Analysis
-
max time kernel
142s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31-03-2024 03:50
Behavioral task
behavioral1
Sample
2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe
Resource
win7-20240221-en
General
-
Target
2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe
-
Size
5.2MB
-
MD5
6f713228f63c1b6a5ca7cb7dabcab1e0
-
SHA1
75f0ab9ca658fef8019622585c2ad05d6beb3580
-
SHA256
dfbbabbd265577e338b6d54438bcd7f63b0cc9645bccef2f40b8a4d2820ae7d0
-
SHA512
aa25d15120f712ed41c62d0f3fae607c1286ea6718177283be54837e021fd5bf5f481ba59942e346510c10ee62fc50dd67ed95e16e94efdd0aed66769dcf6175
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lm:RWWBibf56utgpPFotBER/mQ32lUa
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\eRGYxJh.exe cobalt_reflective_dll \Windows\system\VagtcXs.exe cobalt_reflective_dll C:\Windows\system\QBLfILm.exe cobalt_reflective_dll \Windows\system\yKgkKfC.exe cobalt_reflective_dll \Windows\system\cyAzPgT.exe cobalt_reflective_dll C:\Windows\system\LXCILUA.exe cobalt_reflective_dll \Windows\system\ZUIXoGd.exe cobalt_reflective_dll C:\Windows\system\XDUbOfY.exe cobalt_reflective_dll \Windows\system\UyiNRsE.exe cobalt_reflective_dll \Windows\system\ZRsAZHj.exe cobalt_reflective_dll C:\Windows\system\CKnymyt.exe cobalt_reflective_dll \Windows\system\IhWNGYH.exe cobalt_reflective_dll C:\Windows\system\iAhZODC.exe cobalt_reflective_dll \Windows\system\KHBWIwk.exe cobalt_reflective_dll \Windows\system\QwxDWZF.exe cobalt_reflective_dll \Windows\system\coqjVRp.exe cobalt_reflective_dll \Windows\system\XwIjnht.exe cobalt_reflective_dll \Windows\system\BFSkCHo.exe cobalt_reflective_dll \Windows\system\LewtDzn.exe cobalt_reflective_dll \Windows\system\UiqmnRH.exe cobalt_reflective_dll \Windows\system\OHgxLSo.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule \Windows\system\eRGYxJh.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\VagtcXs.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\QBLfILm.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\yKgkKfC.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\cyAzPgT.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\LXCILUA.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\ZUIXoGd.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\XDUbOfY.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\UyiNRsE.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\ZRsAZHj.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\CKnymyt.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\IhWNGYH.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\iAhZODC.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\KHBWIwk.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\QwxDWZF.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\coqjVRp.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\XwIjnht.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\BFSkCHo.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\LewtDzn.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\UiqmnRH.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\OHgxLSo.