Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-06-2024 07:08
Behavioral task
behavioral1
Sample
2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240221-en
General
-
Target
2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
daf8c1f4e989079a41bc0175817478ca
-
SHA1
726d3556ff459041cdf841ec030eb6a3caf79422
-
SHA256
926b0754561e66c80d9fcb2e21990f0679311998321c9faf77a31ef0c6dbd816
-
SHA512
46df376541ef7884570535f94e60dda15b7dd434635820f6af1c6bcba2e087d1ef02949c4e93100a09f683436bc71e75dae51520a31e80deaf809d01fd479727
-
SSDEEP
98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lUU:Q+856utgpPF8u/7U
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\AOhcaBw.exe cobalt_reflective_dll \Windows\system\QaEUenm.exe cobalt_reflective_dll C:\Windows\system\dYdpRtG.exe cobalt_reflective_dll C:\Windows\system\zUsCRMS.exe cobalt_reflective_dll C:\Windows\system\cfJYnpu.exe cobalt_reflective_dll C:\Windows\system\KgGboqm.exe cobalt_reflective_dll C:\Windows\system\WwPEuUT.exe cobalt_reflective_dll C:\Windows\system\rvzoLPK.exe cobalt_reflective_dll C:\Windows\system\IBtnNIh.exe cobalt_reflective_dll \Windows\system\ibkDKkM.exe cobalt_reflective_dll C:\Windows\system\xznBIny.exe cobalt_reflective_dll C:\Windows\system\DkxMhnD.exe cobalt_reflective_dll C:\Windows\system\YvwrQKt.exe cobalt_reflective_dll C:\Windows\system\ipZIKGj.exe cobalt_reflective_dll C:\Windows\system\SPMPBCl.exe cobalt_reflective_dll C:\Windows\system\HZxVKMD.exe cobalt_reflective_dll C:\Windows\system\OrYTODu.exe cobalt_reflective_dll C:\Windows\system\veivZYT.exe cobalt_reflective_dll C:\Windows\system\HuKLxvj.exe cobalt_reflective_dll C:\Windows\system\xbZWvaH.exe cobalt_reflective_dll C:\Windows\system\FsQSbbe.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule \Windows\system\AOhcaBw.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\QaEUenm.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\dYdpRtG.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\zUsCRMS.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\cfJYnpu.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\KgGboqm.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\WwPEuUT.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\rvzoLPK.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\IBtnNIh.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\ibkDKkM.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\xznBIny.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\DkxMhnD.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\YvwrQKt.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\ipZIKGj.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\SPMPBCl.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\HZxVKMD.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\OrYTODu.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\veivZYT.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\HuKLxvj.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\xbZWvaH.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\FsQSbbe.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule behavioral1/memory/2128-0-0x000000013FD30000-0x0000000140084000-memory.dmp UPX \Windows\system\AOhcaBw.exe UPX behavioral1/memory/2128-6-0x000000013F130000-0x000000013F484000-memory.dmp UPX behavioral1/memory/2380-8-0x000000013F130000-0x000000013F484000-memory.dmp UPX \Windows\system\QaEUenm.exe UPX behavioral1/memory/3020-15-0x000000013F100000-0x000000013F454000-memory.dmp UPX C:\Windows\system\dYdpRtG.exe UPX C:\Windows\system\zUsCRMS.exe UPX C:\Windows\system\cfJYnpu.exe UPX behavioral1/memory/2564-44-0x000000013FBB0000-0x000000013FF04000-memory.dmp UPX behavioral1/memory/2380-43-0x000000013F130000-0x000000013F484000-memory.dmp UPX behavioral1/memory/2836-41-0x000000013F400000-0x000000013F754000-memory.dmp UPX C:\Windows\system\KgGboqm.exe UPX C:\Windows\system\WwPEuUT.exe UPX C:\Windows\system\rvzoLPK.exe UPX behavioral1/memory/2936-73-0x000000013F1A0000-0x000000013F4F4000-memory.dmp UPX behavioral1/memory/2528-86-0x000000013FA60000-0x000000013FDB4000-memory.dmp UPX behavioral1/memory/2208-79-0x000000013F870000-0x000000013FBC4000-memory.dmp UPX C:\Windows\system\IBtnNIh.exe UPX \Windows\system\ibkDKkM.exe UPX C:\Windows\system\xznBIny.exe UPX C:\Windows\system\DkxMhnD.exe UPX C:\Windows\system\YvwrQKt.exe UPX behavioral1/memory/2496-140-0x000000013F640000-0x000000013F994000-memory.dmp UPX behavioral1/memory/2732-107-0x000000013F230000-0x000000013F584000-memory.dmp UPX C:\Windows\system\ipZIKGj.exe UPX C:\Windows\system\SPMPBCl.exe UPX behavioral1/memory/2784-94-0x000000013F640000-0x000000013F994000-memory.dmp UPX C:\Windows\system\HZxVKMD.exe UPX behavioral1/memory/2820-101-0x000000013FD40000-0x0000000140094000-memory.dmp UPX