Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
29-06-2024 06:51
Behavioral task
behavioral1
Sample
2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240611-en
General
-
Target
2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
3069453ad4f7bf7314205e257c2526f3
-
SHA1
04a74666ba1273c5921ea7026617ddad09dcc92f
-
SHA256
04ab552014594f7cc201c97eea474bf331986f16ac017527f8b9aa4118b1e114
-
SHA512
2e197b81b72f783c96a8d8272a7ae5dee7803fc92aa9b79a7649c038453423176d055eb72fd574a2d1e59a32b2f4ef7762a8eb62537b4469b1bb95c6a9db1689
-
SSDEEP
98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lUL:Q+856utgpPF8u/7L
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\AyjyyEN.exe cobalt_reflective_dll \Windows\system\RhjDMjd.exe cobalt_reflective_dll C:\Windows\system\LWCSGtx.exe cobalt_reflective_dll C:\Windows\system\bRpXXWm.exe cobalt_reflective_dll C:\Windows\system\kxhhLgj.exe cobalt_reflective_dll C:\Windows\system\eWatdiX.exe cobalt_reflective_dll C:\Windows\system\zwXFwWu.exe cobalt_reflective_dll C:\Windows\system\yxyqfmY.exe cobalt_reflective_dll C:\Windows\system\ODiAMHR.exe cobalt_reflective_dll \Windows\system\phWPQsq.exe cobalt_reflective_dll C:\Windows\system\qHRZBGa.exe cobalt_reflective_dll C:\Windows\system\VOwzdQr.exe cobalt_reflective_dll C:\Windows\system\IpVCTmH.exe cobalt_reflective_dll C:\Windows\system\kEhstsd.exe cobalt_reflective_dll C:\Windows\system\OIGgXvk.exe cobalt_reflective_dll C:\Windows\system\GXoBPxm.exe cobalt_reflective_dll C:\Windows\system\VrWVLMI.exe cobalt_reflective_dll C:\Windows\system\wpPcuub.exe cobalt_reflective_dll C:\Windows\system\GHyTqFe.exe cobalt_reflective_dll C:\Windows\system\qSXROES.exe cobalt_reflective_dll \Windows\system\KgLOgRU.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule \Windows\system\AyjyyEN.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\RhjDMjd.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\LWCSGtx.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\bRpXXWm.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\kxhhLgj.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\eWatdiX.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\zwXFwWu.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\yxyqfmY.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\ODiAMHR.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\phWPQsq.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\qHRZBGa.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\VOwzdQr.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\IpVCTmH.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\kEhstsd.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\OIGgXvk.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\GXoBPxm.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\VrWVLMI.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\wpPcuub.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\GHyTqFe.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\qSXROES.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\KgLOgRU.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 58 IoCs
Processes:
resource yara_rule behavioral1/memory/2024-1-0x000000013F8A0000-0x000000013FBF4000-memory.dmp UPX \Windows\system\AyjyyEN.exe UPX behavioral1/memory/2304-8-0x000000013F6D0000-0x000000013FA24000-memory.dmp UPX \Windows\system\RhjDMjd.exe UPX behavioral1/memory/2616-14-0x000000013F260000-0x000000013F5B4000-memory.dmp UPX C:\Windows\system\LWCSGtx.exe UPX C:\Windows\system\bRpXXWm.exe UPX C:\Windows\system\kxhhLgj.exe UPX C:\Windows\system\eWatdiX.exe UPX behavioral1/memory/2784-47-0x000000013F400000-0x000000013F754000-memory.dmp UPX behavioral1/memory/2884-53-0x000000013FA70000-0x000000013FDC4000-memory.dmp UPX C:\Windows\system\zwXFwWu.exe UPX behavioral1/memory/2568-64-0x000000013FEA0000-0x00000001401F4000-memory.dmp UPX C:\Windows\system\yxyqfmY.exe UPX behavioral1/memory/2172-71-0x000000013FF40000-0x0000000140294000-memory.dmp UPX C:\Windows\system\ODiAMHR.exe UPX \Windows\system\phWPQsq.exe UPX C:\Windows\system\qHRZBGa.exe UPX C:\Windows\system\VOwzdQr.exe UPX C:\Windows\system\IpVCTmH.exe UPX C:\Windows\system\kEhstsd.exe UPX C:\Windows\system\OIGgXvk.exe UPX behavioral1/memory/3012-90-0x000000013FBB0000-0x000000013FF04000-memory.dmp UPX C:\Windows\system\GXoBPxm.exe UPX behavioral1/memory/2868-84-0x000000013F620000-0x000000013F974000-memory.dmp UPX C:\Windows\system\VrWVLMI.exe UPX behavioral1/memory/2856-78-0x000000013FD70000-0x00000001400C4000-memory.dmp UPX C:\Windows\system\wpPcuub.exe UPX behavioral1/memory/2616-69-0x000000013F260000-0x000000013F5B4000-memory.dmp UPX