Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 08:57
Behavioral task
behavioral1
Sample
2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240221-en
General
-
Target
2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
e002344a389d8ecdb9b8d2d8793202d7
-
SHA1
47def7598aea03a19eedfbdf31c08b959eb74eb9
-
SHA256
b6e7b8e1d526534e6fea86caa155154b8377c5caee9f4588ae50af87d87842ef
-
SHA512
3b93d01117ad02194b29b566c48de9a8517281544ad809539b84787b9bc6be0ed36986571098b4f6683b1b51e085fc6c1f43f4ec7a9437f928e5b8955d34e796
-
SSDEEP
98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lUb:Q+856utgpPF8u/7b
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\MHpmsuV.exe cobalt_reflective_dll \Windows\system\RzeecdL.exe cobalt_reflective_dll \Windows\system\uxEvXnP.exe cobalt_reflective_dll C:\Windows\system\NFDMZUu.exe cobalt_reflective_dll C:\Windows\system\LQdDLvJ.exe cobalt_reflective_dll C:\Windows\system\Cxazprn.exe cobalt_reflective_dll C:\Windows\system\YWxWZZT.exe cobalt_reflective_dll C:\Windows\system\IJQHAuw.exe cobalt_reflective_dll C:\Windows\system\wXlnsUD.exe cobalt_reflective_dll C:\Windows\system\rVLFcGY.exe cobalt_reflective_dll C:\Windows\system\yDXbGqn.exe cobalt_reflective_dll C:\Windows\system\uqdBvir.exe cobalt_reflective_dll C:\Windows\system\UpjWaYb.exe cobalt_reflective_dll C:\Windows\system\vfLtssc.exe cobalt_reflective_dll C:\Windows\system\AKushRZ.exe cobalt_reflective_dll C:\Windows\system\VAFquol.exe cobalt_reflective_dll C:\Windows\system\GSKTtCF.exe cobalt_reflective_dll C:\Windows\system\aceeiQL.exe cobalt_reflective_dll C:\Windows\system\wCjDfSj.exe cobalt_reflective_dll C:\Windows\system\WnsIFbV.exe cobalt_reflective_dll C:\Windows\system\hwKSfWz.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule \Windows\system\MHpmsuV.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\RzeecdL.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\uxEvXnP.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\NFDMZUu.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\LQdDLvJ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\Cxazprn.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\YWxWZZT.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\IJQHAuw.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\wXlnsUD.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\rVLFcGY.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\yDXbGqn.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\uqdBvir.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\UpjWaYb.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\vfLtssc.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\AKushRZ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\VAFquol.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\GSKTtCF.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\aceeiQL.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\wCjDfSj.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\WnsIFbV.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\hwKSfWz.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 58 IoCs
Processes:
resource yara_rule behavioral1/memory/2060-0-0x000000013FD40000-0x0000000140094000-memory.dmp UPX \Windows\system\MHpmsuV.exe UPX behavioral1/memory/1708-9-0x000000013FFB0000-0x0000000140304000-memory.dmp UPX \Windows\system\RzeecdL.exe UPX behavioral1/memory/2540-23-0x000000013F210000-0x000000013F564000-memory.dmp UPX behavioral1/memory/2664-29-0x000000013F580000-0x000000013F8D4000-memory.dmp UPX \Windows\system\uxEvXnP.exe UPX C:\Windows\system\NFDMZUu.exe UPX behavioral1/memory/2620-15-0x000000013FC60000-0x000000013FFB4000-memory.dmp UPX C:\Windows\system\LQdDLvJ.exe UPX behavioral1/memory/2836-36-0x000000013F660000-0x000000013F9B4000-memory.dmp UPX C:\Windows\system\Cxazprn.exe UPX behavioral1/memory/2960-51-0x000000013FFC0000-0x0000000140314000-memory.dmp UPX C:\Windows\system\YWxWZZT.exe UPX behavioral1/memory/2964-73-0x000000013F8E0000-0x000000013FC34000-memory.dmp UPX behavioral1/memory/1800-81-0x000000013FF00000-0x0000000140254000-memory.dmp UPX behavioral1/memory/2540-87-0x000000013F210000-0x000000013F564000-memory.dmp UPX behavioral1/memory/2772-97-0x000000013F190000-0x000000013F4E4000-memory.dmp UPX C:\Windows\system\IJQHAuw.exe UPX C:\Windows\system\wXlnsUD.exe UPX C:\Windows\system\rVLFcGY.exe UPX C:\Windows\system\yDXbGqn.exe UPX C:\Windows\system\uqdBvir.exe UPX C:\Windows\system\UpjWaYb.exe UPX behavioral1/memory/2592-141-0x000000013F120000-0x000000013F474000-memory.dmp UPX behavioral1/memory/2836-110-0x000000013F660000-0x000000013F9B4000-memory.dmp UPX C:\Windows\system\vfLtssc.exe