behavioral1/memory/2836-90-0x000000013F400000-0x000000013F754000-memory.dmp UPX behavioral1/memory/2512-142-0x000000013FA30000-0x000000013FD84000-memory.dmp UPX behavioral1/memory/2752-89-0x000000013FB90000-0x000000013FEE4000-memory.dmp UPX C:\Windows\system\OrYTODu.exe UPX C:\Windows\system\veivZYT.exe UPX C:\Windows\system\HuKLxvj.exe UPX behavioral1/memory/2936-144-0x000000013F1A0000-0x000000013F4F4000-memory.dmp UPX behavioral1/memory/2512-67-0x000000013FA30000-0x000000013FD84000-memory.dmp UPX C:\Windows\system\xbZWvaH.exe UPX behavioral1/memory/2496-60-0x000000013F640000-0x000000013F994000-memory.dmp UPX behavioral1/memory/2672-58-0x000000013F180000-0x000000013F4D4000-memory.dmp UPX behavioral1/memory/2732-51-0x000000013F230000-0x000000013F584000-memory.dmp UPX behavioral1/memory/3020-50-0x000000013F100000-0x000000013F454000-memory.dmp UPX C:\Windows\system\FsQSbbe.exe UPX behavioral1/memory/2208-145-0x000000013F870000-0x000000013FBC4000-memory.dmp UPX behavioral1/memory/2752-38-0x000000013FB90000-0x000000013FEE4000-memory.dmp UPX behavioral1/memory/2128-37-0x000000013FD30000-0x0000000140084000-memory.dmp UPX behavioral1/memory/2672-26-0x000000013F180000-0x000000013F4D4000-memory.dmp UPX behavioral1/memory/2784-147-0x000000013F640000-0x000000013F994000-memory.dmp UPX behavioral1/memory/2820-149-0x000000013FD40000-0x0000000140094000-memory.dmp UPX behavioral1/memory/2380-150-0x000000013F130000-0x000000013F484000-memory.dmp UPX behavioral1/memory/3020-151-0x000000013F100000-0x000000013F454000-memory.dmp UPX behavioral1/memory/2672-152-0x000000013F180000-0x000000013F4D4000-memory.dmp UPX behavioral1/memory/2564-153-0x000000013FBB0000-0x000000013FF04000-memory.dmp UPX behavioral1/memory/2752-154-0x000000013FB90000-0x000000013FEE4000-memory.dmp UPX behavioral1/memory/2836-155-0x000000013F400000-0x000000013F754000-memory.dmp UPX behavioral1/memory/2732-156-0x000000013F230000-0x000000013F584000-memory.dmp UPX behavioral1/memory/2496-157-0x000000013F640000-0x000000013F994000-memory.dmp UPX behavioral1/memory/2512-158-0x000000013FA30000-0x000000013FD84000-memory.dmp UPX behavioral1/memory/2936-159-0x000000013F1A0000-0x000000013F4F4000-memory.dmp UPX behavioral1/memory/2528-160-0x000000013FA60000-0x000000013FDB4000-memory.dmp UPX behavioral1/memory/2208-161-0x000000013F870000-0x000000013FBC4000-memory.dmp UPX behavioral1/memory/2784-162-0x000000013F640000-0x000000013F994000-memory.dmp UPX behavioral1/memory/2820-163-0x000000013FD40000-0x0000000140094000-memory.dmp UPX -
XMRig Miner payload 64 IoCs
Processes:
resource yara_rule behavioral1/memory/2128-0-0x000000013FD30000-0x0000000140084000-memory.dmp xmrig \Windows\system\AOhcaBw.exe xmrig behavioral1/memory/2128-6-0x000000013F130000-0x000000013F484000-memory.dmp xmrig behavioral1/memory/2380-8-0x000000013F130000-0x000000013F484000-memory.dmp xmrig \Windows\system\QaEUenm.exe xmrig behavioral1/memory/3020-15-0x000000013F100000-0x000000013F454000-memory.dmp xmrig C:\Windows\system\dYdpRtG.exe xmrig C:\Windows\system\zUsCRMS.exe xmrig C:\Windows\system\cfJYnpu.exe xmrig behavioral1/memory/2128-30-0x00000000022A0000-0x00000000025F4000-memory.dmp xmrig behavioral1/memory/2564-44-0x000000013FBB0000-0x000000013FF04000-memory.dmp xmrig behavioral1/memory/2380-43-0x000000013F130000-0x000000013F484000-memory.dmp xmrig behavioral1/memory/2836-41-0x000000013F400000-0x000000013F754000-memory.dmp xmrig C:\Windows\system\KgGboqm.exe xmrig C:\Windows\system\WwPEuUT.exe xmrig C:\Windows\system\rvzoLPK.exe xmrig behavioral1/memory/2936-73-0x000000013F1A0000-0x000000013F4F4000-memory.dmp xmrig behavioral1/memory/2528-86-0x000000013FA60000-0x000000013FDB4000-memory.dmp xmrig behavioral1/memory/2208-79-0x000000013F870000-0x000000013FBC4000-memory.dmp xmrig C:\Windows\system\IBtnNIh.exe xmrig \Windows\system\ibkDKkM.exe xmrig C:\Windows\system\xznBIny.exe xmrig C:\Windows\system\DkxMhnD.exe xmrig C:\Windows\system\YvwrQKt.exe xmrig behavioral1/memory/2128-108-0x000000013F3E0000-0x000000013F734000-memory.dmp xmrig behavioral1/memory/2496-140-0x000000013F640000-0x000000013F994000-memory.dmp xmrig behavioral1/memory/2128-139-0x000000013F640000-0x000000013F994000-memory.dmp xmrig behavioral1/memory/2732-107-0x000000013F230000-0x000000013F584000-memory.dmp xmrig C:\Windows\system\ipZIKGj.exe xmrig C:\Windows\system\SPMPBCl.exe xmrig behavioral1/memory/2784-94-0x000000013F640000-0x000000013F994000-memory.dmp xmrig C:\Windows\system\HZxVKMD.exe xmrig behavioral1/memory/2820-101-0x000000013FD40000-0x0000000140094000-memory.dmp xmrig behavioral1/memory/2836-90-0x000000013F400000-0x000000013F754000-memory.dmp xmrig behavioral1/memory/2512-142-0x000000013FA30000-0x000000013FD84000-memory.dmp xmrig behavioral1/memory/2752-89-0x000000013FB90000-0x000000013FEE4000-memory.dmp xmrig