behavioral1/memory/1796-63-0x000000013FB00000-0x000000013FE54000-memory.dmp UPX C:\Windows\system\GHyTqFe.exe UPX behavioral1/memory/2024-52-0x000000013F8A0000-0x000000013FBF4000-memory.dmp UPX C:\Windows\system\qSXROES.exe UPX behavioral1/memory/2652-27-0x000000013F480000-0x000000013F7D4000-memory.dmp UPX \Windows\system\KgLOgRU.exe UPX behavioral1/memory/2676-41-0x000000013F480000-0x000000013F7D4000-memory.dmp UPX behavioral1/memory/2956-39-0x000000013FAF0000-0x000000013FE44000-memory.dmp UPX behavioral1/memory/2792-37-0x000000013F360000-0x000000013F6B4000-memory.dmp UPX behavioral1/memory/2568-138-0x000000013FEA0000-0x00000001401F4000-memory.dmp UPX behavioral1/memory/1796-137-0x000000013FB00000-0x000000013FE54000-memory.dmp UPX behavioral1/memory/2172-140-0x000000013FF40000-0x0000000140294000-memory.dmp UPX behavioral1/memory/2856-142-0x000000013FD70000-0x00000001400C4000-memory.dmp UPX behavioral1/memory/2868-144-0x000000013F620000-0x000000013F974000-memory.dmp UPX behavioral1/memory/3012-145-0x000000013FBB0000-0x000000013FF04000-memory.dmp UPX behavioral1/memory/2304-147-0x000000013F6D0000-0x000000013FA24000-memory.dmp UPX behavioral1/memory/2616-148-0x000000013F260000-0x000000013F5B4000-memory.dmp UPX behavioral1/memory/2652-149-0x000000013F480000-0x000000013F7D4000-memory.dmp UPX behavioral1/memory/2792-150-0x000000013F360000-0x000000013F6B4000-memory.dmp UPX behavioral1/memory/2956-151-0x000000013FAF0000-0x000000013FE44000-memory.dmp UPX behavioral1/memory/2856-153-0x000000013FD70000-0x00000001400C4000-memory.dmp UPX behavioral1/memory/3012-155-0x000000013FBB0000-0x000000013FF04000-memory.dmp UPX behavioral1/memory/1796-154-0x000000013FB00000-0x000000013FE54000-memory.dmp UPX behavioral1/memory/2884-152-0x000000013FA70000-0x000000013FDC4000-memory.dmp UPX behavioral1/memory/2676-156-0x000000013F480000-0x000000013F7D4000-memory.dmp UPX behavioral1/memory/2868-160-0x000000013F620000-0x000000013F974000-memory.dmp UPX behavioral1/memory/2172-159-0x000000013FF40000-0x0000000140294000-memory.dmp UPX behavioral1/memory/2568-158-0x000000013FEA0000-0x00000001401F4000-memory.dmp UPX behavioral1/memory/2784-157-0x000000013F400000-0x000000013F754000-memory.dmp UPX -
XMRig Miner payload 63 IoCs
Processes:
resource yara_rule behavioral1/memory/2024-1-0x000000013F8A0000-0x000000013FBF4000-memory.dmp xmrig \Windows\system\AyjyyEN.exe xmrig behavioral1/memory/2304-8-0x000000013F6D0000-0x000000013FA24000-memory.dmp xmrig \Windows\system\RhjDMjd.exe xmrig behavioral1/memory/2616-14-0x000000013F260000-0x000000013F5B4000-memory.dmp xmrig C:\Windows\system\LWCSGtx.exe xmrig C:\Windows\system\bRpXXWm.exe xmrig C:\Windows\system\kxhhLgj.exe xmrig C:\Windows\system\eWatdiX.exe xmrig behavioral1/memory/2784-47-0x000000013F400000-0x000000013F754000-memory.dmp xmrig behavioral1/memory/2884-53-0x000000013FA70000-0x000000013FDC4000-memory.dmp xmrig C:\Windows\system\zwXFwWu.exe xmrig behavioral1/memory/2568-64-0x000000013FEA0000-0x00000001401F4000-memory.dmp xmrig C:\Windows\system\yxyqfmY.exe xmrig behavioral1/memory/2172-71-0x000000013FF40000-0x0000000140294000-memory.dmp xmrig C:\Windows\system\ODiAMHR.exe xmrig \Windows\system\phWPQsq.exe xmrig C:\Windows\system\qHRZBGa.exe xmrig C:\Windows\system\VOwzdQr.exe xmrig C:\Windows\system\IpVCTmH.exe xmrig C:\Windows\system\kEhstsd.exe xmrig behavioral1/memory/2024-95-0x000000013FE20000-0x0000000140174000-memory.dmp xmrig C:\Windows\system\OIGgXvk.exe xmrig behavioral1/memory/3012-90-0x000000013FBB0000-0x000000013FF04000-memory.dmp xmrig C:\Windows\system\GXoBPxm.exe xmrig behavioral1/memory/2868-84-0x000000013F620000-0x000000013F974000-memory.dmp xmrig C:\Windows\system\VrWVLMI.exe xmrig behavioral1/memory/2856-78-0x000000013FD70000-0x00000001400C4000-memory.dmp xmrig C:\Windows\system\wpPcuub.exe xmrig behavioral1/memory/2024-70-0x000000013FF40000-0x0000000140294000-memory.dmp xmrig behavioral1/memory/2616-69-0x000000013F260000-0x000000013F5B4000-memory.dmp xmrig behavioral1/memory/1796-63-0x000000013FB00000-0x000000013FE54000-memory.dmp xmrig behavioral1/memory/2024-62-0x0000000002380000-0x00000000026D4000-memory.dmp xmrig C:\Windows\system\GHyTqFe.exe xmrig behavioral1/memory/2024-52-0x000000013F8A0000-0x000000013FBF4000-memory.dmp xmrig C:\Windows\system\qSXROES.exe xmrig behavioral1/memory/2652-27-0x000000013F480000-0x000000013F7D4000-memory.dmp xmrig \Windows\system\KgLOgRU.exe xmrig behavioral1/memory/2676-41-0x000000013F480000-0x000000013F7D4000-memory.dmp xmrig behavioral1/memory/2956-39-0x000000013FAF0000-0x000000013FE44000-memory.dmp xmrig behavioral1/memory/2792-37-0x000000013F360000-0x000000013F6B4000-memory.dmp