UPX behavioral1/memory/1936-104-0x000000013F8D0000-0x000000013FC24000-memory.dmp UPX C:\Windows\system\AKushRZ.exe UPX behavioral1/memory/2664-95-0x000000013F580000-0x000000013F8D4000-memory.dmp UPX C:\Windows\system\VAFquol.exe UPX behavioral1/memory/2700-89-0x000000013FFB0000-0x0000000140304000-memory.dmp UPX C:\Windows\system\GSKTtCF.exe UPX behavioral1/memory/2620-79-0x000000013FC60000-0x000000013FFB4000-memory.dmp UPX C:\Windows\system\aceeiQL.exe UPX behavioral1/memory/1708-71-0x000000013FFB0000-0x0000000140304000-memory.dmp UPX behavioral1/memory/2464-63-0x000000013FCB0000-0x0000000140004000-memory.dmp UPX behavioral1/memory/2060-62-0x000000013FD40000-0x0000000140094000-memory.dmp UPX C:\Windows\system\wCjDfSj.exe UPX behavioral1/memory/2488-58-0x000000013FE60000-0x00000001401B4000-memory.dmp UPX C:\Windows\system\WnsIFbV.exe UPX behavioral1/memory/2464-142-0x000000013FCB0000-0x0000000140004000-memory.dmp UPX behavioral1/memory/2592-41-0x000000013F120000-0x000000013F474000-memory.dmp UPX C:\Windows\system\hwKSfWz.exe UPX behavioral1/memory/1708-148-0x000000013FFB0000-0x0000000140304000-memory.dmp UPX behavioral1/memory/2620-149-0x000000013FC60000-0x000000013FFB4000-memory.dmp UPX behavioral1/memory/2540-150-0x000000013F210000-0x000000013F564000-memory.dmp UPX behavioral1/memory/2664-151-0x000000013F580000-0x000000013F8D4000-memory.dmp UPX behavioral1/memory/2836-152-0x000000013F660000-0x000000013F9B4000-memory.dmp UPX behavioral1/memory/2960-154-0x000000013FFC0000-0x0000000140314000-memory.dmp UPX behavioral1/memory/2592-153-0x000000013F120000-0x000000013F474000-memory.dmp UPX behavioral1/memory/2488-155-0x000000013FE60000-0x00000001401B4000-memory.dmp UPX behavioral1/memory/2464-156-0x000000013FCB0000-0x0000000140004000-memory.dmp UPX behavioral1/memory/2964-157-0x000000013F8E0000-0x000000013FC34000-memory.dmp UPX behavioral1/memory/1800-158-0x000000013FF00000-0x0000000140254000-memory.dmp UPX behavioral1/memory/2700-159-0x000000013FFB0000-0x0000000140304000-memory.dmp UPX behavioral1/memory/2772-160-0x000000013F190000-0x000000013F4E4000-memory.dmp UPX behavioral1/memory/1936-161-0x000000013F8D0000-0x000000013FC24000-memory.dmp UPX -
XMRig Miner payload 61 IoCs
Processes:
resource yara_rule behavioral1/memory/2060-0-0x000000013FD40000-0x0000000140094000-memory.dmp xmrig \Windows\system\MHpmsuV.exe xmrig behavioral1/memory/1708-9-0x000000013FFB0000-0x0000000140304000-memory.dmp xmrig \Windows\system\RzeecdL.exe xmrig behavioral1/memory/2540-23-0x000000013F210000-0x000000013F564000-memory.dmp xmrig behavioral1/memory/2060-31-0x000000013F660000-0x000000013F9B4000-memory.dmp xmrig behavioral1/memory/2664-29-0x000000013F580000-0x000000013F8D4000-memory.dmp xmrig \Windows\system\uxEvXnP.exe xmrig C:\Windows\system\NFDMZUu.exe xmrig behavioral1/memory/2620-15-0x000000013FC60000-0x000000013FFB4000-memory.dmp xmrig C:\Windows\system\LQdDLvJ.exe xmrig behavioral1/memory/2836-36-0x000000013F660000-0x000000013F9B4000-memory.dmp xmrig C:\Windows\system\Cxazprn.exe xmrig behavioral1/memory/2960-51-0x000000013FFC0000-0x0000000140314000-memory.dmp xmrig C:\Windows\system\YWxWZZT.exe xmrig behavioral1/memory/2964-73-0x000000013F8E0000-0x000000013FC34000-memory.dmp xmrig behavioral1/memory/1800-81-0x000000013FF00000-0x0000000140254000-memory.dmp xmrig behavioral1/memory/2540-87-0x000000013F210000-0x000000013F564000-memory.dmp xmrig behavioral1/memory/2772-97-0x000000013F190000-0x000000013F4E4000-memory.dmp xmrig C:\Windows\system\IJQHAuw.exe xmrig C:\Windows\system\wXlnsUD.exe xmrig C:\Windows\system\rVLFcGY.exe xmrig C:\Windows\system\yDXbGqn.exe xmrig C:\Windows\system\uqdBvir.exe xmrig C:\Windows\system\UpjWaYb.exe xmrig behavioral1/memory/2060-113-0x000000013F190000-0x000000013F4E4000-memory.dmp xmrig behavioral1/memory/2592-141-0x000000013F120000-0x000000013F474000-memory.dmp xmrig behavioral1/memory/2836-110-0x000000013F660000-0x000000013F9B4000-memory.dmp xmrig C:\Windows\system\vfLtssc.exe xmrig behavioral1/memory/1936-104-0x000000013F8D0000-0x000000013FC24000-memory.dmp xmrig C:\Windows\system\AKushRZ.exe xmrig behavioral1/memory/2664-95-0x000000013F580000-0x000000013F8D4000-memory.dmp xmrig C:\Windows\system\VAFquol.exe xmrig behavioral1/memory/2700-89-0x000000013FFB0000-0x0000000140304000-memory.dmp xmrig C:\Windows\system\GSKTtCF.exe xmrig behavioral1/memory/2620-79-0x000000013FC60000-0x000000013FFB4000-memory.dmp xmrig C:\Windows\system\aceeiQL.exe xmrig behavioral1/memory/1708-71-0x000000013FFB0000-0x0000000140304000-memory.dmp xmrig behavioral1/memory/2464-63-0x000000013FCB0000-0x0000000140004000-memory.dmp xmrig