C:\Windows\system\OrYTODu.exe xmrig C:\Windows\system\veivZYT.exe xmrig C:\Windows\system\HuKLxvj.exe xmrig behavioral1/memory/2936-144-0x000000013F1A0000-0x000000013F4F4000-memory.dmp xmrig behavioral1/memory/2512-67-0x000000013FA30000-0x000000013FD84000-memory.dmp xmrig C:\Windows\system\xbZWvaH.exe xmrig behavioral1/memory/2496-60-0x000000013F640000-0x000000013F994000-memory.dmp xmrig behavioral1/memory/2672-58-0x000000013F180000-0x000000013F4D4000-memory.dmp xmrig behavioral1/memory/2732-51-0x000000013F230000-0x000000013F584000-memory.dmp xmrig behavioral1/memory/3020-50-0x000000013F100000-0x000000013F454000-memory.dmp xmrig C:\Windows\system\FsQSbbe.exe xmrig behavioral1/memory/2208-145-0x000000013F870000-0x000000013FBC4000-memory.dmp xmrig behavioral1/memory/2752-38-0x000000013FB90000-0x000000013FEE4000-memory.dmp xmrig behavioral1/memory/2128-37-0x000000013FD30000-0x0000000140084000-memory.dmp xmrig behavioral1/memory/2672-26-0x000000013F180000-0x000000013F4D4000-memory.dmp xmrig behavioral1/memory/2784-147-0x000000013F640000-0x000000013F994000-memory.dmp xmrig behavioral1/memory/2820-149-0x000000013FD40000-0x0000000140094000-memory.dmp xmrig behavioral1/memory/2380-150-0x000000013F130000-0x000000013F484000-memory.dmp xmrig behavioral1/memory/3020-151-0x000000013F100000-0x000000013F454000-memory.dmp xmrig behavioral1/memory/2672-152-0x000000013F180000-0x000000013F4D4000-memory.dmp xmrig behavioral1/memory/2564-153-0x000000013FBB0000-0x000000013FF04000-memory.dmp xmrig behavioral1/memory/2752-154-0x000000013FB90000-0x000000013FEE4000-memory.dmp xmrig behavioral1/memory/2836-155-0x000000013F400000-0x000000013F754000-memory.dmp xmrig behavioral1/memory/2732-156-0x000000013F230000-0x000000013F584000-memory.dmp xmrig behavioral1/memory/2496-157-0x000000013F640000-0x000000013F994000-memory.dmp xmrig behavioral1/memory/2512-158-0x000000013FA30000-0x000000013FD84000-memory.dmp xmrig behavioral1/memory/2936-159-0x000000013F1A0000-0x000000013F4F4000-memory.dmp xmrig behavioral1/memory/2528-160-0x000000013FA60000-0x000000013FDB4000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
AOhcaBw.exeQaEUenm.exedYdpRtG.exezUsCRMS.execfJYnpu.exeKgGboqm.exeFsQSbbe.exeWwPEuUT.exexbZWvaH.exervzoLPK.exeveivZYT.exeHuKLxvj.exeHZxVKMD.exeOrYTODu.exeSPMPBCl.exeipZIKGj.exeYvwrQKt.exeDkxMhnD.exexznBIny.exeIBtnNIh.exeibkDKkM.exepid process 2380 AOhcaBw.exe 3020 QaEUenm.exe 2672 dYdpRtG.exe 2752 zUsCRMS.exe 2836 cfJYnpu.exe 2564 KgGboqm.exe 2732 FsQSbbe.exe 2496 WwPEuUT.exe 2512 xbZWvaH.exe 2936 rvzoLPK.exe 2208 veivZYT.exe 2528 HuKLxvj.exe 2784 HZxVKMD.exe 2820 OrYTODu.exe 1872 SPMPBCl.exe 1628 ipZIKGj.exe 1716 YvwrQKt.exe 1464 DkxMhnD.exe 2356 xznBIny.exe 2500 IBtnNIh.exe 504 ibkDKkM.exe -
Loads dropped DLL 21 IoCs
Processes:
2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exepid process 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe -
Processes:
resource yara_rule behavioral1/memory/2128-0-0x000000013FD30000-0x0000000140084000-memory.dmp upx \Windows\system\AOhcaBw.exe upx behavioral1/memory/2128-6-0x000000013F130000-0x000000013F484000-memory.dmp upx behavioral1/memory/2380-8-0x000000013F130000-0x000000013F484000-memory.dmp upx \Windows\system\QaEUenm.exe upx behavioral1/memory/3020-15-0x000000013F100000-0x000000013F454000-memory.dmp upx C:\Windows\system\dYdpRtG.exe upx C:\Windows\system\zUsCRMS.exe upx C:\Windows\system\cfJYnpu.exe upx behavioral1/memory/2564-44-0x000000013FBB0000-0x000000013FF04000-memory.dmp upx behavioral1/memory/2380-43-0x000000013F130000-0x000000013F484000-memory.dmp upx behavioral1/memory/2836-41-0x000000013F400000-0x000000013F754000-memory.dmp upx C:\Windows\system\KgGboqm.exe upx C:\Windows\system\WwPEuUT.exe upx C:\Windows\system\rvzoLPK.exe upx behavioral1/memory/2936-73-0x000000013F1A0000-0x000000013F4F4000-memory.dmp upx behavioral1/memory/2528-86-0x000000013FA60000-0x000000013FDB4000-memory.dmp upx behavioral1/memory/2208-79-0x000000013F870000-0x000000013FBC4000-memory.dmp upx C:\Windows\system\IBtnNIh.exe upx \Windows\system\ibkDKkM.exe upx C:\Windows\system\xznBIny.exe upx C:\Windows\system\DkxMhnD.exe upx C:\Windows\system\YvwrQKt.exe upx behavioral1/memory/2496-140-0x000000013F640000-0x000000013F994000-memory.dmp upx behavioral1/memory/2732-107-0x000000013F230000-0x000000013F584000-memory.dmp upx C:\Windows\system\ipZIKGj.exe upx C:\Windows\system\SPMPBCl.exe upx behavioral1/memory/2784-94-0x000000013F640000-0x000000013F994000-memory.dmp upx C:\Windows\system\HZxVKMD.exe upx behavioral1/memory/2820-101-0x000000013FD40000-0x0000000140094000-memory.dmp upx behavioral1/memory/2836-90-0x000000013F400000-0x000000013F754000-memory.dmp upx behavioral1/memory/2512-142-0x000000013FA30000-0x000000013FD84000-memory.dmp upx behavioral1/memory/2752-89-0x000000013FB90000-0x000000013FEE4000-memory.dmp