Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
29-06-2024 07:06
Behavioral task
behavioral1
Sample
2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240611-en
General
-
Target
2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
c973360b21f20bc4259175331d3fcbea
-
SHA1
32e1c6578bd5540f0f312f2e4d97eaaef76e111e
-
SHA256
33083de1ea22cb1e4281e12f26b10247ee617c908b5dd6d94fda729868a61f48
-
SHA512
44631bca037e2b963385047975c7f03b8b7a97146328b3edefa53c8dc0d8a6bddea54ac4a0db1cd868781269c20d49c08f2a0f0509c7b73d72b4127da4338493
-
SSDEEP
98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lUY:Q+856utgpPF8u/7Y
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\fbOLxSh.exe cobalt_reflective_dll \Windows\system\ATePjZI.exe cobalt_reflective_dll C:\Windows\system\NacDvZK.exe cobalt_reflective_dll \Windows\system\emIYqmp.exe cobalt_reflective_dll \Windows\system\dGTjcKE.exe cobalt_reflective_dll C:\Windows\system\SuRNOUy.exe cobalt_reflective_dll C:\Windows\system\ePvJPmC.exe cobalt_reflective_dll C:\Windows\system\cOeSPEy.exe cobalt_reflective_dll C:\Windows\system\IonBHnm.exe cobalt_reflective_dll C:\Windows\system\IPgtdQA.exe cobalt_reflective_dll \Windows\system\AdQHoQL.exe cobalt_reflective_dll C:\Windows\system\PFGjPAf.exe cobalt_reflective_dll C:\Windows\system\vOetJDi.exe cobalt_reflective_dll C:\Windows\system\rShaOjs.exe cobalt_reflective_dll C:\Windows\system\MsOSjhc.exe cobalt_reflective_dll C:\Windows\system\cTqmrlo.exe cobalt_reflective_dll C:\Windows\system\cBdlNVe.exe cobalt_reflective_dll C:\Windows\system\TQLkVkl.exe cobalt_reflective_dll \Windows\system\qJasthF.exe cobalt_reflective_dll C:\Windows\system\uHaKrDt.exe cobalt_reflective_dll C:\Windows\system\EVpQLBn.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule \Windows\system\fbOLxSh.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\ATePjZI.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\NacDvZK.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\emIYqmp.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\dGTjcKE.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\SuRNOUy.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\ePvJPmC.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\cOeSPEy.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\IonBHnm.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\IPgtdQA.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\AdQHoQL.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\PFGjPAf.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\vOetJDi.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\rShaOjs.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\MsOSjhc.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\cTqmrlo.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\cBdlNVe.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\TQLkVkl.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\qJasthF.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\uHaKrDt.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\EVpQLBn.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 60 IoCs
Processes:
resource yara_rule behavioral1/memory/2148-2-0x000000013F0D0000-0x000000013F424000-memory.dmp UPX \Windows\system\fbOLxSh.exe UPX behavioral1/memory/2800-9-0x000000013F280000-0x000000013F5D4000-memory.dmp UPX behavioral1/memory/2148-8-0x00000000024B0000-0x0000000002804000-memory.dmp UPX \Windows\system\ATePjZI.exe UPX behavioral1/memory/1204-15-0x000000013F080000-0x000000013F3D4000-memory.dmp UPX C:\Windows\system\NacDvZK.exe UPX behavioral1/memory/2576-22-0x000000013F410000-0x000000013F764000-memory.dmp UPX \Windows\system\emIYqmp.exe UPX behavioral1/memory/2700-29-0x000000013F610000-0x000000013F964000-memory.dmp UPX \Windows\system\dGTjcKE.exe UPX behavioral1/memory/2148-39-0x000000013F0D0000-0x000000013F424000-memory.dmp UPX behavioral1/memory/2204-49-0x000000013F680000-0x000000013F9D4000-memory.dmp UPX behavioral1/memory/2604-59-0x000000013F1F0000-0x000000013F544000-memory.dmp UPX behavioral1/memory/2632-35-0x000000013F070000-0x000000013F3C4000-memory.dmp UPX C:\Windows\system\SuRNOUy.exe UPX behavioral1/memory/1204-67-0x000000013F080000-0x000000013F3D4000-memory.dmp UPX behavioral1/memory/2488-69-0x000000013F7F0000-0x000000013FB44000-memory.dmp UPX C:\Windows\system\ePvJPmC.exe UPX C:\Windows\system\cOeSPEy.exe UPX behavioral1/memory/1012-83-0x000000013F780000-0x000000013FAD4000-memory.dmp UPX C:\Windows\system\IonBHnm.exe UPX C:\Windows\system\IPgtdQA.exe UPX \Windows\system\AdQHoQL.exe UPX C:\Windows\system\PFGjPAf.exe UPX C:\Windows\system\vOetJDi.exe UPX C:\Windows\system\rShaOjs.exe