behavioral1/memory/2060-62-0x000000013FD40000-0x0000000140094000-memory.dmp xmrig C:\Windows\system\wCjDfSj.exe xmrig behavioral1/memory/2488-58-0x000000013FE60000-0x00000001401B4000-memory.dmp xmrig C:\Windows\system\WnsIFbV.exe xmrig behavioral1/memory/2464-142-0x000000013FCB0000-0x0000000140004000-memory.dmp xmrig behavioral1/memory/2592-41-0x000000013F120000-0x000000013F474000-memory.dmp xmrig C:\Windows\system\hwKSfWz.exe xmrig behavioral1/memory/2060-147-0x000000013F190000-0x000000013F4E4000-memory.dmp xmrig behavioral1/memory/1708-148-0x000000013FFB0000-0x0000000140304000-memory.dmp xmrig behavioral1/memory/2620-149-0x000000013FC60000-0x000000013FFB4000-memory.dmp xmrig behavioral1/memory/2540-150-0x000000013F210000-0x000000013F564000-memory.dmp xmrig behavioral1/memory/2664-151-0x000000013F580000-0x000000013F8D4000-memory.dmp xmrig behavioral1/memory/2836-152-0x000000013F660000-0x000000013F9B4000-memory.dmp xmrig behavioral1/memory/2960-154-0x000000013FFC0000-0x0000000140314000-memory.dmp xmrig behavioral1/memory/2592-153-0x000000013F120000-0x000000013F474000-memory.dmp xmrig behavioral1/memory/2488-155-0x000000013FE60000-0x00000001401B4000-memory.dmp xmrig behavioral1/memory/2464-156-0x000000013FCB0000-0x0000000140004000-memory.dmp xmrig behavioral1/memory/2964-157-0x000000013F8E0000-0x000000013FC34000-memory.dmp xmrig behavioral1/memory/1800-158-0x000000013FF00000-0x0000000140254000-memory.dmp xmrig behavioral1/memory/2700-159-0x000000013FFB0000-0x0000000140304000-memory.dmp xmrig behavioral1/memory/2772-160-0x000000013F190000-0x000000013F4E4000-memory.dmp xmrig behavioral1/memory/1936-161-0x000000013F8D0000-0x000000013FC24000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
MHpmsuV.exeRzeecdL.exeLQdDLvJ.exeNFDMZUu.exeuxEvXnP.exehwKSfWz.exeCxazprn.exeWnsIFbV.exewCjDfSj.exeYWxWZZT.exeaceeiQL.exeGSKTtCF.exeVAFquol.exeAKushRZ.exevfLtssc.exeUpjWaYb.exeIJQHAuw.exeuqdBvir.exeyDXbGqn.exerVLFcGY.exewXlnsUD.exepid process 1708 MHpmsuV.exe 2620 RzeecdL.exe 2540 LQdDLvJ.exe 2664 NFDMZUu.exe 2836 uxEvXnP.exe 2592 hwKSfWz.exe 2960 Cxazprn.exe 2488 WnsIFbV.exe 2464 wCjDfSj.exe 2964 YWxWZZT.exe 1800 aceeiQL.exe 2700 GSKTtCF.exe 2772 VAFquol.exe 1936 AKushRZ.exe 1812 vfLtssc.exe 1976 UpjWaYb.exe 1744 IJQHAuw.exe 1344 uqdBvir.exe 2320 yDXbGqn.exe 1664 rVLFcGY.exe 600 wXlnsUD.exe -
Loads dropped DLL 21 IoCs
Processes:
2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exepid process 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe -
Processes:
resource yara_rule behavioral1/memory/2060-0-0x000000013FD40000-0x0000000140094000-memory.dmp upx \Windows\system\MHpmsuV.exe upx behavioral1/memory/1708-9-0x000000013FFB0000-0x0000000140304000-memory.dmp upx \Windows\system\RzeecdL.exe upx behavioral1/memory/2540-23-0x000000013F210000-0x000000013F564000-memory.dmp upx behavioral1/memory/2664-29-0x000000013F580000-0x000000013F8D4000-memory.dmp upx \Windows\system\uxEvXnP.exe upx C:\Windows\system\NFDMZUu.exe upx behavioral1/memory/2620-15-0x000000013FC60000-0x000000013FFB4000-memory.dmp upx C:\Windows\system\LQdDLvJ.exe upx behavioral1/memory/2836-36-0x000000013F660000-0x000000013F9B4000-memory.dmp upx C:\Windows\system\Cxazprn.exe upx behavioral1/memory/2960-51-0x000000013FFC0000-0x0000000140314000-memory.dmp upx C:\Windows\system\YWxWZZT.exe upx behavioral1/memory/2964-73-0x000000013F8E0000-0x000000013FC34000-memory.dmp upx behavioral1/memory/1800-81-0x000000013FF00000-0x0000000140254000-memory.dmp upx behavioral1/memory/2540-87-0x000000013F210000-0x000000013F564000-memory.dmp upx behavioral1/memory/2772-97-0x000000013F190000-0x000000013F4E4000-memory.dmp upx C:\Windows\system\IJQHAuw.exe upx C:\Windows\system\wXlnsUD.exe upx C:\Windows\system\rVLFcGY.exe upx C:\Windows\system\yDXbGqn.exe upx C:\Windows\system\uqdBvir.exe upx C:\Windows\system\UpjWaYb.exe upx behavioral1/memory/2592-141-0x000000013F120000-0x000000013F474000-memory.dmp upx behavioral1/memory/2836-110-0x000000013F660000-0x000000013F9B4000-memory.dmp upx C:\Windows\system\vfLtssc.exe upx behavioral1/memory/1936-104-0x000000013F8D0000-0x000000013FC24000-memory.dmp upx C:\Windows\system\AKushRZ.exe upx behavioral1/memory/2664-95-0x000000013F580000-0x000000013F8D4000-memory.dmp upx C:\Windows\system\VAFquol.exe upx behavioral1/memory/2700-89-0x000000013FFB0000-0x0000000140304000-memory.dmp upx C:\Windows\system\GSKTtCF.exe upx behavioral1/memory/2620-79-0x000000013FC60000-0x000000013FFB4000-memory.dmp upx C:\Windows\system\aceeiQL.exe upx behavioral1/memory/1708-71-0x000000013FFB0000-0x0000000140304000-memory.dmp upx behavioral1/memory/2464-63-0x000000013FCB0000-0x0000000140004000-memory.dmp