000000013FE24000-memory.dmpFilesize
3.3MB
-
memory/2208-84-0x0000000002280000-0x00000000025D4000-memory.dmpFilesize
3.3MB
-
memory/2208-138-0x0000000002280000-0x00000000025D4000-memory.dmpFilesize
3.3MB
-
memory/2208-54-0x000000013F050000-0x000000013F3A4000-memory.dmpFilesize
3.3MB
-
memory/2208-91-0x0000000002280000-0x00000000025D4000-memory.dmpFilesize
3.3MB
-
memory/2208-0-0x000000013F6D0000-0x000000013FA24000-memory.dmpFilesize
3.3MB
-
memory/2208-106-0x0000000002280000-0x00000000025D4000-memory.dmpFilesize
3.3MB
-
memory/2208-22-0x000000013F200000-0x000000013F554000-memory.dmpFilesize
3.3MB
-
memory/2208-148-0x0000000002280000-0x00000000025D4000-memory.dmpFilesize
3.3MB
-
memory/2208-41-0x0000000002280000-0x00000000025D4000-memory.dmpFilesize
3.3MB
-
memory/2208-146-0x000000013FD10000-0x0000000140064000-memory.dmpFilesize
3.3MB
-
memory/2208-144-0x0000000002280000-0x00000000025D4000-memory.dmpFilesize
3.3MB
-
memory/2208-142-0x0000000002280000-0x00000000025D4000-memory.dmpFilesize
3.3MB
-
memory/2208-28-0x0000000002280000-0x00000000025D4000-memory.dmpFilesize
3.3MB
-
memory/2208-99-0x000000013FD10000-0x0000000140064000-memory.dmpFilesize
3.3MB
-
memory/2208-141-0x000000013FAD0000-0x000000013FE24000-memory.dmpFilesize
3.3MB
-
memory/2352-150-0x000000013F2B0000-0x000000013F604000-memory.dmpFilesize
3.3MB
-
memory/2352-19-0x000000013F2B0000-0x000000013F604000-memory.dmpFilesize
3.3MB
-
memory/2480-156-0x000000013F050000-0x000000013F3A4000-memory.dmpFilesize
3.3MB
-
memory/2480-56-0x000000013F050000-0x000000013F3A4000-memory.dmpFilesize
3.3MB
-
memory/2484-78-0x000000013F5F0000-0x000000013F944000-memory.dmpFilesize
3.3MB
-
memory/2484-153-0x000000013F5F0000-0x000000013F944000-memory.dmpFilesize
3.3MB
-
memory/2484-37-0x000000013F5F0000-0x000000013F944000-memory.dmpFilesize
3.3MB
-
memory/2552-67-0x000000013F3F0000-0x000000013F744000-memory.dmpFilesize
3.3MB
-
memory/2552-139-0x000000013F3F0000-0x000000013F744000-memory.dmpFilesize
3.3MB
-
memory/2552-158-0x000000013F3F0000-0x000000013F744000-memory.dmpFilesize
3.3MB
-
memory/2588-21-0x000000013F200000-0x000000013F554000-memory.dmpFilesize
3.3MB
-
memory/2588-77-0x000000013F200000-0x000000013F554000-memory.dmpFilesize
3.3MB
-
memory/2588-151-0x000000013F200000-0x000000013F554000-memory.dmpFilesize
3.3MB
-
memory/2616-48-0x000000013F1F0000-0x000000013F544000-memory.dmpFilesize
3.3MB
-
memory/2616-155-0x000000013F1F0000-0x000000013F544000-memory.dmpFilesize
3.3MB
-
memory/2616-137-0x000000013F1F0000-0x000000013F544000-memory.dmpFilesize
3.3MB
-
memory/2704-152-0x000000013F3C0000-0x000000013F714000-memory.dmpFilesize
3.3MB
-
memory/2704-33-0x000000013F3C0000-0x000000013F714000-memory.dmpFilesize
3.3MB
-
memory/2736-45-0x000000013F910000-0x000000013FC64000-memory.dmpFilesize
3.3MB
-
memory/2736-154-0x000000013F910000-0x000000013FC64000-memory.dmpFilesize
3.3MB
-
memory/2792-161-0x000000013F4F0000-0x000000013F844000-memory.dmpFilesize
3.3MB
-
memory/2792-92-0x000000013F4F0000-0x000000013F844000-memory.dmpFilesize
3.3MB
-
memory/2792-145-0x000000013F4F0000-0x000000013F844000-memory.dmpFilesize
3.3MB
-
memory/2820-143-0x000000013F630000-0x000000013F984000-memory.dmpFilesize
3.3MB
-
memory/2820-85-0x000000013F630000-0x000000013F984000-memory.dmpFilesize
3.3MB
-
memory/2820-160-0x000000013F630000-0x000000013F984000-memory.dmpFilesize
3.3MB
-
memory/2852-100-0x000000013FD10000-0x0000000140064000-memory.dmpFilesize
3.3MB
-
memory/2852-147-0x000000013FD10000-0x0000000140064000-memory.dmpFilesize
3.3MB
-
memory/2852-162-0x000000013FD10000-0x0000000140064000-memory.dmpFilesize
3.3MB
-
memory/3032-140-0x000000013F730000-0x000000013FA84000-memory.dmpFilesize
3.3MB
-
memory/3032-157-0x000000013F730000-0x000000013FA84000-memory.dmpFilesize
3.3MB
-
memory/3032-68-0x000000013F730000-0x000000013FA84000-memory.dmpFilesize
3.3MB