UPX behavioral1/memory/2204-103-0x000000013F680000-0x000000013F9D4000-memory.dmp UPX C:\Windows\system\MsOSjhc.exe UPX behavioral1/memory/1668-96-0x000000013F090000-0x000000013F3E4000-memory.dmp UPX C:\Windows\system\cTqmrlo.exe UPX behavioral1/memory/2500-89-0x000000013F900000-0x000000013FC54000-memory.dmp UPX C:\Windows\system\cBdlNVe.exe UPX behavioral1/memory/2904-74-0x000000013FD00000-0x0000000140054000-memory.dmp UPX behavioral1/memory/2472-68-0x000000013F730000-0x000000013FA84000-memory.dmp UPX C:\Windows\system\TQLkVkl.exe UPX \Windows\system\qJasthF.exe UPX behavioral1/memory/2452-63-0x000000013F870000-0x000000013FBC4000-memory.dmp UPX C:\Windows\system\uHaKrDt.exe UPX behavioral1/memory/2604-134-0x000000013F1F0000-0x000000013F544000-memory.dmp UPX C:\Windows\system\EVpQLBn.exe UPX behavioral1/memory/2488-136-0x000000013F7F0000-0x000000013FB44000-memory.dmp UPX behavioral1/memory/2904-137-0x000000013FD00000-0x0000000140054000-memory.dmp UPX behavioral1/memory/1012-139-0x000000013F780000-0x000000013FAD4000-memory.dmp UPX behavioral1/memory/2500-141-0x000000013F900000-0x000000013FC54000-memory.dmp UPX behavioral1/memory/1668-143-0x000000013F090000-0x000000013F3E4000-memory.dmp UPX behavioral1/memory/2800-144-0x000000013F280000-0x000000013F5D4000-memory.dmp UPX behavioral1/memory/1204-145-0x000000013F080000-0x000000013F3D4000-memory.dmp UPX behavioral1/memory/2576-146-0x000000013F410000-0x000000013F764000-memory.dmp UPX behavioral1/memory/2700-147-0x000000013F610000-0x000000013F964000-memory.dmp UPX behavioral1/memory/2632-148-0x000000013F070000-0x000000013F3C4000-memory.dmp UPX behavioral1/memory/2204-149-0x000000013F680000-0x000000013F9D4000-memory.dmp UPX behavioral1/memory/2604-150-0x000000013F1F0000-0x000000013F544000-memory.dmp UPX behavioral1/memory/2472-152-0x000000013F730000-0x000000013FA84000-memory.dmp UPX behavioral1/memory/2452-151-0x000000013F870000-0x000000013FBC4000-memory.dmp UPX behavioral1/memory/2904-153-0x000000013FD00000-0x0000000140054000-memory.dmp UPX behavioral1/memory/2488-154-0x000000013F7F0000-0x000000013FB44000-memory.dmp UPX behavioral1/memory/1012-155-0x000000013F780000-0x000000013FAD4000-memory.dmp UPX behavioral1/memory/2500-156-0x000000013F900000-0x000000013FC54000-memory.dmp UPX behavioral1/memory/1668-157-0x000000013F090000-0x000000013F3E4000-memory.dmp UPX -
XMRig Miner payload 62 IoCs
Processes:
resource yara_rule behavioral1/memory/2148-2-0x000000013F0D0000-0x000000013F424000-memory.dmp xmrig \Windows\system\fbOLxSh.exe xmrig behavioral1/memory/2800-9-0x000000013F280000-0x000000013F5D4000-memory.dmp xmrig behavioral1/memory/2148-8-0x00000000024B0000-0x0000000002804000-memory.dmp xmrig \Windows\system\ATePjZI.exe xmrig behavioral1/memory/1204-15-0x000000013F080000-0x000000013F3D4000-memory.dmp xmrig C:\Windows\system\NacDvZK.exe xmrig behavioral1/memory/2576-22-0x000000013F410000-0x000000013F764000-memory.dmp xmrig \Windows\system\emIYqmp.exe xmrig behavioral1/memory/2700-29-0x000000013F610000-0x000000013F964000-memory.dmp xmrig \Windows\system\dGTjcKE.exe xmrig behavioral1/memory/2148-39-0x000000013F0D0000-0x000000013F424000-memory.dmp xmrig behavioral1/memory/2204-49-0x000000013F680000-0x000000013F9D4000-memory.dmp xmrig behavioral1/memory/2604-59-0x000000013F1F0000-0x000000013F544000-memory.dmp xmrig behavioral1/memory/2632-35-0x000000013F070000-0x000000013F3C4000-memory.dmp xmrig C:\Windows\system\SuRNOUy.exe xmrig behavioral1/memory/1204-67-0x000000013F080000-0x000000013F3D4000-memory.dmp xmrig behavioral1/memory/2488-69-0x000000013F7F0000-0x000000013FB44000-memory.dmp xmrig C:\Windows\system\ePvJPmC.exe xmrig C:\Windows\system\cOeSPEy.exe xmrig behavioral1/memory/1012-83-0x000000013F780000-0x000000013FAD4000-memory.dmp xmrig C:\Windows\system\IonBHnm.exe xmrig C:\Windows\system\IPgtdQA.exe xmrig \Windows\system\AdQHoQL.exe xmrig C:\Windows\system\PFGjPAf.exe xmrig C:\Windows\system\vOetJDi.exe xmrig C:\Windows\system\rShaOjs.exe xmrig behavioral1/memory/2204-103-0x000000013F680000-0x000000013F9D4000-memory.dmp xmrig C:\Windows\system\MsOSjhc.exe xmrig behavioral1/memory/1668-96-0x000000013F090000-0x000000013F3E4000-memory.dmp xmrig C:\Windows\system\cTqmrlo.exe xmrig behavioral1/memory/2500-89-0x000000013F900000-0x000000013FC54000-memory.dmp xmrig C:\Windows\system\cBdlNVe.exe xmrig behavioral1/memory/2148-82-0x000000013F780000-0x000000013FAD4000-memory.dmp xmrig behavioral1/memory/2904-74-0x000000013FD00000-0x0000000140054000-memory.dmp xmrig behavioral1/memory/2148-73-0x000000013FD00000-0x0000000140054000-memory.dmp xmrig behavioral1/memory/2472-68-0x000000013F730000-0x000000013FA84000-memory.dmp