xmrig behavioral1/memory/2568-138-0x000000013FEA0000-0x00000001401F4000-memory.dmp xmrig behavioral1/memory/1796-137-0x000000013FB00000-0x000000013FE54000-memory.dmp xmrig behavioral1/memory/2024-139-0x000000013FF40000-0x0000000140294000-memory.dmp xmrig behavioral1/memory/2172-140-0x000000013FF40000-0x0000000140294000-memory.dmp xmrig behavioral1/memory/2856-142-0x000000013FD70000-0x00000001400C4000-memory.dmp xmrig behavioral1/memory/2868-144-0x000000013F620000-0x000000013F974000-memory.dmp xmrig behavioral1/memory/3012-145-0x000000013FBB0000-0x000000013FF04000-memory.dmp xmrig behavioral1/memory/2024-146-0x000000013FE20000-0x0000000140174000-memory.dmp xmrig behavioral1/memory/2304-147-0x000000013F6D0000-0x000000013FA24000-memory.dmp xmrig behavioral1/memory/2616-148-0x000000013F260000-0x000000013F5B4000-memory.dmp xmrig behavioral1/memory/2652-149-0x000000013F480000-0x000000013F7D4000-memory.dmp xmrig behavioral1/memory/2792-150-0x000000013F360000-0x000000013F6B4000-memory.dmp xmrig behavioral1/memory/2956-151-0x000000013FAF0000-0x000000013FE44000-memory.dmp xmrig behavioral1/memory/2856-153-0x000000013FD70000-0x00000001400C4000-memory.dmp xmrig behavioral1/memory/3012-155-0x000000013FBB0000-0x000000013FF04000-memory.dmp xmrig behavioral1/memory/1796-154-0x000000013FB00000-0x000000013FE54000-memory.dmp xmrig behavioral1/memory/2884-152-0x000000013FA70000-0x000000013FDC4000-memory.dmp xmrig behavioral1/memory/2676-156-0x000000013F480000-0x000000013F7D4000-memory.dmp xmrig behavioral1/memory/2868-160-0x000000013F620000-0x000000013F974000-memory.dmp xmrig behavioral1/memory/2172-159-0x000000013FF40000-0x0000000140294000-memory.dmp xmrig behavioral1/memory/2568-158-0x000000013FEA0000-0x00000001401F4000-memory.dmp xmrig behavioral1/memory/2784-157-0x000000013F400000-0x000000013F754000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
AyjyyEN.exeRhjDMjd.exeLWCSGtx.exekxhhLgj.exebRpXXWm.exeKgLOgRU.exeeWatdiX.exeqSXROES.exeGHyTqFe.exezwXFwWu.exeyxyqfmY.exewpPcuub.exeVrWVLMI.exeGXoBPxm.exeOIGgXvk.exekEhstsd.exeIpVCTmH.exeVOwzdQr.exeqHRZBGa.exeODiAMHR.exephWPQsq.exepid process 2304 AyjyyEN.exe 2616 RhjDMjd.exe 2652 LWCSGtx.exe 2792 kxhhLgj.exe 2956 bRpXXWm.exe 2676 KgLOgRU.exe 2784 eWatdiX.exe 2884 qSXROES.exe 1796 GHyTqFe.exe 2568 zwXFwWu.exe 2172 yxyqfmY.exe 2856 wpPcuub.exe 2868 VrWVLMI.exe 3012 GXoBPxm.exe 1604 OIGgXvk.exe 1200 kEhstsd.exe 1204 IpVCTmH.exe 1664 VOwzdQr.exe 2336 qHRZBGa.exe 1644 ODiAMHR.exe 1188 phWPQsq.exe -
Loads dropped DLL 21 IoCs
Processes:
2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exepid process 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe -
Processes:
resource yara_rule behavioral1/memory/2024-1-0x000000013F8A0000-0x000000013FBF4000-memory.dmp upx \Windows\system\AyjyyEN.exe upx behavioral1/memory/2304-8-0x000000013F6D0000-0x000000013FA24000-memory.dmp upx \Windows\system\RhjDMjd.exe upx behavioral1/memory/2616-14-0x000000013F260000-0x000000013F5B4000-memory.dmp upx C:\Windows\system\LWCSGtx.exe upx C:\Windows\system\bRpXXWm.exe upx C:\Windows\system\kxhhLgj.exe upx C:\Windows\system\eWatdiX.exe upx behavioral1/memory/2784-47-0x000000013F400000-0x000000013F754000-memory.dmp upx behavioral1/memory/2884-53-0x000000013FA70000-0x000000013FDC4000-memory.dmp upx C:\Windows\system\zwXFwWu.exe upx behavioral1/memory/2568-64-0x000000013FEA0000-0x00000001401F4000-memory.dmp upx C:\Windows\system\yxyqfmY.exe upx behavioral1/memory/2172-71-0x000000013FF40000-0x0000000140294000-memory.dmp upx C:\Windows\system\ODiAMHR.exe upx \Windows\system\phWPQsq.exe upx C:\Windows\system\qHRZBGa.exe upx C:\Windows\system\VOwzdQr.exe upx C:\Windows\system\IpVCTmH.exe upx C:\Windows\system\kEhstsd.exe upx C:\Windows\system\OIGgXvk.exe upx behavioral1/memory/3012-90-0x000000013FBB0000-0x000000013FF04000-memory.dmp upx C:\Windows\system\GXoBPxm.exe upx behavioral1/memory/2868-84-0x000000013F620000-0x000000013F974000-memory.dmp upx C:\Windows\system\VrWVLMI.exe upx behavioral1/memory/2856-78-0x000000013FD70000-0x00000001400C4000-memory.dmp upx C:\Windows\system\wpPcuub.exe upx behavioral1/memory/2616-69-0x000000013F260000-0x000000013F5B4000-memory.dmp upx behavioral1/memory/1796-63-0x000000013FB00000-0x000000013FE54000-memory.dmp upx C:\Windows\system\GHyTqFe.exe upx behavioral1/memory/2024-52-0x000000013F8A0000-0x000000013FBF4000-memory.dmp upx C:\Windows\system\qSXROES.exe upx behavioral1/memory/2652-27-0x000000013F480000-0x000000013F7D4000-memory.dmp upx \Windows\system\KgLOgRU.exe upx behavioral1/memory/2676-41-0x000000013F480000-0x000000013F7D4000-memory.dmp upx behavioral1/memory/2956-39-0x000000013FAF0000-0x000000013FE44000-memory.dmp