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule behavioral1/memory/2688-0-0x000000013F400000-0x000000013F751000-memory.dmp UPX \Windows\system\eRGYxJh.exe UPX behavioral1/memory/2584-9-0x000000013FF40000-0x0000000140291000-memory.dmp UPX \Windows\system\VagtcXs.exe UPX C:\Windows\system\QBLfILm.exe UPX \Windows\system\yKgkKfC.exe UPX \Windows\system\cyAzPgT.exe UPX behavioral1/memory/2660-19-0x000000013FED0000-0x0000000140221000-memory.dmp UPX C:\Windows\system\LXCILUA.exe UPX behavioral1/memory/2548-44-0x000000013FDF0000-0x0000000140141000-memory.dmp UPX behavioral1/memory/2464-47-0x000000013FC10000-0x000000013FF61000-memory.dmp UPX behavioral1/memory/2272-50-0x000000013FBB0000-0x000000013FF01000-memory.dmp UPX behavioral1/memory/2728-43-0x000000013FA90000-0x000000013FDE1000-memory.dmp UPX \Windows\system\ZUIXoGd.exe UPX C:\Windows\system\XDUbOfY.exe UPX \Windows\system\UyiNRsE.exe UPX \Windows\system\ZRsAZHj.exe UPX C:\Windows\system\CKnymyt.exe UPX \Windows\system\IhWNGYH.exe UPX C:\Windows\system\iAhZODC.exe UPX \Windows\system\KHBWIwk.exe UPX \Windows\system\QwxDWZF.exe UPX behavioral1/memory/2916-77-0x000000013F1F0000-0x000000013F541000-memory.dmp UPX behavioral1/memory/2584-97-0x000000013FF40000-0x0000000140291000-memory.dmp UPX behavioral1/memory/2688-96-0x000000013F400000-0x000000013F751000-memory.dmp UPX behavioral1/memory/2576-99-0x000000013FEB0000-0x0000000140201000-memory.dmp UPX behavioral1/memory/2600-98-0x000000013FA00000-0x000000013FD51000-memory.dmp UPX behavioral1/memory/2516-100-0x000000013FB70000-0x000000013FEC1000-memory.dmp UPX behavioral1/memory/928-101-0x000000013F620000-0x000000013F971000-memory.dmp UPX behavioral1/memory/572-102-0x000000013F810000-0x000000013FB61000-memory.dmp UPX behavioral1/memory/2896-103-0x000000013F920000-0x000000013FC71000-memory.dmp UPX behavioral1/memory/2548-105-0x000000013FDF0000-0x0000000140141000-memory.dmp UPX behavioral1/memory/1408-107-0x000000013FF40000-0x0000000140291000-memory.dmp UPX behavioral1/memory/684-108-0x000000013F120000-0x000000013F471000-memory.dmp UPX \Windows\system\coqjVRp.exe UPX behavioral1/memory/2792-117-0x000000013FD50000-0x00000001400A1000-memory.dmp UPX \Windows\system\XwIjnht.exe UPX \Windows\system\BFSkCHo.exe UPX \Windows\system\LewtDzn.exe UPX behavioral1/memory/2724-142-0x000000013F500000-0x000000013F851000-memory.dmp UPX behavioral1/memory/1824-144-0x000000013FB50000-0x000000013FEA1000-memory.dmp UPX behavioral1/memory/1144-127-0x000000013FC10000-0x000000013FF61000-memory.dmp UPX \Windows\system\UiqmnRH.exe UPX behavioral1/memory/1536-147-0x000000013F950000-0x000000013FCA1000-memory.dmp UPX \Windows\system\OHgxLSo.exe UPX behavioral1/memory/2688-149-0x000000013F400000-0x000000013F751000-memory.dmp UPX behavioral1/memory/684-151-0x000000013F120000-0x000000013F471000-memory.dmp UPX behavioral1/memory/1408-153-0x000000013FF40000-0x0000000140291000-memory.dmp UPX behavioral1/memory/2792-155-0x000000013FD50000-0x00000001400A1000-memory.dmp UPX behavioral1/memory/1004-159-0x000000013F1C0000-0x000000013F511000-memory.dmp UPX behavioral1/memory/1824-169-0x000000013FB50000-0x000000013FEA1000-memory.dmp UPX behavioral1/memory/1144-170-0x000000013FC10000-0x000000013FF61000-memory.dmp UPX behavioral1/memory/1536-171-0x000000013F950000-0x000000013FCA1000-memory.dmp UPX behavioral1/memory/2688-177-0x000000013F400000-0x000000013F751000-memory.dmp UPX behavioral1/memory/2584-198-0x000000013FF40000-0x0000000140291000-memory.dmp UPX behavioral1/memory/2660-200-0x000000013FED0000-0x0000000140221000-memory.dmp UPX behavioral1/memory/2728-202-0x000000013FA90000-0x000000013FDE1000-memory.dmp UPX