xmrig C:\Windows\system\TQLkVkl.exe xmrig \Windows\system\qJasthF.exe xmrig behavioral1/memory/2452-63-0x000000013F870000-0x000000013FBC4000-memory.dmp xmrig C:\Windows\system\uHaKrDt.exe xmrig behavioral1/memory/2604-134-0x000000013F1F0000-0x000000013F544000-memory.dmp xmrig C:\Windows\system\EVpQLBn.exe xmrig behavioral1/memory/2488-136-0x000000013F7F0000-0x000000013FB44000-memory.dmp xmrig behavioral1/memory/2904-137-0x000000013FD00000-0x0000000140054000-memory.dmp xmrig behavioral1/memory/1012-139-0x000000013F780000-0x000000013FAD4000-memory.dmp xmrig behavioral1/memory/2500-141-0x000000013F900000-0x000000013FC54000-memory.dmp xmrig behavioral1/memory/1668-143-0x000000013F090000-0x000000013F3E4000-memory.dmp xmrig behavioral1/memory/2800-144-0x000000013F280000-0x000000013F5D4000-memory.dmp xmrig behavioral1/memory/1204-145-0x000000013F080000-0x000000013F3D4000-memory.dmp xmrig behavioral1/memory/2576-146-0x000000013F410000-0x000000013F764000-memory.dmp xmrig behavioral1/memory/2700-147-0x000000013F610000-0x000000013F964000-memory.dmp xmrig behavioral1/memory/2632-148-0x000000013F070000-0x000000013F3C4000-memory.dmp xmrig behavioral1/memory/2204-149-0x000000013F680000-0x000000013F9D4000-memory.dmp xmrig behavioral1/memory/2604-150-0x000000013F1F0000-0x000000013F544000-memory.dmp xmrig behavioral1/memory/2472-152-0x000000013F730000-0x000000013FA84000-memory.dmp xmrig behavioral1/memory/2452-151-0x000000013F870000-0x000000013FBC4000-memory.dmp xmrig behavioral1/memory/2904-153-0x000000013FD00000-0x0000000140054000-memory.dmp xmrig behavioral1/memory/2488-154-0x000000013F7F0000-0x000000013FB44000-memory.dmp xmrig behavioral1/memory/1012-155-0x000000013F780000-0x000000013FAD4000-memory.dmp xmrig behavioral1/memory/2500-156-0x000000013F900000-0x000000013FC54000-memory.dmp xmrig behavioral1/memory/1668-157-0x000000013F090000-0x000000013F3E4000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
fbOLxSh.exeATePjZI.exeNacDvZK.exeemIYqmp.exedGTjcKE.exeEVpQLBn.exeTQLkVkl.exeuHaKrDt.exeqJasthF.exeSuRNOUy.exeePvJPmC.execOeSPEy.execBdlNVe.execTqmrlo.exeMsOSjhc.exeIonBHnm.exerShaOjs.exevOetJDi.exePFGjPAf.exeIPgtdQA.exeAdQHoQL.exepid process 2800 fbOLxSh.exe 1204 ATePjZI.exe 2576 NacDvZK.exe 2700 emIYqmp.exe 2632 dGTjcKE.exe 2204 EVpQLBn.exe 2604 TQLkVkl.exe 2452 uHaKrDt.exe 2472 qJasthF.exe 2488 SuRNOUy.exe 2904 ePvJPmC.exe 1012 cOeSPEy.exe 2500 cBdlNVe.exe 1668 cTqmrlo.exe 1804 MsOSjhc.exe 1964 IonBHnm.exe 2232 rShaOjs.exe 1576 vOetJDi.exe 1652 PFGjPAf.exe 2320 IPgtdQA.exe 1796 AdQHoQL.exe -
Loads dropped DLL 21 IoCs
Processes:
2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exepid process 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe -
Processes:
resource yara_rule behavioral1/memory/2148-2-0x000000013F0D0000-0x000000013F424000-memory.dmp upx \Windows\system\fbOLxSh.exe upx behavioral1/memory/2800-9-0x000000013F280000-0x000000013F5D4000-memory.dmp upx behavioral1/memory/2148-8-0x00000000024B0000-0x0000000002804000-memory.dmp upx \Windows\system\ATePjZI.exe upx behavioral1/memory/1204-15-0x000000013F080000-0x000000013F3D4000-memory.dmp upx C:\Windows\system\NacDvZK.exe upx behavioral1/memory/2576-22-0x000000013F410000-0x000000013F764000-memory.dmp upx \Windows\system\emIYqmp.exe upx behavioral1/memory/2700-29-0x000000013F610000-0x000000013F964000-memory.dmp upx \Windows\system\dGTjcKE.exe upx behavioral1/memory/2148-39-0x000000013F0D0000-0x000000013F424000-memory.dmp upx behavioral1/memory/2204-49-0x000000013F680000-0x000000013F9D4000-memory.dmp upx behavioral1/memory/2604-59-0x000000013F1F0000-0x000000013F544000-memory.dmp upx behavioral1/memory/2632-35-0x000000013F070000-0x000000013F3C4000-memory.dmp upx C:\Windows\system\SuRNOUy.exe upx behavioral1/memory/1204-67-0x000000013F080000-0x000000013F3D4000-memory.dmp upx behavioral1/memory/2488-69-0x000000013F7F0000-0x000000013FB44000-memory.dmp upx C:\Windows\system\ePvJPmC.exe upx C:\Windows\system\cOeSPEy.exe upx behavioral1/memory/1012-83-0x000000013F780000-0x000000013FAD4000-memory.dmp upx C:\Windows\system\IonBHnm.exe upx C:\Windows\system\IPgtdQA.exe upx \Windows\system\AdQHoQL.exe upx C:\Windows\system\PFGjPAf.exe upx C:\Windows\system\vOetJDi.exe upx C:\Windows\system\rShaOjs.exe upx behavioral1/memory/2204-103-0x000000013F680000-0x000000013F9D4000-memory.dmp upx C:\Windows\system\MsOSjhc.exe upx behavioral1/memory/1668-96-0x000000013F090000-0x000000013F3E4000-memory.dmp upx C:\Windows\system\cTqmrlo.exe upx behavioral1/memory/2500-89-0x000000013F900000-0x000000013FC54000-memory.dmp upx C:\Windows\system\cBdlNVe.exe upx behavioral1/memory/2904-74-0x000000013FD00000-0x0000000140054000-memory.dmp