upx behavioral1/memory/2792-37-0x000000013F360000-0x000000013F6B4000-memory.dmp upx behavioral1/memory/2568-138-0x000000013FEA0000-0x00000001401F4000-memory.dmp upx behavioral1/memory/1796-137-0x000000013FB00000-0x000000013FE54000-memory.dmp upx behavioral1/memory/2172-140-0x000000013FF40000-0x0000000140294000-memory.dmp upx behavioral1/memory/2856-142-0x000000013FD70000-0x00000001400C4000-memory.dmp upx behavioral1/memory/2868-144-0x000000013F620000-0x000000013F974000-memory.dmp upx behavioral1/memory/3012-145-0x000000013FBB0000-0x000000013FF04000-memory.dmp upx behavioral1/memory/2304-147-0x000000013F6D0000-0x000000013FA24000-memory.dmp upx behavioral1/memory/2616-148-0x000000013F260000-0x000000013F5B4000-memory.dmp upx behavioral1/memory/2652-149-0x000000013F480000-0x000000013F7D4000-memory.dmp upx behavioral1/memory/2792-150-0x000000013F360000-0x000000013F6B4000-memory.dmp upx behavioral1/memory/2956-151-0x000000013FAF0000-0x000000013FE44000-memory.dmp upx behavioral1/memory/2856-153-0x000000013FD70000-0x00000001400C4000-memory.dmp upx behavioral1/memory/3012-155-0x000000013FBB0000-0x000000013FF04000-memory.dmp upx behavioral1/memory/1796-154-0x000000013FB00000-0x000000013FE54000-memory.dmp upx behavioral1/memory/2884-152-0x000000013FA70000-0x000000013FDC4000-memory.dmp upx behavioral1/memory/2676-156-0x000000013F480000-0x000000013F7D4000-memory.dmp upx behavioral1/memory/2868-160-0x000000013F620000-0x000000013F974000-memory.dmp upx behavioral1/memory/2172-159-0x000000013FF40000-0x0000000140294000-memory.dmp upx behavioral1/memory/2568-158-0x000000013FEA0000-0x00000001401F4000-memory.dmp upx behavioral1/memory/2784-157-0x000000013F400000-0x000000013F754000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exedescription ioc process File created C:\Windows\System\RhjDMjd.exe 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\LWCSGtx.exe 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\KgLOgRU.exe 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\zwXFwWu.exe 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\GHyTqFe.exe 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\wpPcuub.exe 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\kEhstsd.exe 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\AyjyyEN.exe 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\phWPQsq.exe 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ODiAMHR.exe 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\GXoBPxm.exe 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\IpVCTmH.exe 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\eWatdiX.exe 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\yxyqfmY.exe 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\VrWVLMI.exe 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\OIGgXvk.exe 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\VOwzdQr.exe 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\bRpXXWm.exe 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\qSXROES.exe 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\qHRZBGa.exe 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\kxhhLgj.exe 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process Token: SeLockMemoryPrivilege 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process target process PID 2024 wrote to memory of 2304 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe AyjyyEN.exe PID 2024 wrote to memory of 2304 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe AyjyyEN.exe PID 2024 wrote to memory of 2304 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe AyjyyEN.exe PID 2024 wrote to memory of 2616 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe RhjDMjd.exe PID 2024 wrote to memory of 2616 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe RhjDMjd.exe PID 2024 wrote to memory of 2616 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe RhjDMjd.exe PID 2024 wrote to memory of 2652 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe LWCSGtx.exe PID 2024 wrote to memory of 2652 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe LWCSGtx.exe PID 2024 wrote to memory of 2652 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe LWCSGtx.exe PID 2024 wrote to memory of 2792 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe kxhhLgj.exe PID 2024 wrote to memory of 2792 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe kxhhLgj.exe PID 2024 wrote to memory of 2792 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe kxhhLgj.exe PID 2024 wrote to memory of 2676 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe KgLOgRU.exe PID 2024 