behavioral1/memory/2464-204-0x000000013FC10000-0x000000013FF61000-memory.dmp UPX behavioral1/memory/2272-206-0x000000013FBB0000-0x000000013FF01000-memory.dmp UPX behavioral1/memory/2548-226-0x000000013FDF0000-0x0000000140141000-memory.dmp UPX behavioral1/memory/2916-227-0x000000013F1F0000-0x000000013F541000-memory.dmp UPX behavioral1/memory/928-229-0x000000013F620000-0x000000013F971000-memory.dmp UPX behavioral1/memory/572-231-0x000000013F810000-0x000000013FB61000-memory.dmp UPX behavioral1/memory/2516-234-0x000000013FB70000-0x000000013FEC1000-memory.dmp UPX -
XMRig Miner payload 52 IoCs
Processes:
resource yara_rule behavioral1/memory/2584-9-0x000000013FF40000-0x0000000140291000-memory.dmp xmrig behavioral1/memory/2660-19-0x000000013FED0000-0x0000000140221000-memory.dmp xmrig behavioral1/memory/2548-44-0x000000013FDF0000-0x0000000140141000-memory.dmp xmrig behavioral1/memory/2464-47-0x000000013FC10000-0x000000013FF61000-memory.dmp xmrig behavioral1/memory/2272-50-0x000000013FBB0000-0x000000013FF01000-memory.dmp xmrig behavioral1/memory/2728-43-0x000000013FA90000-0x000000013FDE1000-memory.dmp xmrig behavioral1/memory/2916-77-0x000000013F1F0000-0x000000013F541000-memory.dmp xmrig behavioral1/memory/2584-97-0x000000013FF40000-0x0000000140291000-memory.dmp xmrig behavioral1/memory/2688-96-0x000000013F400000-0x000000013F751000-memory.dmp xmrig behavioral1/memory/2576-99-0x000000013FEB0000-0x0000000140201000-memory.dmp xmrig behavioral1/memory/2600-98-0x000000013FA00000-0x000000013FD51000-memory.dmp xmrig behavioral1/memory/2516-100-0x000000013FB70000-0x000000013FEC1000-memory.dmp xmrig behavioral1/memory/928-101-0x000000013F620000-0x000000013F971000-memory.dmp xmrig behavioral1/memory/572-102-0x000000013F810000-0x000000013FB61000-memory.dmp xmrig behavioral1/memory/2896-103-0x000000013F920000-0x000000013FC71000-memory.dmp xmrig behavioral1/memory/2548-105-0x000000013FDF0000-0x0000000140141000-memory.dmp xmrig behavioral1/memory/1408-107-0x000000013FF40000-0x0000000140291000-memory.dmp xmrig behavioral1/memory/684-108-0x000000013F120000-0x000000013F471000-memory.dmp xmrig behavioral1/memory/2792-117-0x000000013FD50000-0x00000001400A1000-memory.dmp xmrig behavioral1/memory/2724-142-0x000000013F500000-0x000000013F851000-memory.dmp xmrig behavioral1/memory/1824-144-0x000000013FB50000-0x000000013FEA1000-memory.dmp xmrig behavioral1/memory/1144-127-0x000000013FC10000-0x000000013FF61000-memory.dmp xmrig behavioral1/memory/2688-124-0x000000013FB50000-0x000000013FEA1000-memory.dmp xmrig behavioral1/memory/1536-147-0x000000013F950000-0x000000013FCA1000-memory.dmp xmrig behavioral1/memory/2688-149-0x000000013F400000-0x000000013F751000-memory.dmp xmrig behavioral1/memory/684-151-0x000000013F120000-0x000000013F471000-memory.dmp xmrig behavioral1/memory/1408-153-0x000000013FF40000-0x0000000140291000-memory.dmp xmrig behavioral1/memory/2792-155-0x000000013FD50000-0x00000001400A1000-memory.dmp xmrig behavioral1/memory/1004-159-0x000000013F1C0000-0x000000013F511000-memory.dmp xmrig behavioral1/memory/1824-169-0x000000013FB50000-0x000000013FEA1000-memory.dmp xmrig behavioral1/memory/1144-170-0x000000013FC10000-0x000000013FF61000-memory.dmp xmrig behavioral1/memory/1536-171-0x000000013F950000-0x000000013FCA1000-memory.dmp xmrig behavioral1/memory/2688-177-0x000000013F400000-0x000000013F751000-memory.dmp xmrig behavioral1/memory/2584-198-0x000000013FF40000-0x0000000140291000-memory.dmp