upx behavioral1/memory/2472-68-0x000000013F730000-0x000000013FA84000-memory.dmp upx C:\Windows\system\TQLkVkl.exe upx \Windows\system\qJasthF.exe upx behavioral1/memory/2452-63-0x000000013F870000-0x000000013FBC4000-memory.dmp upx C:\Windows\system\uHaKrDt.exe upx behavioral1/memory/2604-134-0x000000013F1F0000-0x000000013F544000-memory.dmp upx C:\Windows\system\EVpQLBn.exe upx behavioral1/memory/2488-136-0x000000013F7F0000-0x000000013FB44000-memory.dmp upx behavioral1/memory/2904-137-0x000000013FD00000-0x0000000140054000-memory.dmp upx behavioral1/memory/1012-139-0x000000013F780000-0x000000013FAD4000-memory.dmp upx behavioral1/memory/2500-141-0x000000013F900000-0x000000013FC54000-memory.dmp upx behavioral1/memory/1668-143-0x000000013F090000-0x000000013F3E4000-memory.dmp upx behavioral1/memory/2800-144-0x000000013F280000-0x000000013F5D4000-memory.dmp upx behavioral1/memory/1204-145-0x000000013F080000-0x000000013F3D4000-memory.dmp upx behavioral1/memory/2576-146-0x000000013F410000-0x000000013F764000-memory.dmp upx behavioral1/memory/2700-147-0x000000013F610000-0x000000013F964000-memory.dmp upx behavioral1/memory/2632-148-0x000000013F070000-0x000000013F3C4000-memory.dmp upx behavioral1/memory/2204-149-0x000000013F680000-0x000000013F9D4000-memory.dmp upx behavioral1/memory/2604-150-0x000000013F1F0000-0x000000013F544000-memory.dmp upx behavioral1/memory/2472-152-0x000000013F730000-0x000000013FA84000-memory.dmp upx behavioral1/memory/2452-151-0x000000013F870000-0x000000013FBC4000-memory.dmp upx behavioral1/memory/2904-153-0x000000013FD00000-0x0000000140054000-memory.dmp upx behavioral1/memory/2488-154-0x000000013F7F0000-0x000000013FB44000-memory.dmp upx behavioral1/memory/1012-155-0x000000013F780000-0x000000013FAD4000-memory.dmp upx behavioral1/memory/2500-156-0x000000013F900000-0x000000013FC54000-memory.dmp upx behavioral1/memory/1668-157-0x000000013F090000-0x000000013F3E4000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exedescription ioc process File created C:\Windows\System\vOetJDi.exe 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\AdQHoQL.exe 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\cBdlNVe.exe 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\TQLkVkl.exe 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\uHaKrDt.exe 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ePvJPmC.exe 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\cOeSPEy.exe 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\IonBHnm.exe 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\PFGjPAf.exe 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\dGTjcKE.exe 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\NacDvZK.exe 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\EVpQLBn.exe 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\qJasthF.exe 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\MsOSjhc.exe 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\IPgtdQA.exe 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ATePjZI.exe 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\emIYqmp.exe 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\SuRNOUy.exe 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\cTqmrlo.exe 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\rShaOjs.exe 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\fbOLxSh.exe 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process Token: SeLockMemoryPrivilege 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process target process PID 2148 wrote to memory of 2800 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe fbOLxSh.exe PID 2148 wrote to memory of 2800 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe fbOLxSh.exe PID 2148 wrote to memory of 2800 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe fbOLxSh.exe PID 2148 wrote to memory of 1204 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe ATePjZI.exe PID 2148 wrote to memory of 1204 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe ATePjZI.exe PID 2148 wrote to memory of 1204 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe ATePjZI.exe PID 2148 wrote to memory of 2576 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe NacDvZK.exe PID 2148 wrote to memory of 2576 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe NacDvZK.exe PID 2148 wrote to memory of 2576 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe NacDvZK.exe PID 2148 wrote to memory of 2700 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe emIYqmp.exe PID 2148 wrote to memory of 2700 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe emIYqmp.exe PID 2148 wrote to memory of 2700 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe emIYqmp.exe PID 2148 wrote to memory of 2632 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe dGTjcKE.exe PID 2148 wrote to memory of 2632 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe dGTjcKE.exe PID 2148 wrote to memory of 2632 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe dGTjcKE.exe PID 2148 wrote to memory of 2204 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe EVpQLBn.exe PID 2148 wrote to memory of 2204 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe EVpQLBn.exe PID 2148 wrote to memory of 2204 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe EVpQLBn.exe PID 2148 wrote to memory of 2472 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe qJasthF.exe PID 2148 wrote to memory of 2472 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe qJasthF.exe PID 2148 wrote to memory of 2472 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe qJasthF.exe PID 2148 wrote to memory of 2604 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe TQLkVkl.exe PID 2148 wrote to memory of 2604 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe TQLkVkl.exe PID 2148 wrote to memory of 2604 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe TQLkVkl.exe PID 2148 wrote to memory of 2488 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe SuRNOUy.exe PID 2148 wrote to memory of 2488 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe SuRNOUy.exe PID 2148 wrote to memory of 2488 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe SuRNOUy.exe PID 2148 wrote to memory of 2452 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe uHaKrDt.exe PID 2148 wrote to memory of 2452 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe uHaKrDt.exe PID 2148 wrote to memory of 2452 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe uHaKrDt.exe PID 2148 wrote to memory of 2904 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe ePvJPmC.exe PID 2148 wrote to memory of 2904 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe ePvJPmC.exe PID 2148 wrote to memory of 2904 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe ePvJPmC.exe PID 2148 wrote to memory of 1012 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe cOeSPEy.exe PID 2148 wrote to memory of 1012 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe cOeSPEy.exe PID 2148 wrote to memory of 1012 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe cOeSPEy.exe PID 2148 wrote to memory of 2500 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe cBdlNVe.exe PID 2148 wrote to memory of 2500 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe cBdlNVe.exe PID 2148 wrote to memory of 2500 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe cBdlNVe.exe PID 2148 wrote to memory of 1668 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe cTqmrlo.exe PID 2148 wrote to memory of 1668 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe cTqmrlo.exe PID 2148 wrote to memory of 1668 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe cTqmrlo.exe PID 2148 wrote to memory of 1804 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe MsOSjhc.exe PID 2148 wrote to memory of 1804 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe MsOSjhc.exe PID 2148 wrote to memory of 1804 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe MsOSjhc.exe PID 2148 wrote to memory of 1964 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe IonBHnm.exe PID 2148 wrote to memory of 1964 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe IonBHnm.exe PID 2148 wrote to memory of 1964 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe IonBHnm.exe PID 2148 wrote to memory of 2232 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe rShaOjs.exe PID 2148 wrote to memory of 2232 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe rShaOjs.exe PID 2148 wrote to memory of 2232 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe rShaOjs.exe PID 2148 wrote to memory of 1576 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe vOetJDi.exe PID 2148 wrote to memory of 1576 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe vOetJDi.exe PID 2148 wrote to memory of 1576 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe vOetJDi.exe PID 2148 wrote to memory of 1652 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe PFGjPAf.exe PID 2148 wrote to memory of 1652 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe PFGjPAf.exe PID 2148 wrote to memory of 1652 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe PFGjPAf.exe PID 2148 wrote to memory of 2320 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe IPgtdQA.exe PID 2148 wrote to memory of 2320 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe IPgtdQA.exe PID 2148 wrote to memory of 2320 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe IPgtdQA.exe PID 2148 wrote to memory of 1796 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe AdQHoQL.exe PID 2148 wrote to memory of 1796 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe AdQHoQL.exe PID 2148 wrote to memory of 1796 2148 2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe AdQHoQL.