wrote to memory of 2676 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe KgLOgRU.exe PID 2024 wrote to memory of 2676 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe KgLOgRU.exe PID 2024 wrote to memory of 2956 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe bRpXXWm.exe PID 2024 wrote to memory of 2956 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe bRpXXWm.exe PID 2024 wrote to memory of 2956 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe bRpXXWm.exe PID 2024 wrote to memory of 2784 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe eWatdiX.exe PID 2024 wrote to memory of 2784 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe eWatdiX.exe PID 2024 wrote to memory of 2784 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe eWatdiX.exe PID 2024 wrote to memory of 2884 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe qSXROES.exe PID 2024 wrote to memory of 2884 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe qSXROES.exe PID 2024 wrote to memory of 2884 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe qSXROES.exe PID 2024 wrote to memory of 2568 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe zwXFwWu.exe PID 2024 wrote to memory of 2568 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe zwXFwWu.exe PID 2024 wrote to memory of 2568 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe zwXFwWu.exe PID 2024 wrote to memory of 1796 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe GHyTqFe.exe PID 2024 wrote to memory of 1796 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe GHyTqFe.exe PID 2024 wrote to memory of 1796 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe GHyTqFe.exe PID 2024 wrote to memory of 2172 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe yxyqfmY.exe PID 2024 wrote to memory of 2172 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe yxyqfmY.exe PID 2024 wrote to memory of 2172 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe yxyqfmY.exe PID 2024 wrote to memory of 2856 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe wpPcuub.exe PID 2024 wrote to memory of 2856 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe wpPcuub.exe PID 2024 wrote to memory of 2856 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe wpPcuub.exe PID 2024 wrote to memory of 2868 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe VrWVLMI.exe PID 2024 wrote to memory of 2868 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe VrWVLMI.exe PID 2024 wrote to memory of 2868 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe VrWVLMI.exe PID 2024 wrote to memory of 3012 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe GXoBPxm.exe PID 2024 wrote to memory of 3012 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe GXoBPxm.exe PID 2024 wrote to memory of 3012 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe GXoBPxm.exe PID 2024 wrote to memory of 1604 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe OIGgXvk.exe PID 2024 wrote to memory of 1604 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe OIGgXvk.exe PID 2024 wrote to memory of 1604 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe OIGgXvk.exe PID 2024 wrote to memory of 1200 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe kEhstsd.exe PID 2024 wrote to memory of 1200 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe kEhstsd.exe PID 2024 wrote to memory of 1200 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe kEhstsd.exe PID 2024 wrote to memory of 1204 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe IpVCTmH.exe PID 2024 wrote to memory of 1204 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe IpVCTmH.exe PID 2024 wrote to memory of 1204 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe IpVCTmH.exe PID 2024 wrote to memory of 1664 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe VOwzdQr.exe PID 2024 wrote to memory of 1664 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe VOwzdQr.exe PID 2024 wrote to memory of 1664 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe VOwzdQr.exe PID 2024 wrote to memory of 2336 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe qHRZBGa.exe PID 2024 wrote to memory of 2336 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe qHRZBGa.exe PID 2024 wrote to memory of 2336 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe qHRZBGa.exe PID 2024 wrote to memory of 1644 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe ODiAMHR.exe PID 2024 wrote to memory of 1644 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe ODiAMHR.exe PID 2024 wrote to memory of 1644 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe ODiAMHR.exe PID 2024 wrote to memory of 1188 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe phWPQsq.exe PID 2024 wrote to memory of 1188 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe phWPQsq.exe PID 2024 wrote to memory of 1188 2024 2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe phWPQsq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-29_3069453ad4f7bf7314205e257c2526f3_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\AyjyyEN.exeC:\Windows\System\AyjyyEN.