upx C:\Windows\system\OrYTODu.exe upx C:\Windows\system\veivZYT.exe upx C:\Windows\system\HuKLxvj.exe upx behavioral1/memory/2936-144-0x000000013F1A0000-0x000000013F4F4000-memory.dmp upx behavioral1/memory/2512-67-0x000000013FA30000-0x000000013FD84000-memory.dmp upx C:\Windows\system\xbZWvaH.exe upx behavioral1/memory/2496-60-0x000000013F640000-0x000000013F994000-memory.dmp upx behavioral1/memory/2672-58-0x000000013F180000-0x000000013F4D4000-memory.dmp upx behavioral1/memory/2732-51-0x000000013F230000-0x000000013F584000-memory.dmp upx behavioral1/memory/3020-50-0x000000013F100000-0x000000013F454000-memory.dmp upx C:\Windows\system\FsQSbbe.exe upx behavioral1/memory/2208-145-0x000000013F870000-0x000000013FBC4000-memory.dmp upx behavioral1/memory/2752-38-0x000000013FB90000-0x000000013FEE4000-memory.dmp upx behavioral1/memory/2128-37-0x000000013FD30000-0x0000000140084000-memory.dmp upx behavioral1/memory/2672-26-0x000000013F180000-0x000000013F4D4000-memory.dmp upx behavioral1/memory/2784-147-0x000000013F640000-0x000000013F994000-memory.dmp upx behavioral1/memory/2820-149-0x000000013FD40000-0x0000000140094000-memory.dmp upx behavioral1/memory/2380-150-0x000000013F130000-0x000000013F484000-memory.dmp upx behavioral1/memory/3020-151-0x000000013F100000-0x000000013F454000-memory.dmp upx behavioral1/memory/2672-152-0x000000013F180000-0x000000013F4D4000-memory.dmp upx behavioral1/memory/2564-153-0x000000013FBB0000-0x000000013FF04000-memory.dmp upx behavioral1/memory/2752-154-0x000000013FB90000-0x000000013FEE4000-memory.dmp upx behavioral1/memory/2836-155-0x000000013F400000-0x000000013F754000-memory.dmp upx behavioral1/memory/2732-156-0x000000013F230000-0x000000013F584000-memory.dmp upx behavioral1/memory/2496-157-0x000000013F640000-0x000000013F994000-memory.dmp upx behavioral1/memory/2512-158-0x000000013FA30000-0x000000013FD84000-memory.dmp upx behavioral1/memory/2936-159-0x000000013F1A0000-0x000000013F4F4000-memory.dmp upx behavioral1/memory/2528-160-0x000000013FA60000-0x000000013FDB4000-memory.dmp upx behavioral1/memory/2208-161-0x000000013F870000-0x000000013FBC4000-memory.dmp upx behavioral1/memory/2784-162-0x000000013F640000-0x000000013F994000-memory.dmp upx behavioral1/memory/2820-163-0x000000013FD40000-0x0000000140094000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exedescription ioc process File created C:\Windows\System\xbZWvaH.exe 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\OrYTODu.exe 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\DkxMhnD.exe 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\xznBIny.exe 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\FsQSbbe.exe 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\WwPEuUT.exe 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\HuKLxvj.exe 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\SPMPBCl.exe 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ipZIKGj.exe 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\IBtnNIh.exe 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ibkDKkM.exe 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\zUsCRMS.exe 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\cfJYnpu.exe 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\veivZYT.exe 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\HZxVKMD.exe 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\dYdpRtG.exe 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\rvzoLPK.exe 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\KgGboqm.exe 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\YvwrQKt.exe 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\AOhcaBw.exe 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\QaEUenm.exe 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process Token: SeLockMemoryPrivilege 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process target process PID 2128 wrote to memory of 2380 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe AOhcaBw.exe PID 2128 wrote to memory of 2380 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe AOhcaBw.exe PID 2128 wrote to memory of 2380 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe AOhcaBw.exe PID 2128 wrote to memory of 3020 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe QaEUenm.exe PID 2128 wrote to memory of 3020 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe QaEUenm.exe PID 2128 wrote to memory of 3020 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe QaEUenm.exe PID 2128 wrote to memory of 2672 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe dYdpRtG.exe PID 2128 wrote to memory of 2672 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe dYdpRtG.exe PID 2128 wrote to memory of 2672 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe dYdpRtG.exe PID 2128 wrote to memory of 2752 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe zUsCRMS.exe PID 2128 wrote to memory of 2752 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe zUsCRMS.exe PID 2128 wrote to memory of 2752 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe zUsCRMS.exe PID 2128 wrote to memory of 2564 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe KgGboqm.exe PID 2128 wrote to memory of 2564 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe KgGboqm.exe PID 2128 wrote to memory of 2564 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe KgGboqm.exe PID 2128 wrote to memory of 2836 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe cfJYnpu.exe PID 2128 wrote to memory of 2836 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe cfJYnpu.exe PID 2128 wrote to memory of 2836 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe cfJYnpu.exe PID 2128 wrote to memory of 2732 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe FsQSbbe.exe PID 2128 wrote to memory of 2732 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe FsQSbbe.exe PID 2128 wrote to memory of 2732 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe FsQSbbe.exe PID 2128 wrote to memory of 2496 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe WwPEuUT.exe PID 2128 wrote to memory of 2496 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe WwPEuUT.exe PID 2128 wrote to memory of 2496 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe WwPEuUT.exe PID 2128 wrote to memory of 2512 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe xbZWvaH.exe PID 2128 wrote to memory of 2512 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe xbZWvaH.exe PID 2128 wrote to memory of 2512 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe xbZWvaH.exe PID 2128 wrote to memory of 2936 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe rvzoLPK.exe PID 2128 wrote to memory of 2936 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe rvzoLPK.exe PID 2128 wrote to memory of 2936 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe rvzoLPK.exe PID 2128 wrote to memory of 2208 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe veivZYT.exe PID 2128 wrote to memory of 2208 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe veivZYT.exe PID 2128 wrote to memory of 2208 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe veivZYT.exe PID 2128 wrote to memory of 2528 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe HuKLxvj.exe PID 2128 wrote to memory of 2528 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe HuKLxvj.exe PID 2128 wrote to memory of 2528 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe HuKLxvj.exe PID 2128 wrote to memory of 2784 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe HZxVKMD.exe PID 2128 wrote to memory of 2784 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe HZxVKMD.exe PID 2128 wrote to memory of 2784 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe HZxVKMD.exe PID 2128 wrote to memory of 2820 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe OrYTODu.exe PID 2128 wrote to memory of 2820 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe OrYTODu.exe PID 2128 wrote to memory of 2820 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe OrYTODu.exe PID 2128 wrote to memory of 1872 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe SPMPBCl.exe PID 2128 wrote to memory of 1872 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe SPMPBCl.exe PID 2128 wrote to memory of 1872 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe SPMPBCl.exe PID 2128 wrote to memory of 1628 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe ipZIKGj.exe PID 2128 wrote to memory of 1628 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe ipZIKGj.exe PID 2128 wrote to memory of 1628 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe ipZIKGj.exe PID 2128 wrote to memory of 1716 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe YvwrQKt.exe PID 2128 wrote to memory of 1716 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe YvwrQKt.exe PID 2128 wrote to memory of 1716 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe YvwrQKt.exe PID 2128 wrote to memory of 1464 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe DkxMhnD.exe PID 2128 wrote to memory of 1464 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe DkxMhnD.exe PID 2128 wrote to memory of 1464 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe DkxMhnD.exe PID 2128 wrote to memory of 2356 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe xznBIny.exe PID 2128 wrote to memory of 2356 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe xznBIny.exe PID 2128 wrote to memory of 2356 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe xznBIny.exe PID 2128 wrote to memory of 2500 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe IBtnNIh.exe PID 2128 wrote to memory of 2500 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe IBtnNIh.exe PID 2128 wrote to memory of 2500 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe IBtnNIh.exe PID 2128 wrote to memory of 504 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe ibkDKkM.exe PID 2128 wrote to memory of 504 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe ibkDKkM.exe PID 2128 wrote to memory of 504 2128 2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe ibkDKkM.