upx behavioral1/memory/2060-62-0x000000013FD40000-0x0000000140094000-memory.dmp upx C:\Windows\system\wCjDfSj.exe upx behavioral1/memory/2488-58-0x000000013FE60000-0x00000001401B4000-memory.dmp upx C:\Windows\system\WnsIFbV.exe upx behavioral1/memory/2464-142-0x000000013FCB0000-0x0000000140004000-memory.dmp upx behavioral1/memory/2592-41-0x000000013F120000-0x000000013F474000-memory.dmp upx C:\Windows\system\hwKSfWz.exe upx behavioral1/memory/1708-148-0x000000013FFB0000-0x0000000140304000-memory.dmp upx behavioral1/memory/2620-149-0x000000013FC60000-0x000000013FFB4000-memory.dmp upx behavioral1/memory/2540-150-0x000000013F210000-0x000000013F564000-memory.dmp upx behavioral1/memory/2664-151-0x000000013F580000-0x000000013F8D4000-memory.dmp upx behavioral1/memory/2836-152-0x000000013F660000-0x000000013F9B4000-memory.dmp upx behavioral1/memory/2960-154-0x000000013FFC0000-0x0000000140314000-memory.dmp upx behavioral1/memory/2592-153-0x000000013F120000-0x000000013F474000-memory.dmp upx behavioral1/memory/2488-155-0x000000013FE60000-0x00000001401B4000-memory.dmp upx behavioral1/memory/2464-156-0x000000013FCB0000-0x0000000140004000-memory.dmp upx behavioral1/memory/2964-157-0x000000013F8E0000-0x000000013FC34000-memory.dmp upx behavioral1/memory/1800-158-0x000000013FF00000-0x0000000140254000-memory.dmp upx behavioral1/memory/2700-159-0x000000013FFB0000-0x0000000140304000-memory.dmp upx behavioral1/memory/2772-160-0x000000013F190000-0x000000013F4E4000-memory.dmp upx behavioral1/memory/1936-161-0x000000013F8D0000-0x000000013FC24000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exedescription ioc process File created C:\Windows\System\Cxazprn.exe 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\wCjDfSj.exe 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\GSKTtCF.exe 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\VAFquol.exe 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\AKushRZ.exe 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\yDXbGqn.exe 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\rVLFcGY.exe 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\MHpmsuV.exe 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\RzeecdL.exe 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\LQdDLvJ.exe 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\uxEvXnP.exe 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\hwKSfWz.exe 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\IJQHAuw.exe 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\NFDMZUu.exe 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\WnsIFbV.exe 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\aceeiQL.exe 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\wXlnsUD.exe 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\YWxWZZT.exe 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\vfLtssc.exe 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\UpjWaYb.exe 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\uqdBvir.exe 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process Token: SeLockMemoryPrivilege 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process target process PID 2060 wrote to memory of 1708 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe MHpmsuV.exe PID 2060 wrote to memory of 1708 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe MHpmsuV.exe PID 2060 wrote to memory of 1708 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe MHpmsuV.exe PID 2060 wrote to memory of 2620 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe RzeecdL.exe PID 2060 wrote to memory of 2620 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe RzeecdL.exe PID 2060 wrote to memory of 2620 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe RzeecdL.exe PID 2060 wrote to memory of 2540 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe LQdDLvJ.exe PID 2060 wrote to memory of 2540 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe LQdDLvJ.exe PID 2060 wrote to memory of 2540 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe LQdDLvJ.exe PID 2060 wrote to memory of 2664 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe NFDMZUu.exe PID 2060 wrote to memory of 2664 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe NFDMZUu.exe PID 2060 wrote to memory of 2664 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe NFDMZUu.exe PID 2060 wrote to memory of 2836 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe uxEvXnP.exe PID 2060 wrote to memory of 2836 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe uxEvXnP.exe PID 2060 wrote to memory of 2836 