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RhjDMjd.exeC:\Windows\System\RhjDMjd.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\LWCSGtx.exeC:\Windows\System\LWCSGtx.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\kxhhLgj.exeC:\Windows\System\kxhhLgj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\KgLOgRU.exeC:\Windows\System\KgLOgRU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bRpXXWm.exeC:\Windows\System\bRpXXWm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\eWatdiX.exeC:\Windows\System\eWatdiX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\qSXROES.exeC:\Windows\System\qSXROES.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zwXFwWu.exeC:\Windows\System\zwXFwWu.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\GHyTqFe.exeC:\Windows\System\GHyTqFe.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\yxyqfmY.exeC:\Windows\System\yxyqfmY.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wpPcuub.exeC:\Windows\System\wpPcuub.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\VrWVLMI.exeC:\Windows\System\VrWVLMI.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\GXoBPxm.exeC:\Windows\System\GXoBPxm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\OIGgXvk.exeC:\Windows\System\OIGgXvk.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\kEhstsd.exeC:\Windows\System\kEhstsd.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\IpVCTmH.exeC:\Windows\System\IpVCTmH.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\VOwzdQr.exeC:\Windows\System\VOwzdQr.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\qHRZBGa.exeC:\Windows\System\qHRZBGa.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ODiAMHR.exeC:\Windows\System\ODiAMHR.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\phWPQsq.exeC:\Windows\System\phWPQsq.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\GHyTqFe.exeFilesize
5.9MB
MD541ca756cb4a322c34d425f5ef1b8aa66
SHA18161d5d84114e067e92342b2bccd859bbf574f5f
SHA256c3c7b636c5328363c7d44cd338d66b80243777dc5a2c8131d16a5ceb101044f6
SHA51281f5428e85deb4f06c8869468c54919272671f6ba25af8f6983503070ec8935f8869cefd67afdbf83e2f85933fa5867c946b56463c835f722c4f7f83d2cd3f28
-
C:\Windows\system\GXoBPxm.exeFilesize
5.9MB
MD52d079d80bbdd407133b2904dbf2d20e0
SHA157aeba791966748444d6e46e4e8daf06d0b67598
SHA256e7be1b750896a1b3d83d46cb1a5306f69dcaf7fb22455a0c8d69cafe7703a76f
SHA51245ddefdea17ee027eef63815fdd6a00660bc90aeaa30b4939dae1e09cf10d125256d953090812ec9fdf810e45c450aaf236cdc0e85549324732ffebbd5ac7329
-
C:\Windows\system\IpVCTmH.exeFilesize
5.9MB
MD5bd073fd2e26edef1f1e6fefc11a733f1
SHA1dd185d5c5dd70aa3172f40f1dbf0e9a940edd4e9
SHA25603cd8bd4f6a46307d4c5d3faa1a82800465e122496535c0350809a8be786bbd1
SHA5126f619ad2cfda5b410476e12fa9c078d2f91f1add9ddd60e412e992cf8402899bd7fb940c2ab6be79a1a482e3f71aaf2cf5b7aa2623e5786b4ace0a1fe751b152
-
C:\Windows\system\LWCSGtx.exeFilesize
5.9MB
MD5ac5f83d83b39d7bb9b2bb3076d7f48e3
SHA1da66aa3c8634a462d5f14b054eef7c9444093847
SHA25639670705397ea0c18244e02a6998225e982e7e76173fda69d706ee26a2ac2add
SHA5126c0d623ba1ea7f47eab519ea2c8f1d142fa2401f75681ae7d60aa2b450b87597b9e7856b533c396c46650c379ea53a8b7a5459ffdde14c8df0b5ee362f834137
-
C:\Windows\system\ODiAMHR.exeFilesize
5.9MB
MD5afa50ee3964164dfe617af41d5c15a8e
SHA1e90bb4d0118379dbf200e3cf6d418922fce3b647
SHA256d77fa6b29ad7e9d232f65170ba0f571b58b5b1a19e0203e3de277abc6923a1ef
SHA51219792c35d8b46c495bffbc21b5e9277228bab81153a992bcd98d64530e046f31a1a8186b9ede3ac40c1d316925b9ce662d13d04645181041d1b085966d5ce2c1
-
C:\Windows\system\OIGgXvk.exeFilesize
5.9MB
MD58bd9321fce51805b8de7e364980b87a6
SHA1848ec647bea9136ce0947bb9c93b8eea6e274b6c
SHA2564612bfc5033b39e67e0aa014e5cd7da7e9b83f8d442a153d561dd82b3728970f
SHA5128339ac3154a7c98282afc2fca81f8c123a9c06209f6731ded5424e6002e46fc70cbb33fd8e4caa09e6f047f4a2a643810e9847a1a0f0550c46918486d3cc2de4
-
C:\Windows\system\VOwzdQr.exeFilesize
5.9MB
MD5870ebb0b9ea5e48724605a6d9aa5abdb
SHA16d6a3c4a0af56a608dc4f398680283a4224926d1
SHA256ed16d0a9ac67ae0f00932b81476334e58828572a645cd8d15162b8076fc620f1