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\AOhcaBw.exeC:\Windows\System\AOhcaBw.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\QaEUenm.exeC:\Windows\System\QaEUenm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\dYdpRtG.exeC:\Windows\System\dYdpRtG.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zUsCRMS.exeC:\Windows\System\zUsCRMS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\KgGboqm.exeC:\Windows\System\KgGboqm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\cfJYnpu.exeC:\Windows\System\cfJYnpu.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\FsQSbbe.exeC:\Windows\System\FsQSbbe.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\WwPEuUT.exeC:\Windows\System\WwPEuUT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\xbZWvaH.exeC:\Windows\System\xbZWvaH.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\rvzoLPK.exeC:\Windows\System\rvzoLPK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\veivZYT.exeC:\Windows\System\veivZYT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\HuKLxvj.exeC:\Windows\System\HuKLxvj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\HZxVKMD.exeC:\Windows\System\HZxVKMD.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\OrYTODu.exeC:\Windows\System\OrYTODu.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\SPMPBCl.exeC:\Windows\System\SPMPBCl.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ipZIKGj.exeC:\Windows\System\ipZIKGj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YvwrQKt.exeC:\Windows\System\YvwrQKt.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\DkxMhnD.exeC:\Windows\System\DkxMhnD.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\xznBIny.exeC:\Windows\System\xznBIny.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\IBtnNIh.exeC:\Windows\System\IBtnNIh.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ibkDKkM.exeC:\Windows\System\ibkDKkM.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\DkxMhnD.exeFilesize
5.9MB
MD563d300f127a561417a824f3cbd442fc2
SHA128dbe54755ca703e3845f23811abd31f12f53270
SHA2567a3364181c62f7fcb214504106f2effee848348989119f9d0618f6b10dcf1641
SHA512461c2b33589f848363c675c3f855c2bba4779c187e4d4ed607214249c9bd0fd77880b632ca77e2610da95e359a45562b56c45886841368658ae84c56c333f6e1
-
C:\Windows\system\FsQSbbe.exeFilesize
5.9MB
MD56c5bec1c9b05dfa35fc2d320937adc99
SHA11af9733b14b1f3c00e57fff361f2cad623bf928e
SHA2563ac14acaec314dbdbff7018850064bd87f54ee6a3c082c050bebf971ce5de2d7
SHA5122c5d9031895b18a56bd17f4d192acf9e7a505fdcfbd5a6cc1c692531ad4f1ee13bc0d19779d0a05f4f67cf119dbb2b14c346845946c1547b4f57f5fb751906dc
-
C:\Windows\system\HZxVKMD.exeFilesize
5.9MB
MD530cf8ae259bfa789cfe316b6582cda76
SHA16d587d4d86520270a95287ae57df16b363efb8ed
SHA2560d4513602286c18b0f930b866ec1a1cb9e800bff0986815070b188be47259e89
SHA5122e9bce0f29d1ff302eb701471f1846f868b39116d9f7f31bbcb38e98c66633a31dc8db6115d335626ea5d29e22e4ac5b4e339662606cf34b4573c3fce4d9d351
-
C:\Windows\system\HuKLxvj.exeFilesize
5.9MB
MD5f957932686e9b990270b641035c0acba
SHA19f5d10ade10d74e8c6844d74b05141c2b75e452a
SHA2569a50db284b7138bcdf8ec12e4e7f67a8fc8c2d8930ac9f6c87530a9dfc2198ce
SHA512998c68ca9c3ac7099d43162999c4d415a038aff506c82948c4f35761b47805a4623b51fa1f31ceff5de720e492f51bfb335a1283825bf7d356ace5cfc44bfb25
-
C:\Windows\system\IBtnNIh.exeFilesize
5.9MB
MD584f42ff4a3d31d0d085dc72409165581
SHA12e78d9dbd1dcb76feb49e779a7c318eec4366d75
SHA25616ec498f3f2fd4e823e9c719fb056da82ade122baa6b8c11988df20af47d4b0d
SHA5129e2eeecf4e80207559c1986d35458607326172502fc6bdae7cdcc8fcf51eae6e2972a6403f423c3e90c04c4908bf231e04ac7869c7c77b346bcdcf9c7b466d6f
-
C:\Windows\system\KgGboqm.exeFilesize
5.9MB
MD54fe871f01c728532dc0cbba1cbaaae12
SHA17510b9ca459f20e6f96bbc725862c46d7f37576c
SHA256f2d92e734fe83272afdb048852cd084fbc4c59d046f083eb7e64e44c8dca4ea5
SHA5120599dbc8f0d7a39e0347d46c5b80be035e0889f22b227ba3ea76b3dfde85ada6467694c5a0c9a9b42e9bbf19ce08db46437722561a2fee328b5b62500150225e
-
C:\Windows\system\OrYTODu.exeFilesize
5.9MB
MD57cdfe615bd66d414a4ac9987ff3bc24c
SHA1b0b6d8959a91792d8b602348a11a3d9b9ccb7e3a
SHA256a1e5804615ac73a25456925b9855c758f7d05e5a313556f75a6412efc85c86ed