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-29_c973360b21f20bc4259175331d3fcbea_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\fbOLxSh.exeC:\Windows\System\fbOLxSh.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ATePjZI.exeC:\Windows\System\ATePjZI.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\NacDvZK.exeC:\Windows\System\NacDvZK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\emIYqmp.exeC:\Windows\System\emIYqmp.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\dGTjcKE.exeC:\Windows\System\dGTjcKE.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\EVpQLBn.exeC:\Windows\System\EVpQLBn.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\qJasthF.exeC:\Windows\System\qJasthF.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\TQLkVkl.exeC:\Windows\System\TQLkVkl.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\SuRNOUy.exeC:\Windows\System\SuRNOUy.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\uHaKrDt.exeC:\Windows\System\uHaKrDt.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ePvJPmC.exeC:\Windows\System\ePvJPmC.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\cOeSPEy.exeC:\Windows\System\cOeSPEy.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\cBdlNVe.exeC:\Windows\System\cBdlNVe.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\cTqmrlo.exeC:\Windows\System\cTqmrlo.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\MsOSjhc.exeC:\Windows\System\MsOSjhc.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\IonBHnm.exeC:\Windows\System\IonBHnm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\rShaOjs.exeC:\Windows\System\rShaOjs.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\vOetJDi.exeC:\Windows\System\vOetJDi.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\PFGjPAf.exeC:\Windows\System\PFGjPAf.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\IPgtdQA.exeC:\Windows\System\IPgtdQA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\AdQHoQL.exeC:\Windows\System\AdQHoQL.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\EVpQLBn.exeFilesize
5.9MB
MD5c4f356bc7a44ab9a97a43ea9169ebae0
SHA1a251344fe7f8e481bea22c728271068a2adac934
SHA256d250c3252c21715f7b612279ab2cd44c53a242cbce8e66e65d2da7832d3be94e
SHA512b774dc568df8b1263751973d42d0ccdd17975a53e6f8d26679cc02423178e937fbaff0e24d9a5040f05d25483f1e3edbaced27fef370b8b8e6e8170e256dd7ff
-
C:\Windows\system\IPgtdQA.exeFilesize
5.9MB
MD54bc5069c2659bd1bede0b573d84482c3
SHA17cf020f0321da7e41de2e89189179765110a5b3c
SHA256ef8d95dcbe98c361764c28d1af85ddb66e074a576e075dc9697524e4e607d616
SHA512a0c56f7c29f14027d26e4ca5943b4883d47790e2b017e49e1959bb21734f7187bbd9931962d9ef972a9886ff6267792381c809386ac4ec7d6bcda0434c0d090c
-
C:\Windows\system\IonBHnm.exeFilesize
5.9MB
MD5e44da85c7d96f44178f8451f4e023173
SHA1341eb2c97631a5ad30b9b7ad08fdd21ae6c707c7
SHA256c074979af6cb2a60b30031c197393afbe553750a5027dd2e9d7ca379b55c80f3
SHA51263b42ebd882daa5453cb675ea863049b99f806c8f390d7c57a6f3f391520c4cb9f7368167faee73e50995df6e3edee395f89f83b90907fb65b2166d069ea9b56
-
C:\Windows\system\MsOSjhc.exeFilesize
5.9MB
MD5b796f6b6c362520aea0a98b7971e2060
SHA11cdcba6aad4db2a1df010cb1c2c4c134c1de1410
SHA256f522051a28473c130d8cf5a8ad0a2d55a0d578c5e60da9a6e6e06b611f014819
SHA51270afabd0259d3ac185b9f6af331402129b81cdbb4790f27c2c63efd0442f92644bee74d709bf78ba16c3a91934d59d499b16a7079db5aee4552c2ff806a8f9ce
-
C:\Windows\system\NacDvZK.exeFilesize
5.9MB
MD52cb573b8abbe4d1220c1554cdfb96061
SHA1a19ec9ef73a80931ec092c25741639cf621b0352
SHA256927caa723ba16d64d5e18498f307a7f82c024fdb1e8c40345c419a0f0d8dbc45
SHA5127516b0d1e80f035c1609ef3993691d333b07ac7b0f0c586dc916228bbf0841d2ae53d575db21af0a77b6cf08f6b8df220eae7f5389c1998af8738615183ba7c1
-
C:\Windows\system\PFGjPAf.exeFilesize
5.9MB
MD53756c7f0f1f45372678c06ef1c1e56d7
SHA1b55a498b5b0e3b97f274576b336f6e0ecf9aa459
SHA25609b4561c8df641c6b3127c5bbdc42f8765f2b8fb18fa33173e38f0c52a6e53e7
SHA512569feea2a19862f18f0268813b8a6ade61740da04e25bd4b329a4ccc65ac56d80d7c4a8299f6fac48f72512e815ed749c815f03ed32bc1954939c2eb27f916bb