SHA512e1e0ecb19502500b83ce8c89182a2a456afeabd5b66c0dfee6167d0038910689491f7a93081325ce2025652aa66779001a87b124ca4ca27c0206fe8ab7570795
-
C:\Windows\system\VrWVLMI.exeFilesize
5.9MB
MD52127ce2f585debfcb512d81b41045bbc
SHA1dd41c9e81be8194b5f8d4e1a29f7f733bc49578e
SHA25682eb4439bbb066848f961fdc68d88557eaac1f266a9bd1205bc431da57105b62
SHA512d397fa4e309b8dc4b065180d06f0881b16cda9bb2286c4e45b3a37327dd21be16b39fbd31cdd968558270a38a527d26375782a51573edb7e98c34fb7bf1a1b6b
-
C:\Windows\system\bRpXXWm.exeFilesize
5.9MB
MD5906204479ec56386bedca37aeeeb3d74
SHA1b61142b78f260a8f290473123c9a0289254f1e6e
SHA256c68316c1a95e779369d0605816e8185066448ce4c0bd91692d550d59579d0c87
SHA512aceeb7b2f1b7245f5ef4547d50b73eb5d766389c907fb1e152ee85d0dc2fb430bee539f854053a9590786847ca0059ce6d3fce537d0522d1ad5432eb5992935b
-
C:\Windows\system\eWatdiX.exeFilesize
5.9MB
MD5b83bafbd1745f993e0db1e6fe33c9c0e
SHA192feb8b540230fc6b07cc41d1010dd48710d4b69
SHA25645b5d0692a673b46f7e5f85c35f6b1431abd310904e03c6498f6cbf1db207412
SHA51236317aa0a995e160bdd7c6c4d79f80663ee8e7ff4977959f9ee0f92264358ffc7adb86ecff440075e9884155e64c47e9365deb2b74f10b62e05dfdec73dc380a
-
C:\Windows\system\kEhstsd.exeFilesize
5.9MB
MD51b0aca7daa5920013b6783810f452714
SHA1093d70899cf9d1f87c150be54bd09efb3b36231d
SHA2569efe455944e820721e57f65b6f35ca28936610651d562620d00b39a73740ba3d
SHA51239f72acdeb3357114149daabf93b716c9e6d1599fbd53bd48286ea52aee4c5496de8b622617cde8942032d5b898f37b287bd1f33a1793b86c3ac0b28304f7383
-
C:\Windows\system\kxhhLgj.exeFilesize
5.9MB
MD5246db5985210cb42d83ce92fffcb733d
SHA1ac0058fb19bd7b348bccd5af09124b776378b81c
SHA25689a1f6d6f372ca29ceb820ef57f193f1a52853d217a1b9a467ebff3fec36d01a
SHA512ec0ee7f8fe8499bc5ad5a81381f19c75ca3de99f8fc344909e110de3e6fba0728167ca2aceb18bc7f005debf18f4027d3c76c56ccac8452b01c77edad74f591c
-
C:\Windows\system\qHRZBGa.exeFilesize
5.9MB
MD54350c4a7bc2e33f59317c56144afc98d
SHA1a62f2e2b60856e4a325a96605ac1affffcf5a6f0
SHA2565f79960abfaa99c21e7e4f9c053346fdf77c88905a53fefee93d1f8ebaaaf99d
SHA512e26a0c6e1a33740b108250e0a1d2f65f34ff4af4bf3f363af5864becda89736b84b85e03f5798d431fbafd0957ffb42e5d5dc40a498cf155ae2321815f63eeee
-
C:\Windows\system\qSXROES.exeFilesize
5.9MB
MD5cc583273fcb792a157d889b805dfa8a5
SHA1c4d0595e504edd344e6b8e0c25ad9e08a718590f
SHA256cd438e4d6381119480cfda8e6e74ac34aeb55dfec89205e22a36670a5fc4742f
SHA51269b81a87cfebae3f9125855ff8e637f8cfbccf1d718e6a2d65c405fd398f6b20235c5dbbe197333192ed01e011c3f31937ce77257750055d704ce9f52ab67b52
-
C:\Windows\system\wpPcuub.exeFilesize
5.9MB
MD50dbaa3bd481b1c244c87b031b77e5f7d
SHA13d649e56f35f882fc088a526cd32bcaa8c035ff6
SHA256ada155645040aec7dfa10398280c33c18fcf60fff7e30de300f364e2ef2ebe47
SHA512df48ef5859b42bd6d74e2e701780d3c071f86e5cbb46a50e9afd356463ce34767a03a6a60dce4ac9bfa2b72949e9cdb84c40e201b205ab84eb10c3294e712680
-
C:\Windows\system\yxyqfmY.exeFilesize
5.9MB
MD57434bda41b7f0c964e8096866d217391
SHA11c91630d2a4186ca416ef3c91075231ef67c0db2
SHA256e1bafdb9664e67fb5e8697985e0e2cfa1b2522c5041537297d11de9c8b4146c8
SHA51270dd77f017220c3dfe3cff0a622a232f1769410f4f04630b0ff5acdbfb0d07e752044d226886aa9a28550317cb56fab43465f80b367366b18d7af4e3fb44de55
-
C:\Windows\system\zwXFwWu.exeFilesize
5.9MB
MD51d21fdd283bf8d80e1e37e0d6fd3b8c1
SHA1069bc8a630112979b3eb74b60ada0519cf8a38ba
SHA2563ad52bf12b82fb73e3314e07cc556914e701bbae8e8409920b43843519707e04
SHA512929f0f096b6ae58beb755d57f3fb8678c9986a165299994fe65375f152f330552cb597dc552487bfede3c94defdd8d55b2da3fe0216b81b52dddb4712de48eb1
-
\Windows\system\AyjyyEN.exeFilesize
5.9MB
MD51f5008953abd229b38ae698dd9d0fe85
SHA1fa7e5340c4fc88095f94534ee6cad78536078a16
SHA25635fc56b60db0693ef00b5f518a092f145c08b976deb3f50da855f3c4302142e8
SHA512310154005f4637b30058c853fd94470d64bb54ed170c3c3f6d272a24471a7fcb72d62e394f9e0ac4fa5562110845d99b8e24a99298caaf50a82fecdb19f3c6e8
-
\Windows\system\KgLOgRU.exeFilesize
5.9MB
MD5039174c5773dec597222f562c8f885e0
SHA11254dcce4e94e1168f7ebf313c33feb956011d0e
SHA2560ecb7998389bcf70f92c0574c88c233ecf9442834e3f06dea7efbe88c658f3ae
SHA5124c241b150415f67d164de94a523f05aee2ff1eda92e04f685ba00573b5ed1ffd7f22b2a4cfb3a590713cf5bab41c49213ea07bfdeb90a3878378137610b997d2
-
\Windows\system\RhjDMjd.exeFilesize
5.9MB
MD5c957521b6c4cb6a964722481cc51a2cb
SHA176c8814f677066d6396cc568349ed1e5d84fc78d
SHA25687c4f88f3e6b30eafcc5bf7023540945e7abda35f691e9c0b4b896cbe05cec19
SHA512279f6453a28845aaf0d91746b39e7c0e1a3d51bfbffd6396b14340011ba6926d51aa782cee31638edb4db30272893d74958ef375f8b2cc18d6ccb53a1debc724
-
\Windows\system\phWPQsq.exeFilesize
5.9MB
MD5a27f708416ad31df9fc8fbd1696552c7
SHA1ea85ace4f7a300205faeb968f64f3e94371457bc
SHA256ff78751c8da8603c99e77a9600def8571c63a348c38b9409295f967532512951