SHA51244a711a87054674ba7a341e2ee40a6befe52f756c40c7ddb61b014c50acaadc7dc972a0f6c376dcacd3d769b9f75b1f92dd38d974c54df7f0ced10257fad851f
-
C:\Windows\system\SPMPBCl.exeFilesize
5.9MB
MD5feb00383acbed9a64872d38cb28c7983
SHA1df747b59a9a703582f6c7e75c45b1ee37cd1baae
SHA256a590a8da7011d3c4cc4d5dbbba8992e8e61250d60c4351db24008230e8cf53ce
SHA512c723f0926356d99f8885e349e1b789ca1a72a6cb95ac8bf69ffdc5b96bf011d25464db80f64f044e4518d173a8086b03ecf1f66295ad78156febecb656343696
-
C:\Windows\system\WwPEuUT.exeFilesize
5.9MB
MD5f99aa0ed0bc414441561ca648a18ea4c
SHA11abfecc3d37941e7dde1dec591beb49113d17b6b
SHA2562eca06af6f4b32492d416851854b5274928be93cb6d9534210b3128ac43aab01
SHA51220e8db8d4a0776c8b81d806c054e85799b6be498fcc47feda37188c1f0f15c24292678626e939e5f07b64a3d3b5b646b18a8cdd57945fb1622824b928ed72f91
-
C:\Windows\system\YvwrQKt.exeFilesize
5.9MB
MD5a91fe00a2e426c762ff1fa45de917ee0
SHA190387f31acf1335b9275e39ecb0f16ff2fafd226
SHA25600363f328144a4147565a0787c0976cb8aee749efb7e970e88d74c154ee9fc33
SHA5124e57d2c2312e61f7aaeea6440c58e46315c8acb19b2cfcc101a884aa10da33772d4e8035dc44f9b907289c5bd0df2f40d83aaf80c40a40a7fa763c7b3b6572a0
-
C:\Windows\system\cfJYnpu.exeFilesize
5.9MB
MD5e7bd1638a0fdb4de14e5f01f3908cda1
SHA131ee45faf435af41532bdbaa63254ce09e7dbd2b
SHA2564bde3b82b1cc67fdad50c800c44ef9a88d2c54913f9f4905b2021ba0bd2cdedb
SHA5121a13042061ccf9bf6496ca727f976e22f4b80c0f9bf9e3dfa3bc70c3912600893586836babcae48cc6da9b2775838df69bf9b34209c9dca4dd8e13faa7349614
-
C:\Windows\system\dYdpRtG.exeFilesize
5.9MB
MD51757b56efd5109787e8ab991e36bbf6f
SHA1ccec58e2f080c9bf38f90c626386b0c2231f7a5d
SHA256f84458ea3295ef0668b23969f69e7de20a68776293cbd63c230d89d4372bc2e4
SHA512bce0cf424f43c2e4c2ebeca6bcd7221673f2de1a2e324ec462db64ec3e90fc81ce85d79274ee2008cb68c49a708534a6be07d51b33115e7a5c18941ba267aa74
-
C:\Windows\system\ipZIKGj.exeFilesize
5.9MB
MD5f6930b94fd7fe540efcaf486fe06b4a7
SHA1061790406debb6228ed3908341494f7ecc396328
SHA256c66a10cc408f0e2c18fd26530e6dc38d15215cc11a62d737ebc11077cc7a76db
SHA51227886c38b312326edb17b399a2c08664af8c4a7f296ac0b61c18791822bd9028337d80e6d7d6d37e01fdcbdb910faaf987546f64410f68f0e556571e33a36cf1
-
C:\Windows\system\rvzoLPK.exeFilesize
5.9MB
MD50248223f87ed018152168f780f9fd6aa
SHA1925ffa2ffe92fe7ddd02688e720f83d1fdd2b045
SHA256b3ad04f3c24dde84e1075217ca50d10a1b74466ff8e6f7693f924db250ad77a3
SHA512170a8b8de52280ec5bace52eb415b4fd08a70f5e24e8a810bf98d38ca029c317932413df8cda0cd7df1a4620932f9039c215365e26fba4e73ca7fdf0fb0ffb16
-
C:\Windows\system\veivZYT.exeFilesize
5.9MB
MD55eb74251d7478c99c663bf968e6ffb9e
SHA191fbe30bd145f680808ad08541021b982be57e90
SHA256b0431776df700a2d425eabf755c66a14997e443c17d2895405666468bffa1390
SHA512260bda0ddcd9ef26fc7e478079b30abaf439e3b5371388e1250307d08852e4a0d419113e319f4727670081c5a0ecd5cc5db7bd3cb47f0f00b209a07111c5514a
-
C:\Windows\system\xbZWvaH.exeFilesize
5.9MB
MD57bd9580b47274579f4fbe61db4368bfb
SHA19b538399897624d6a17ab698400ce814ef0b7bdf
SHA256b392ac2850df667e413075b98b44e8e6433da72474724b8ac00d9601e045cf31
SHA51239e902adc43e1a3aa86c4a321224636c8d98c0096eac2506c6954f2ed7953bd7454afb800aec95ffe3003c8aee75c73155207c12be371c67b187e7bdf12f91f2
-
C:\Windows\system\xznBIny.exeFilesize
5.9MB
MD5967261403d0a71b263710c93a1640b7e
SHA1a792aaea13a0795106063a7ba9be2cf18ca58a5d
SHA25631352d587b956dc1054e549f130e7f0de6bb8209d4e94b6eec78cfe8b54f4907
SHA5127e167bd9670e675adfc7782a7d6961ea35a0ea81c5241ec7b3630a36a07b3075fd799b7f5ff984af12bc3a9f2b47b523c149a79fd076cf4898527e06dc1ed742
-
C:\Windows\system\zUsCRMS.exeFilesize
5.9MB
MD5a9328d6a90af8c008042d6f9b2d85d67
SHA117732545aaf3ee6f742fad5bfcd0641c848ebced
SHA2567a6962ba1f59344f485e402b11bb18f4ac1f39fd59fe9cf33da91e9c2ae2d76f
SHA512acb72f8767a9d171799688147a7698c12f9aa7ee366cb8ead4b3c6c324cb35e41a53a78d6c55fd34f6976dc1334dfc3ea8799567347e6d877258402f78babace
-
\Windows\system\AOhcaBw.exeFilesize
5.9MB
MD53734b64e9deb9fb4d319e7b8c2dc0000
SHA1aca81c5620c7eb80f38682312e6739449370e391
SHA256d7d84e038afa574be6f92d7972d16455f4a87ca94c8d546575ce6019ba3f06c6
SHA51238c1801981e0ad79f0f007abd6d2d41f875feef1f547629179c1605ab34537d0e7a4db4c89079441e2ccdbcd351a47d9ca960b6e8fd47254b54d4124a10f3d2e
-
\Windows\system\QaEUenm.exeFilesize
5.9MB
MD5d5d12d57ba17785b09b51e86f956d2ce
SHA1af3afab22a7e0d4c518682b6d86088e4197b90f3
SHA25643c42824c92ef22aae0c116de238d6abe3840129f09b25f31e436639eadb2535
SHA512a857696cfd665c4ed258d35edfcd898b85daf2eb775b0b483294de2269759399e4526b28a98c3efede37b530b996bfa457d742defece13e21ac4748efa30d2a4
-
\Windows\system\ibkDKkM.exeFilesize
5.9MB
MD5cda6db5db093f8670cc9e840d841bd27
SHA1bab05f71b0af59f24b294c72c9629e231cd73fc0
SHA2562c0a1b937a49868b76f982d14e878ab4b876d6c86a1f9ed346a958a324773bea
SHA51216f681f945599c5125fe38667d795bd46338e19969b660349d40033899fb5c7b0c0a69c993cb37f91a71068c6e629ec85561461af94717dfc4789c6b82a5df08