-
C:\Windows\system\SuRNOUy.exeFilesize
5.9MB
MD58ddbd21cba2712aa884eee36959b16f1
SHA1463c7ba2ead1b67122b39d8a1c4426a4d1c1eaa2
SHA2569ff657becb0ec319d4b39cd87ce53feb463dd3c064b71451f6b2ef48d947d912
SHA5121d808375598f1e793f74d02fa17c4944883f0775fdd960aafa8e51890ac44d43ced591902ef9d4145c7a74fb725c1af178ca73d1949a98ccb10ff148df4daff2
-
C:\Windows\system\TQLkVkl.exeFilesize
5.9MB
MD5a1a8c70d71e143bb450cfd7d7bd3b0ed
SHA1195cef7199d42666c89653ea7bdd79faa3b0175c
SHA25604092f85e040fba0c45a4dff99de0581bd360c0ed20368f94ab0cd121c1d07da
SHA5122d581af71f3f682dff641ac0178160c0c160323d1392cfe7a93817d2b51a8a8c03d3c803c6e0da38bac4cdef7bb106f3d72e11a381f9d0256fab45aee5ecec97
-
C:\Windows\system\cBdlNVe.exeFilesize
5.9MB
MD54a8fac213a6469204aa163cf5ccb2613
SHA17f97f5e068f59369ff76bdfbf995dd3ace8ed8ab
SHA256d3794d4625913c73ac4e99065afb32a90c11202106b4df7b9365c52f2ee288d0
SHA512f2da9bdefe2f0e9640680a91cf1d5a16c5e61eda03423bda4f6f7d81ae1d3d0c7043e3118c808592dbee015c92c07f2d9faee78eb2dc5bf7a89ee6ca97bed85f
-
C:\Windows\system\cOeSPEy.exeFilesize
5.9MB
MD528f563c4a0749191266cedef9bad737b
SHA1ada8ce388364fcf79fcf6d0379208db3ac202b60
SHA256a0ecd47bdaadb23df9855e06c3b8a3a4b97b0f0b20f84c80c0d6ef22b52047c0
SHA512e4148afc592167ef0bec3afb57ce7ec2abf3e418e87cf6e7375729ca6728ecb8433a850251f57ddbc420da3f938245eaefcb8f13727622b15b0ff3a2aadc7e3e
-
C:\Windows\system\cTqmrlo.exeFilesize
5.9MB
MD5f8053ed821760ff51b8cafd2e043b93f
SHA1a177ebff8d252d5850798d9d006683e9d523b355
SHA256f9d4fa90d9bd1ef2142366baca8bbc688171e9288ad194a4526f49d2b5551ee9
SHA5127ed52383294ade1c55caeccbfbd498501c5232b72a3db91e7160f220fcdd72d0efe1e85794c7dd1cfbb848b8151faaad3db86f94241384d2a8734504200f2932
-
C:\Windows\system\ePvJPmC.exeFilesize
5.9MB
MD524303061a0e7ad37e47b912dc168e188
SHA19f4b73e83944fc24bf162176b12ea50bc4b76ebd
SHA256aa1df33115798384a687aa6f0ab2c673825175a5be07437b90565d5aecd1489a
SHA512b818f50382d9352ccc41d6ca1f75c619e8c41e99caceb27760f122d81c0f6f600469f01da2e2552b8c1223c9612cec511ebd97bd9a376b91c5b51053f7d70876
-
C:\Windows\system\rShaOjs.exeFilesize
5.9MB
MD51b4bc8384a65610520693f913073909e
SHA15243b38647cb5ba5adaca2f07968d81718763051
SHA256e82aed67e80f06447e30cf3893b6be42bf94144b28004f20449ffac4c9669527
SHA512f553c6ad9293dfff7df55e50877ccb2e4153cf48c6a9ad1333d89927d6337f01d63ade1c79134c61d51151f49963f88e2ff231b3f0f95ef9d1e77082b8a16d30
-
C:\Windows\system\uHaKrDt.exeFilesize
5.9MB
MD5ac9bab6ae775e0ba9402a6a68fb5e02f
SHA1d80b78f9ad3b0ff94b8c7d1157b80ac6c1328d3c
SHA256ab9e884c250faec5d5f831fd5e289739aeb1bb26122e7217c2c170059a4c2802
SHA51216afa657454e6537e26af98ca2c42ead02ed14bae06467db3c72b13cff0bc45b481c7b5a3a819e933df60762834abc8adf4c7700a890739d1a91bbde1fa5b3c9
-
C:\Windows\system\vOetJDi.exeFilesize
5.9MB
MD5c3a90920816f3de5e09d2cc142840510
SHA1c0aebd01a9cd51dd6db88db860ddd4522de34709
SHA256d94fab7835b7b68c1bd01957ec8a59136069a43512692db61960534655cc62eb
SHA512fd77cac01def66323712811a9774645d8d6a290276dcdbf566db9e2194054f52c623cb8e84bc50ec8719a645e8efc1c738de81acedc72dc526c1eefd2d4ac6f9
-
\Windows\system\ATePjZI.exeFilesize
5.9MB
MD5cb24e8c2bde19544126dd7c45429d0c7
SHA13e1169c3f8c0739851540b6461bffe4130a3c69d
SHA256f4338b04fd774d8c2f3f00311f93b90308190a852cab9204003e585aae8f929b
SHA5125ed2d1195a0f9b0caa70f088dccc57605748aaa5e684cdd1c7c4e7f04ceee72ad5ad69cf5c1666608076f3a600ce9bd8d9e4422c12fd6105bd3db68d9e3f944c
-
\Windows\system\AdQHoQL.exeFilesize
5.9MB
MD5a65e7d48fe886d4484392eb26cded8fd
SHA12c77c72dc02013508d1bf85e4261dc5fe32f43fd
SHA2560c1470299816e17977d4bc353f72fcb161f5e37964006340fb5d6197fc608801
SHA51254722abd8119cecce956302c2de19f9ca58f202a4f935e693e7d7f218b0fb8f6bc97112ca0099089c8ad917982df0c680012f36daeaed9177d5f7db7f8fd092b
-
\Windows\system\dGTjcKE.exeFilesize
5.9MB
MD5b310fb007d633575c0e18dbb2e31d37d
SHA1aff630e7ad33e274c819f8cb8c7c1f07abf6c63b
SHA2565186b763e39c04db18ded71fb6231d4160976381c4ebf763bc11678bf616a201
SHA5123087889f6068fd1ece69df8376476e2b732a31dbd788987b54e2a2359f6e5c4b66c0df0898d0eb2426d9597d90456dd8f35c55536b7acabad7aa21a5caf4a71e
-
\Windows\system\emIYqmp.exeFilesize
5.9MB
MD54f10c8c3c1562658219232250ebad193
SHA1e354faf533bdca46c6bf57f425d1bde5bc2aef29
SHA256cf60b38b678966c3db98d983679f4d25fd4cebac745d46bc12306361bb76dffb
SHA512f56936315de67dfe0d56496de161c2ef83dbe9e707304ba55641421f7b4b0ef760320d5655d781459725b32f660ea9f8d6cff71fefc5cd5fcfe9d3cefe84ae11
-
\Windows\system\fbOLxSh.exeFilesize
5.9MB
MD52ba932c9bccc35d50127968c4246a2c8
SHA10c5e50d89f47a4a40d5902af8290b7717df93a66
SHA256bc8a81a5293b67573c69f5179d2266726c93fdb89b8d19a6d74773116a66460f
SHA512522ca9a87294f45ef7e12eed55c5f626005b0fcf8f059127e91836a0a5afd41a7f656c8c23475b6b5da226837d840aee1ab582f647ebdfafabec92e27511c427