SHA512991e823542ef98ee17f8036435ba40004f7058084c7574f61b6c2d86f825417ddc18c9b4a70234cdde96b02439d4a1eb63b2cca13ede22bf5f384085a5068b6c
-
memory/1796-63-0x000000013FB00000-0x000000013FE54000-memory.dmpFilesize
3.3MB
-
memory/1796-137-0x000000013FB00000-0x000000013FE54000-memory.dmpFilesize
3.3MB
-
memory/1796-154-0x000000013FB00000-0x000000013FE54000-memory.dmpFilesize
3.3MB
-
memory/2024-62-0x0000000002380000-0x00000000026D4000-memory.dmpFilesize
3.3MB
-
memory/2024-135-0x000000013FEA0000-0x00000001401F4000-memory.dmpFilesize
3.3MB
-
memory/2024-0-0x00000000000F0000-0x0000000000100000-memory.dmpFilesize
64KB
-
memory/2024-89-0x0000000002380000-0x00000000026D4000-memory.dmpFilesize
3.3MB
-
memory/2024-146-0x000000013FE20000-0x0000000140174000-memory.dmpFilesize
3.3MB
-
memory/2024-143-0x0000000002380000-0x00000000026D4000-memory.dmpFilesize
3.3MB
-
memory/2024-83-0x0000000002380000-0x00000000026D4000-memory.dmpFilesize
3.3MB
-
memory/2024-141-0x000000013FD70000-0x00000001400C4000-memory.dmpFilesize
3.3MB
-
memory/2024-139-0x000000013FF40000-0x0000000140294000-memory.dmpFilesize
3.3MB
-
memory/2024-77-0x000000013FD70000-0x00000001400C4000-memory.dmpFilesize
3.3MB
-
memory/2024-136-0x0000000002380000-0x00000000026D4000-memory.dmpFilesize
3.3MB
-
memory/2024-70-0x000000013FF40000-0x0000000140294000-memory.dmpFilesize
3.3MB
-
memory/2024-95-0x000000013FE20000-0x0000000140174000-memory.dmpFilesize
3.3MB
-
memory/2024-31-0x000000013F360000-0x000000013F6B4000-memory.dmpFilesize
3.3MB
-
memory/2024-1-0x000000013F8A0000-0x000000013FBF4000-memory.dmpFilesize
3.3MB
-
memory/2024-61-0x000000013F260000-0x000000013F5B4000-memory.dmpFilesize
3.3MB
-
memory/2024-36-0x0000000002380000-0x00000000026D4000-memory.dmpFilesize
3.3MB
-
memory/2024-52-0x000000013F8A0000-0x000000013FBF4000-memory.dmpFilesize
3.3MB
-
memory/2024-23-0x000000013F480000-0x000000013F7D4000-memory.dmpFilesize
3.3MB
-
memory/2024-45-0x000000013F400000-0x000000013F754000-memory.dmpFilesize
3.3MB
-
memory/2024-34-0x000000013F480000-0x000000013F7D4000-memory.dmpFilesize
3.3MB
-
memory/2172-159-0x000000013FF40000-0x0000000140294000-memory.dmpFilesize
3.3MB
-
memory/2172-71-0x000000013FF40000-0x0000000140294000-memory.dmpFilesize
3.3MB
-
memory/2172-140-0x000000013FF40000-0x0000000140294000-memory.dmpFilesize
3.3MB
-
memory/2304-147-0x000000013F6D0000-0x000000013FA24000-memory.dmpFilesize
3.3MB
-
memory/2304-8-0x000000013F6D0000-0x000000013FA24000-memory.dmpFilesize
3.3MB
-
memory/2568-64-0x000000013FEA0000-0x00000001401F4000-memory.dmpFilesize
3.3MB
-
memory/2568-138-0x000000013FEA0000-0x00000001401F4000-memory.dmpFilesize
3.3MB
-
memory/2568-158-0x000000013FEA0000-0x00000001401F4000-memory.dmpFilesize
3.3MB
-
memory/2616-69-0x000000013F260000-0x000000013F5B4000-memory.dmpFilesize
3.3MB
-
memory/2616-148-0x000000013F260000-0x000000013F5B4000-memory.dmpFilesize
3.3MB
-
memory/2616-14-0x000000013F260000-0x000000013F5B4000-memory.dmpFilesize
3.3MB
-
memory/2652-27-0x000000013F480000-0x000000013F7D4000-memory.dmpFilesize
3.3MB
-
memory/2652-149-0x000000013F480000-0x000000013F7D4000-memory.dmpFilesize
3.3MB
-
memory/2676-41-0x000000013F480000-0x000000013F7D4000-memory.dmpFilesize
3.3MB
-
memory/2676-156-0x000000013F480000-0x000000013F7D4000-memory.dmpFilesize
3.3MB
-
memory/2784-47-0x000000013F400000-0x000000013F754000-memory.dmpFilesize
3.3MB
-
memory/2784-157-0x000000013F400000-0x000000013F754000-memory.dmpFilesize
3.3MB
-
memory/2792-150-0x000000013F360000-0x000000013F6B4000-memory.dmpFilesize
3.3MB
-
memory/2792-37-0x000000013F360000-0x000000013F6B4000-memory.dmpFilesize
3.3MB
-
memory/2856-78-0x000000013FD70000-0x00000001400C4000-memory.dmpFilesize
3.3MB
-
memory/2856-153-0x000000013FD70000-0x00000001400C4000-memory.dmpFilesize
3.3MB
-
memory/2856-142-0x000000013FD70000-0x00000001400C4000-memory.dmpFilesize
3.3MB
-
memory/2868-144-0x000000013F620000-0x000000013F974000-memory.dmpFilesize
3.3MB
-
memory/2868-160-0x000000013F620000-0x000000013F974000-memory.dmpFilesize
3.3MB
-
memory/2868-84-0x000000013F620000-0x000000013F974000-memory.dmpFilesize
3.3MB
-
memory/2884-53-0x000000013FA70000-0x000000013FDC4000-memory.dmpFilesize
3.3MB
-
memory/2884-152-0x000000013FA70000-0x000000013FDC4000-memory.dmpFilesize
3.3MB
-
memory/2956-151-0x000000013FAF0000-0x000000013FE44000-memory.dmpFilesize
3.3MB
-
memory/2956-39-0x000000013FAF0000-0x000000013FE44000-memory.dmpFilesize
3.3MB
-
memory/3012-145-0x000000013FBB0000-0x000000013FF04000-memory.dmpFilesize
3.3MB
-
memory/3012-90-0x000000013FBB0000-0x000000013FF04000-memory.dmpFilesize
3.3MB
-
memory/3012-155-0x000000013FBB0000-0x000000013FF04000-memory.dmpFilesize
3.3MB