-
memory/2128-33-0x00000000022A0000-0x00000000025F4000-memory.dmpFilesize
3.3MB
-
memory/2128-143-0x000000013F1A0000-0x000000013F4F4000-memory.dmpFilesize
3.3MB
-
memory/2128-37-0x000000013FD30000-0x0000000140084000-memory.dmpFilesize
3.3MB
-
memory/2128-59-0x000000013F640000-0x000000013F994000-memory.dmpFilesize
3.3MB
-
memory/2128-6-0x000000013F130000-0x000000013F484000-memory.dmpFilesize
3.3MB
-
memory/2128-66-0x00000000022A0000-0x00000000025F4000-memory.dmpFilesize
3.3MB
-
memory/2128-1-0x00000000000F0000-0x0000000000100000-memory.dmpFilesize
64KB
-
memory/2128-108-0x000000013F3E0000-0x000000013F734000-memory.dmpFilesize
3.3MB
-
memory/2128-35-0x000000013F400000-0x000000013F754000-memory.dmpFilesize
3.3MB
-
memory/2128-139-0x000000013F640000-0x000000013F994000-memory.dmpFilesize
3.3MB
-
memory/2128-148-0x00000000022A0000-0x00000000025F4000-memory.dmpFilesize
3.3MB
-
memory/2128-13-0x000000013F100000-0x000000013F454000-memory.dmpFilesize
3.3MB
-
memory/2128-30-0x00000000022A0000-0x00000000025F4000-memory.dmpFilesize
3.3MB
-
memory/2128-85-0x00000000022A0000-0x00000000025F4000-memory.dmpFilesize
3.3MB
-
memory/2128-21-0x000000013F180000-0x000000013F4D4000-memory.dmpFilesize
3.3MB
-
memory/2128-0-0x000000013FD30000-0x0000000140084000-memory.dmpFilesize
3.3MB
-
memory/2128-100-0x000000013F230000-0x000000013F584000-memory.dmpFilesize
3.3MB
-
memory/2128-146-0x00000000022A0000-0x00000000025F4000-memory.dmpFilesize
3.3MB
-
memory/2128-141-0x00000000022A0000-0x00000000025F4000-memory.dmpFilesize
3.3MB
-
memory/2208-161-0x000000013F870000-0x000000013FBC4000-memory.dmpFilesize
3.3MB
-
memory/2208-145-0x000000013F870000-0x000000013FBC4000-memory.dmpFilesize
3.3MB
-
memory/2208-79-0x000000013F870000-0x000000013FBC4000-memory.dmpFilesize
3.3MB
-
memory/2380-150-0x000000013F130000-0x000000013F484000-memory.dmpFilesize
3.3MB
-
memory/2380-8-0x000000013F130000-0x000000013F484000-memory.dmpFilesize
3.3MB
-
memory/2380-43-0x000000013F130000-0x000000013F484000-memory.dmpFilesize
3.3MB
-
memory/2496-140-0x000000013F640000-0x000000013F994000-memory.dmpFilesize
3.3MB
-
memory/2496-60-0x000000013F640000-0x000000013F994000-memory.dmpFilesize
3.3MB
-
memory/2496-157-0x000000013F640000-0x000000013F994000-memory.dmpFilesize
3.3MB
-
memory/2512-67-0x000000013FA30000-0x000000013FD84000-memory.dmpFilesize
3.3MB
-
memory/2512-142-0x000000013FA30000-0x000000013FD84000-memory.dmpFilesize
3.3MB
-
memory/2512-158-0x000000013FA30000-0x000000013FD84000-memory.dmpFilesize
3.3MB
-
memory/2528-160-0x000000013FA60000-0x000000013FDB4000-memory.dmpFilesize
3.3MB
-
memory/2528-86-0x000000013FA60000-0x000000013FDB4000-memory.dmpFilesize
3.3MB
-
memory/2564-44-0x000000013FBB0000-0x000000013FF04000-memory.dmpFilesize
3.3MB
-
memory/2564-153-0x000000013FBB0000-0x000000013FF04000-memory.dmpFilesize
3.3MB
-
memory/2672-152-0x000000013F180000-0x000000013F4D4000-memory.dmpFilesize
3.3MB
-
memory/2672-58-0x000000013F180000-0x000000013F4D4000-memory.dmpFilesize
3.3MB
-
memory/2672-26-0x000000013F180000-0x000000013F4D4000-memory.dmpFilesize
3.3MB
-
memory/2732-51-0x000000013F230000-0x000000013F584000-memory.dmpFilesize
3.3MB
-
memory/2732-156-0x000000013F230000-0x000000013F584000-memory.dmpFilesize
3.3MB
-
memory/2732-107-0x000000013F230000-0x000000013F584000-memory.dmpFilesize
3.3MB
-
memory/2752-38-0x000000013FB90000-0x000000013FEE4000-memory.dmpFilesize
3.3MB
-
memory/2752-154-0x000000013FB90000-0x000000013FEE4000-memory.dmpFilesize
3.3MB
-
memory/2752-89-0x000000013FB90000-0x000000013FEE4000-memory.dmpFilesize
3.3MB
-
memory/2784-147-0x000000013F640000-0x000000013F994000-memory.dmpFilesize
3.3MB
-
memory/2784-94-0x000000013F640000-0x000000013F994000-memory.dmpFilesize
3.3MB
-
memory/2784-162-0x000000013F640000-0x000000013F994000-memory.dmpFilesize
3.3MB
-
memory/2820-163-0x000000013FD40000-0x0000000140094000-memory.dmpFilesize
3.3MB
-
memory/2820-149-0x000000013FD40000-0x0000000140094000-memory.dmpFilesize
3.3MB
-
memory/2820-101-0x000000013FD40000-0x0000000140094000-memory.dmpFilesize
3.3MB
-
memory/2836-41-0x000000013F400000-0x000000013F754000-memory.dmpFilesize
3.3MB
-
memory/2836-155-0x000000013F400000-0x000000013F754000-memory.dmpFilesize
3.3MB
-
memory/2836-90-0x000000013F400000-0x000000013F754000-memory.dmpFilesize
3.3MB
-
memory/2936-144-0x000000013F1A0000-0x000000013F4F4000-memory.dmpFilesize
3.3MB
-
memory/2936-159-0x000000013F1A0000-0x000000013F4F4000-memory.dmpFilesize
3.3MB
-
memory/2936-73-0x000000013F1A0000-0x000000013F4F4000-memory.dmpFilesize
3.3MB
-
memory/3020-15-0x000000013F100000-0x000000013F454000-memory.dmpFilesize
3.3MB
-
memory/3020-50-0x000000013F100000-0x000000013F454000-memory.dmpFilesize
3.3MB
-
memory/3020-151-0x000000013F100000-0x000000013F454000-memory.dmpFilesize
3.3MB