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe uxEvXnP.exe PID 2060 wrote to memory of 2592 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe hwKSfWz.exe PID 2060 wrote to memory of 2592 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe hwKSfWz.exe PID 2060 wrote to memory of 2592 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe hwKSfWz.exe PID 2060 wrote to memory of 2960 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe Cxazprn.exe PID 2060 wrote to memory of 2960 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe Cxazprn.exe PID 2060 wrote to memory of 2960 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe Cxazprn.exe PID 2060 wrote to memory of 2488 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe WnsIFbV.exe PID 2060 wrote to memory of 2488 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe WnsIFbV.exe PID 2060 wrote to memory of 2488 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe WnsIFbV.exe PID 2060 wrote to memory of 2464 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe wCjDfSj.exe PID 2060 wrote to memory of 2464 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe wCjDfSj.exe PID 2060 wrote to memory of 2464 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe wCjDfSj.exe PID 2060 wrote to memory of 2964 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe YWxWZZT.exe PID 2060 wrote to memory of 2964 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe YWxWZZT.exe PID 2060 wrote to memory of 2964 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe YWxWZZT.exe PID 2060 wrote to memory of 1800 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe aceeiQL.exe PID 2060 wrote to memory of 1800 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe aceeiQL.exe PID 2060 wrote to memory of 1800 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe aceeiQL.exe PID 2060 wrote to memory of 2700 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe GSKTtCF.exe PID 2060 wrote to memory of 2700 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe GSKTtCF.exe PID 2060 wrote to memory of 2700 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe GSKTtCF.exe PID 2060 wrote to memory of 2772 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe VAFquol.exe PID 2060 wrote to memory of 2772 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe VAFquol.exe PID 2060 wrote to memory of 2772 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe VAFquol.exe PID 2060 wrote to memory of 1936 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe AKushRZ.exe PID 2060 wrote to memory of 1936 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe AKushRZ.exe PID 2060 wrote to memory of 1936 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe AKushRZ.exe PID 2060 wrote to memory of 1812 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe vfLtssc.exe PID 2060 wrote to memory of 1812 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe vfLtssc.exe PID 2060 wrote to memory of 1812 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe vfLtssc.exe PID 2060 wrote to memory of 1976 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe UpjWaYb.exe PID 2060 wrote to memory of 1976 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe UpjWaYb.exe PID 2060 wrote to memory of 1976 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe UpjWaYb.exe PID 2060 wrote to memory of 1744 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe IJQHAuw.exe PID 2060 wrote to memory of 1744 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe IJQHAuw.exe PID 2060 wrote to memory of 1744 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe IJQHAuw.exe PID 2060 wrote to memory of 1344 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe uqdBvir.exe PID 2060 wrote to memory of 1344 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe uqdBvir.exe PID 2060 wrote to memory of 1344 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe uqdBvir.exe PID 2060 wrote to memory of 2320 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe yDXbGqn.exe PID 2060 wrote to memory of 2320 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe yDXbGqn.exe PID 2060 wrote to memory of 2320 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe yDXbGqn.exe PID 2060 wrote to memory of 1664 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe rVLFcGY.exe PID 2060 wrote to memory of 1664 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe rVLFcGY.exe PID 2060 wrote to memory of 1664 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe rVLFcGY.exe PID 2060 wrote to memory of 600 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe wXlnsUD.exe PID 2060 wrote to memory of 600 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe wXlnsUD.exe PID 2060 wrote to memory of 600 2060 2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe wXlnsUD.