-
\Windows\system\qJasthF.exeFilesize
5.9MB
MD5491cdcae5b0769ef9eac5806f58151f5
SHA16aa9ac6b44e8d77424cdfd764386a3e146a1a7ee
SHA256f20afdf587efc5ecfb51a0831f09b9bbe001eb3244aad900e99cf7fe006ed861
SHA5120660374fb801a53deba6e9ca21f2a1d79e99b421b97f8168b197d611ace9e1e25e5ad12fc3fd59cce3996583f1022b62ff9c676f3ce5b6eec2b0e67d9586550f
-
memory/1012-155-0x000000013F780000-0x000000013FAD4000-memory.dmpFilesize
3.3MB
-
memory/1012-139-0x000000013F780000-0x000000013FAD4000-memory.dmpFilesize
3.3MB
-
memory/1012-83-0x000000013F780000-0x000000013FAD4000-memory.dmpFilesize
3.3MB
-
memory/1204-67-0x000000013F080000-0x000000013F3D4000-memory.dmpFilesize
3.3MB
-
memory/1204-145-0x000000013F080000-0x000000013F3D4000-memory.dmpFilesize
3.3MB
-
memory/1204-15-0x000000013F080000-0x000000013F3D4000-memory.dmpFilesize
3.3MB
-
memory/1668-143-0x000000013F090000-0x000000013F3E4000-memory.dmpFilesize
3.3MB
-
memory/1668-96-0x000000013F090000-0x000000013F3E4000-memory.dmpFilesize
3.3MB
-
memory/1668-157-0x000000013F090000-0x000000013F3E4000-memory.dmpFilesize
3.3MB
-
memory/2148-138-0x000000013F780000-0x000000013FAD4000-memory.dmpFilesize
3.3MB
-
memory/2148-135-0x000000013F870000-0x000000013FBC4000-memory.dmpFilesize
3.3MB
-
memory/2148-2-0x000000013F0D0000-0x000000013F424000-memory.dmpFilesize
3.3MB
-
memory/2148-8-0x00000000024B0000-0x0000000002804000-memory.dmpFilesize
3.3MB
-
memory/2148-95-0x00000000024B0000-0x0000000002804000-memory.dmpFilesize
3.3MB
-
memory/2148-142-0x00000000024B0000-0x0000000002804000-memory.dmpFilesize
3.3MB
-
memory/2148-140-0x000000013F900000-0x000000013FC54000-memory.dmpFilesize
3.3MB
-
memory/2148-88-0x000000013F900000-0x000000013FC54000-memory.dmpFilesize
3.3MB
-
memory/2148-21-0x00000000024B0000-0x0000000002804000-memory.dmpFilesize
3.3MB
-
memory/2148-82-0x000000013F780000-0x000000013FAD4000-memory.dmpFilesize
3.3MB
-
memory/2148-0-0x0000000000080000-0x0000000000090000-memory.dmpFilesize
64KB
-
memory/2148-73-0x000000013FD00000-0x0000000140054000-memory.dmpFilesize
3.3MB
-
memory/2148-56-0x00000000024B0000-0x0000000002804000-memory.dmpFilesize
3.3MB
-
memory/2148-40-0x00000000024B0000-0x0000000002804000-memory.dmpFilesize
3.3MB
-
memory/2148-39-0x000000013F0D0000-0x000000013F424000-memory.dmpFilesize
3.3MB
-
memory/2148-28-0x000000013F610000-0x000000013F964000-memory.dmpFilesize
3.3MB
-
memory/2148-62-0x000000013F870000-0x000000013FBC4000-memory.dmpFilesize
3.3MB
-
memory/2204-149-0x000000013F680000-0x000000013F9D4000-memory.dmpFilesize
3.3MB
-
memory/2204-103-0x000000013F680000-0x000000013F9D4000-memory.dmpFilesize
3.3MB
-
memory/2204-49-0x000000013F680000-0x000000013F9D4000-memory.dmpFilesize
3.3MB
-
memory/2452-151-0x000000013F870000-0x000000013FBC4000-memory.dmpFilesize
3.3MB
-
memory/2452-63-0x000000013F870000-0x000000013FBC4000-memory.dmpFilesize
3.3MB
-
memory/2472-152-0x000000013F730000-0x000000013FA84000-memory.dmpFilesize
3.3MB
-
memory/2472-68-0x000000013F730000-0x000000013FA84000-memory.dmpFilesize
3.3MB
-
memory/2488-69-0x000000013F7F0000-0x000000013FB44000-memory.dmpFilesize
3.3MB
-
memory/2488-136-0x000000013F7F0000-0x000000013FB44000-memory.dmpFilesize
3.3MB
-
memory/2488-154-0x000000013F7F0000-0x000000013FB44000-memory.dmpFilesize
3.3MB
-
memory/2500-156-0x000000013F900000-0x000000013FC54000-memory.dmpFilesize
3.3MB
-
memory/2500-141-0x000000013F900000-0x000000013FC54000-memory.dmpFilesize
3.3MB
-
memory/2500-89-0x000000013F900000-0x000000013FC54000-memory.dmpFilesize
3.3MB
-
memory/2576-22-0x000000013F410000-0x000000013F764000-memory.dmpFilesize
3.3MB
-
memory/2576-146-0x000000013F410000-0x000000013F764000-memory.dmpFilesize
3.3MB
-
memory/2604-150-0x000000013F1F0000-0x000000013F544000-memory.dmpFilesize
3.3MB
-
memory/2604-134-0x000000013F1F0000-0x000000013F544000-memory.dmpFilesize
3.3MB
-
memory/2604-59-0x000000013F1F0000-0x000000013F544000-memory.dmpFilesize
3.3MB
-
memory/2632-148-0x000000013F070000-0x000000013F3C4000-memory.dmpFilesize
3.3MB
-
memory/2632-35-0x000000013F070000-0x000000013F3C4000-memory.dmpFilesize
3.3MB
-
memory/2700-29-0x000000013F610000-0x000000013F964000-memory.dmpFilesize
3.3MB
-
memory/2700-147-0x000000013F610000-0x000000013F964000-memory.dmpFilesize
3.3MB
-
memory/2800-144-0x000000013F280000-0x000000013F5D4000-memory.dmpFilesize
3.3MB
-
memory/2800-9-0x000000013F280000-0x000000013F5D4000-memory.dmpFilesize
3.3MB
-
memory/2904-74-0x000000013FD00000-0x0000000140054000-memory.dmpFilesize
3.3MB
-
memory/2904-153-0x000000013FD00000-0x0000000140054000-memory.dmpFilesize
3.3MB
-
memory/2904-137-0x000000013FD00000-0x0000000140054000-memory.dmpFilesize
3.3MB