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-28_e002344a389d8ecdb9b8d2d8793202d7_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\MHpmsuV.exeC:\Windows\System\MHpmsuV.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RzeecdL.exeC:\Windows\System\RzeecdL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\LQdDLvJ.exeC:\Windows\System\LQdDLvJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\NFDMZUu.exeC:\Windows\System\NFDMZUu.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\uxEvXnP.exeC:\Windows\System\uxEvXnP.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\hwKSfWz.exeC:\Windows\System\hwKSfWz.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\Cxazprn.exeC:\Windows\System\Cxazprn.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\WnsIFbV.exeC:\Windows\System\WnsIFbV.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wCjDfSj.exeC:\Windows\System\wCjDfSj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YWxWZZT.exeC:\Windows\System\YWxWZZT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aceeiQL.exeC:\Windows\System\aceeiQL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\GSKTtCF.exeC:\Windows\System\GSKTtCF.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\VAFquol.exeC:\Windows\System\VAFquol.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\AKushRZ.exeC:\Windows\System\AKushRZ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\vfLtssc.exeC:\Windows\System\vfLtssc.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\UpjWaYb.exeC:\Windows\System\UpjWaYb.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\IJQHAuw.exeC:\Windows\System\IJQHAuw.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\uqdBvir.exeC:\Windows\System\uqdBvir.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\yDXbGqn.exeC:\Windows\System\yDXbGqn.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\rVLFcGY.exeC:\Windows\System\rVLFcGY.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wXlnsUD.exeC:\Windows\System\wXlnsUD.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\AKushRZ.exeFilesize
5.9MB
MD56ec3badcc24e3cd623678a32a0317f75
SHA1f72b1ce1a76a312d89d723cd1f5d130b8f22ab05
SHA256634556c51171995029ba71b8c7ed7144f7d6e6dedb03115f801641dd871ad63a
SHA5122d48ba8dbc12bf7340f533129e9db2dc817fcc2b95403aa797fd5ec4ffdc9db004dced869a463ed683a61f74ce6989a7e3b49eea065341e311b361be694aa235
-
C:\Windows\system\Cxazprn.exeFilesize
5.9MB
MD508e114764500a943daebaee780ebc3d9
SHA111c64a8d706769f03fca90507932ea381e36c787
SHA256c644810fd8b813fe7e629c4f9f0ab1de5f57fdf0372b7e6010bc631a7f901db1
SHA5124e3c0ae4b65120356a91885308c24541dbc2b4ca89192766476559558248590a1b42f071352bd373184f02cbf3aada2a20e7eb2ccd630945f46b09e2a0b6e982
-
C:\Windows\system\GSKTtCF.exeFilesize
5.9MB
MD5c191f4e13347af7d47569530792db3a8
SHA14c1c4df608ff374f8c507b14a4bcbb53ded1d804
SHA256e33dc5dcedd0a6b3e9871aa90774a1997db464524d0d2c9ebc9e803bb82e6949
SHA5122771917fb73e657cffd79f7573399a394185539bf906297941c0e97edddf7b3da5b1f76db1ff207f664e65785f4d638e2c4f9f860940bb99cc33a629af6943e5
-
C:\Windows\system\IJQHAuw.exeFilesize
5.9MB
MD56cb37ee073cca003df738c6f7061643a
SHA1039389a3cef0d8b647254bc9b3162027614cf910
SHA25696a49d9fd3cfd04d63c48be25ed2f1a2c0b0e9e1608f136941406674dbee5231
SHA512235c91a34b209bd41a6675a7b824a5f676126328bd4a6e6c8622bdd418040f41386b43e0307f5a9b73d2f7271ce6bf28b98ec24300ebd32746fdcac467924642
-
C:\Windows\system\LQdDLvJ.exeFilesize
5.9MB
MD50adcc2c8acad3131146e03f671b92bab
SHA15fc109f374331768cc41ae343194848f40d22ecf
SHA2562357d140c484e7b47e6f78e0ef162d9572a74f1bf847bef186ecd19a51bd35ac
SHA5124b514f3f1bbae0153d720731121411db2f8f56302e5ebd56a965638024371d4c49da875f289a11e5cbcdbc78b848374487f543aac02c90e93fd6b147ea5e9607
-
C:\Windows\system\NFDMZUu.exeFilesize
5.9MB
MD5ebfc7e93ef375529b9b01368dbbe7b0b
SHA196983fe23be02c77eab2e2b83a17d1bb53bba6c8
SHA256e8bb40c1cb52a75dad4aa9b549f156a55391311021a924f4b978a54e37aa53fd
SHA5123038d038298667dffc516edbd10b3e630834c8ca302dcf4f1ebe8b605bc1c0329b533b709578bede6b176222481cb41e41acd6ba7236b400708f1ac1a31e0821
-
C:\Windows\system\UpjWaYb.exeFilesize
5.9MB
MD53c0e08a2934a54407ecca5d58b7a11d4
SHA1f66560343c5502d70c1aa88c72e38a5457e98e76
SHA256b42f3bd1b23e84173272508c595d439219d1143c877433e127fc55381ca230bb
SHA512b17aec4b28b00e708b5da7f338002d19cd6630bf9f88aaaa54e90078177260b73e3dbb740d8f09c559af285e4a93e6037ff01c50d909347c79a5b8875b89daa0
-
C:\Windows\system\VAFquol.exeFilesize
5.9MB
MD50b9199b97cabcfb1b66443da63b980a6
SHA15d2c33e7f9e9e8046d5bd68140bb2afc0faaa0eb
SHA256c856f0a0d8ad1d05b1f21e30989e1615c09e7eb8909ec2e491c736779d576533
SHA5127bd8ed11a82301469b3871a9d59d0a4f83b5a0c11526273d24a907739aaccd583fbe8559fa912994d2bb211b4feba2bef98dbb5424a289f2b89eba133524a259
-
C:\Windows\system\WnsIFbV.exeFilesize
5.9MB
MD591d729fb559c7a618ba16167c12df3ad
SHA1f87694ec70e7cb0179fe6f5efa8dfd45ff8757f1
SHA2560403b768e29ef99096e6910934b800c18bb7512b046018fd10259044b216bd7a
SHA51289780678024283e478ca01a234484aeba093580bc6221baf2ca944e1ea6c38548f6218d04df9335e44a39efc9196aab3f1f917e54477166fb17287d71da862b7
-
C:\Windows\system\YWxWZZT.exeFilesize
5.9MB
MD5acf8e1daf304d380e4e719d735b7f4f7
SHA1e8965176828973938c0c59147e642bdf25b2893f
SHA256dbbdfbc6d58a6a5cbc537a6aaca5c5cbef837860591243942956927a85149cca
SHA512735acd26b5372ab96461c53e202298d3b9b3726aeeeb9a42ce7a3e8054664dd6922a5cfa49eb60eb88d69652b3a098e4a89fb96f8d62df28a94ec99dc6ee365b
-
C:\Windows\system\aceeiQL.exeFilesize
5.9MB
MD5c1dbffd5b8a83f8f2397df4379fa3443
SHA19648d41a5e47ae1c7c3cd8630bf12e599ff2b9ad
SHA256b57540c839d1960dcd49ea532f410e6a06b50b924f5c101233adc5f3a91899a0
SHA512a34e04aa0056b67255526df8ecf69ab265117b816f9a8239b2814bbd73144247a31787671a8fec046f222c5ed19d4b7c12c4ceeff162ef671e629767d3c79e31
-
C:\Windows\system\hwKSfWz.exeFilesize
5.9MB
MD5bffabf183be2890b6970bb178865561f
SHA17cb9ccc296e92d55d6e99cf71cdbc5ce5acbfa8c
SHA2560d4b65814b519e99cc77a317b5e07e845e8a7c3df6c28e22515236ec8f73f1d5
SHA51252f74adce0d9ae94424e4db2915c5500350d253adf11f5b236f3d749897b959a4259fcd8f707919a1f869c8ddde1c8ad134064260b35b1e6b760858d2ffd80fb
-
C:\Windows\system\rVLFcGY.exeFilesize
5.9MB
MD51d5d025b00757293ae3edc6c80f4f66b
SHA1c0d3abac55ed199f019a32dc682b825017d90123
SHA25608a5358eadcecbd0ee20ff27efb3a491eaa67faa7f4e405ce0a135e5f452a80a
SHA5125afdfbc5c896d5c4b4d164c0d4072fa8e4d35d68b48948a5d973e84bd869727680718d7946c1c66745801fba148163a25f482173e1127298a9eabd9f00649407
-
C:\Windows\system\uqdBvir.exeFilesize
5.9MB
MD554ecdd5d4a701cdf7d8fed45b492a655
SHA1631c2380281e866343c67c04de013c91494dd025
SHA256a204a229f40fb9c24dcbe03bb22e4e22527ad86db9738f7c0fe84baa35e25cd7
SHA512a9e0cd5aea77e9a81a9ab911d9dd4d954c48d67e093998f868233aaff0cc8e25ef429064a56593fe98f3992500f3468c9517ebd287900741af882d8f0cc1f794
-
C:\Windows\system\vfLtssc.exeFilesize
5.9MB
MD5566df5483d640a89279c198e10c2cd9f
SHA1a9181e5b1a9337fbd89f7ad767597e6999c402fe
SHA25672a132808891464a1e14a9011c26b21ce9e42b4fca45c98c30c9c37d30b91451
SHA5122089e94147d1ea6338e09775a9e94176899dfcfce4e6129addc9574f3e89e7a4e319558aa12a768a8fcce7e651617d166ce40973c64ea50d38ef0330251f4e10
-
C:\Windows\system\wCjDfSj.exeFilesize
5.9MB
MD56f7a0619192708554b2b32f4da5db3c0
SHA14a00623c531c20853667746322fe347c6b1ad120
SHA2566185dce9806760ad5362e27e127d560cf2688f88b42d64f4a32aa45f348da1fe
SHA512caa7bb45afcb39d7794a2037a6304c5d3e8962ffe973f9a7d4b72bdc0071eb0c020187038bbe07f00c897e19fed11e43c8c31d07376a45d34b478fa260c6d0df
-
C:\Windows\system\wXlnsUD.exeFilesize
5.9MB
MD508b6e98468a63768175e751d1de0fdee
SHA1f3adec2a3e5ba96eb85a72d789784db1ffec5b7d
SHA25642ce6e2938cefdbaa70f0d02d4a3d0229dadb791e2dd846b356a349003be6308
SHA5123eaf316ee6b73c5acf10bb98b4929bacc5da96136c17367f5fcbe410f275185abecd8f8ed561fec5baa9022f2ce9bed450947264a749dbc65e5d75f31a5092af
-
C:\Windows\system\yDXbGqn.exeFilesize
5.9MB
MD5b74769468363c6e793e2bac693f75700
SHA138228baf52f0ee058b68f320294074395d0578d1
SHA256b1816c5d5acf4f3495e6d3322ed2cbca491a11a9b1c96f83885592800bece437
SHA512cbc4fcd904c46ce3968a7c2937cd580f9f40ecabc172e4b9bfa9592100b83595486d9415d65b3b39662da70043c81f42966fe927f4e72d68b9e5fe4cedd1bab9
-
\Windows\system\MHpmsuV.exeFilesize
5.9MB
MD550bf4460f112953c94fe2c9f917e8c00
SHA17ff5ce5db6e55c9367e569c9e1dcb07a426efdda
SHA256dabf4815de2d3bcc2f0a5751a45bd728747810e4911795fc5b2e031b6a170067
SHA5120ddf8b1f4e08dee982ba831042cb1b92bcce8914cfad99279876e6c88f0c121e7b7602fd772a2b1b12faa8149fd7e6d9b81424623992444f39698587349e0ac3
-
\Windows\system\RzeecdL.exeFilesize
5.9MB
MD58cbb926f903dd9a3dacc74c077cc11b9
SHA15bb3b62d7379694709c295e5ff2b60996babbf47
SHA256b387131428a13c9b293dcfabeacb260c70b4464d76e40e28e301a50cc5fb1efd
SHA5123bee3c229185cf4a70217bffbcc6918a0a11073aa91629f800a28a1807b3b69991951a545e6b600b87fbfbe4cb9097a23db7f09342c498bff32c1b94067d9269
-
\Windows\system\uxEvXnP.exeFilesize
5.9MB
MD5184849a10085de62283f3eb5319ce23c
SHA1689ab107d24cf34af57396d7340f9ac899ab94f0
SHA2565198b98270a7e18cf8a36aa1fb3bb6ecfa0906a7bb4679f11627c6e1193df45d
SHA512a06e3d987af141c91cee3a53f37de89390a5f6107bc06d2749053472776085d880089539421c8e5be6184f231b189c79c564dcc60a334d85ce951e6b736026b7
-
memory/1708-148-0x000000013FFB0000-0x0000000140304000-memory.dmpFilesize
3.3MB
-
memory/1708-9-0x000000013FFB0000-0x0000000140304000-memory.dmpFilesize
3.3MB
-
memory/1708-71-0x000000013FFB0000-0x0000000140304000-memory.dmpFilesize
3.3MB
-
memory/1800-81-0x000000013FF00000-0x0000000140254000-memory.dmpFilesize
3.3MB
-
memory/1800-158-0x000000013FF00000-0x0000000140254000-memory.dmpFilesize
3.3MB
-
memory/1936-104-0x000000013F8D0000-0x000000013FC24000-memory.dmpFilesize
3.3MB
-
memory/1936-161-0x000000013F8D0000-0x000000013FC24000-memory.dmpFilesize
3.3MB
-
memory/2060-96-0x000000013F190000-0x000000013F4E4000-memory.dmpFilesize
3.3MB
-
memory/2060-146-0x000000013F8D0000-0x000000013FC24000-memory.dmpFilesize
3.3MB
-
memory/2060-144-0x0000000002230000-0x0000000002584000-memory.dmpFilesize
3.3MB
-
memory/2060-80-0x0000000002230000-0x0000000002584000-memory.dmpFilesize
3.3MB
-
memory/2060-143-0x0000000002230000-0x0000000002584000-memory.dmpFilesize
3.3MB
-
memory/2060-1-0x00000000001F0000-0x0000000000200000-memory.dmpFilesize
64KB
-
memory/2060-7-0x0000000002230000-0x0000000002584000-memory.dmpFilesize
3.3MB
-
memory/2060-31-0x000000013F660000-0x000000013F9B4000-memory.dmpFilesize
3.3MB
-
memory/2060-103-0x000000013F8D0000-0x000000013FC24000-memory.dmpFilesize
3.3MB
-
memory/2060-40-0x000000013F120000-0x000000013F474000-memory.dmpFilesize
3.3MB
-
memory/2060-0-0x000000013FD40000-0x0000000140094000-memory.dmpFilesize
3.3MB
-
memory/2060-50-0x0000000002230000-0x0000000002584000-memory.dmpFilesize
3.3MB
-
memory/2060-145-0x000000013F190000-0x000000013F4E4000-memory.dmpFilesize
3.3MB
-
memory/2060-147-0x000000013F190000-0x000000013F4E4000-memory.dmpFilesize
3.3MB
-
memory/2060-88-0x0000000002230000-0x0000000002584000-memory.dmpFilesize
3.3MB
-
memory/2060-14-0x0000000002230000-0x0000000002584000-memory.dmpFilesize
3.3MB
-
memory/2060-113-0x000000013F190000-0x000000013F4E4000-memory.dmpFilesize
3.3MB
-
memory/2060-57-0x0000000002230000-0x0000000002584000-memory.dmpFilesize
3.3MB
-
memory/2060-28-0x000000013F580000-0x000000013F8D4000-memory.dmpFilesize
3.3MB
-
memory/2060-72-0x000000013F8E0000-0x000000013FC34000-memory.dmpFilesize
3.3MB
-
memory/2060-21-0x000000013F210000-0x000000013F564000-memory.dmpFilesize
3.3MB
-
memory/2060-62-0x000000013FD40000-0x0000000140094000-memory.dmpFilesize
3.3MB
-
memory/2464-63-0x000000013FCB0000-0x0000000140004000-memory.dmpFilesize
3.3MB
-
memory/2464-142-0x000000013FCB0000-0x0000000140004000-memory.dmpFilesize
3.3MB
-
memory/2464-156-0x000000013FCB0000-0x0000000140004000-memory.dmpFilesize
3.3MB
-
memory/2488-58-0x000000013FE60000-0x00000001401B4000-memory.dmpFilesize
3.3MB
-
memory/2488-155-0x000000013FE60000-0x00000001401B4000-memory.dmpFilesize
3.3MB
-
memory/2540-150-0x000000013F210000-0x000000013F564000-memory.dmpFilesize
3.3MB
-
memory/2540-23-0x000000013F210000-0x000000013F564000-memory.dmpFilesize
3.3MB
-
memory/2540-87-0x000000013F210000-0x000000013F564000-memory.dmpFilesize
3.3MB
-
memory/2592-153-0x000000013F120000-0x000000013F474000-memory.dmpFilesize
3.3MB
-
memory/2592-41-0x000000013F120000-0x000000013F474000-memory.dmpFilesize
3.3MB
-
memory/2592-141-0x000000013F120000-0x000000013F474000-memory.dmpFilesize
3.3MB
-
memory/2620-79-0x000000013FC60000-0x000000013FFB4000-memory.dmpFilesize
3.3MB
-
memory/2620-149-0x000000013FC60000-0x000000013FFB4000-memory.dmpFilesize
3.3MB
-
memory/2620-15-0x000000013FC60000-0x000000013FFB4000-memory.dmpFilesize
3.3MB
-
memory/2664-29-0x000000013F580000-0x000000013F8D4000-memory.dmpFilesize
3.3MB
-
memory/2664-95-0x000000013F580000-0x000000013F8D4000-memory.dmpFilesize
3.3MB
-
memory/2664-151-0x000000013F580000-0x000000013F8D4000-memory.dmpFilesize
3.3MB
-
memory/2700-89-0x000000013FFB0000-0x0000000140304000-memory.dmpFilesize
3.3MB
-
memory/2700-159-0x000000013FFB0000-0x0000000140304000-memory.dmpFilesize
3.3MB
-
memory/2772-97-0x000000013F190000-0x000000013F4E4000-memory.dmpFilesize
3.3MB
-
memory/2772-160-0x000000013F190000-0x000000013F4E4000-memory.dmpFilesize
3.3MB
-
memory/2836-152-0x000000013F660000-0x000000013F9B4000-memory.dmpFilesize
3.3MB
-
memory/2836-36-0x000000013F660000-0x000000013F9B4000-memory.dmpFilesize
3.3MB
-
memory/2836-110-0x000000013F660000-0x000000013F9B4000-memory.dmpFilesize
3.3MB
-
memory/2960-51-0x000000013FFC0000-0x0000000140314000-memory.dmpFilesize
3.3MB
-
memory/2960-154-0x000000013FFC0000-0x0000000140314000-memory.dmpFilesize
3.3MB
-
memory/2964-157-0x000000013F8E0000-0x000000013FC34000-memory.dmpFilesize
3.3MB
-
memory/2964-73-0x000000013F8E0000-0x000000013FC34000-memory.dmpFilesize
3.3MB