xmrig behavioral1/memory/2660-200-0x000000013FED0000-0x0000000140221000-memory.dmp xmrig behavioral1/memory/2728-202-0x000000013FA90000-0x000000013FDE1000-memory.dmp xmrig behavioral1/memory/2464-204-0x000000013FC10000-0x000000013FF61000-memory.dmp xmrig behavioral1/memory/2272-206-0x000000013FBB0000-0x000000013FF01000-memory.dmp xmrig behavioral1/memory/2548-226-0x000000013FDF0000-0x0000000140141000-memory.dmp xmrig behavioral1/memory/2916-227-0x000000013F1F0000-0x000000013F541000-memory.dmp xmrig behavioral1/memory/928-229-0x000000013F620000-0x000000013F971000-memory.dmp xmrig behavioral1/memory/572-231-0x000000013F810000-0x000000013FB61000-memory.dmp xmrig behavioral1/memory/2516-234-0x000000013FB70000-0x000000013FEC1000-memory.dmp xmrig behavioral1/memory/2896-235-0x000000013F920000-0x000000013FC71000-memory.dmp xmrig behavioral1/memory/684-243-0x000000013F120000-0x000000013F471000-memory.dmp xmrig behavioral1/memory/1408-245-0x000000013FF40000-0x0000000140291000-memory.dmp xmrig behavioral1/memory/2792-249-0x000000013FD50000-0x00000001400A1000-memory.dmp xmrig behavioral1/memory/1144-248-0x000000013FC10000-0x000000013FF61000-memory.dmp xmrig behavioral1/memory/2724-251-0x000000013F500000-0x000000013F851000-memory.dmp xmrig behavioral1/memory/1824-253-0x000000013FB50000-0x000000013FEA1000-memory.dmp xmrig behavioral1/memory/1536-255-0x000000013F950000-0x000000013FCA1000-memory.dmp xmrig behavioral1/memory/1004-259-0x000000013F1C0000-0x000000013F511000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
eRGYxJh.exeVagtcXs.exeQBLfILm.exeLXCILUA.exeyKgkKfC.execyAzPgT.exeZUIXoGd.exeXDUbOfY.exeUyiNRsE.exeZRsAZHj.exeCKnymyt.exeIhWNGYH.exeiAhZODC.exeKHBWIwk.exeQwxDWZF.execoqjVRp.exeXwIjnht.exeBFSkCHo.exeLewtDzn.exeUiqmnRH.exeOHgxLSo.exepid process 2584 eRGYxJh.exe 2660 VagtcXs.exe 2728 QBLfILm.exe 2548 LXCILUA.exe 2464 yKgkKfC.exe 2272 cyAzPgT.exe 2916 ZUIXoGd.exe 2600 XDUbOfY.exe 2576 UyiNRsE.exe 2516 ZRsAZHj.exe 928 CKnymyt.exe 684 IhWNGYH.exe 572 iAhZODC.exe 2896 KHBWIwk.exe 1408 QwxDWZF.exe 2792 coqjVRp.exe 1144 XwIjnht.exe 1824 BFSkCHo.exe 2724 LewtDzn.exe 1536 UiqmnRH.exe 1004 OHgxLSo.exe -
Loads dropped DLL 21 IoCs
Processes:
2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exepid process 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe -
Processes:
resource yara_rule behavioral1/memory/2688-0-0x000000013F400000-0x000000013F751000-memory.dmp upx \Windows\system\eRGYxJh.exe upx behavioral1/memory/2688-6-0x000000013FF40000-0x0000000140291000-memory.dmp upx behavioral1/memory/2584-9-0x000000013FF40000-0x0000000140291000-memory.dmp upx \Windows\system\VagtcXs.exe upx C:\Windows\system\QBLfILm.exe upx \Windows\system\yKgkKfC.exe upx \Windows\system\cyAzPgT.exe upx behavioral1/memory/2660-19-0x000000013FED0000-0x0000000140221000-memory.dmp upx C:\Windows\system\LXCILUA.exe upx behavioral1/memory/2548-44-0x000000013FDF0000-0x0000000140141000-memory.dmp upx behavioral1/memory/2464-47-0x000000013FC10000-0x000000013FF61000-memory.dmp upx behavioral1/memory/2272-50-0x000000013FBB0000-0x000000013FF01000-memory.dmp upx behavioral1/memory/2728-43-0x000000013FA90000-0x000000013FDE1000-memory.dmp upx \Windows\system\ZUIXoGd.exe upx C:\Windows\system\XDUbOfY.exe upx \Windows\system\UyiNRsE.exe upx \Windows\system\ZRsAZHj.exe upx C:\Windows\system\CKnymyt.exe upx \Windows\system\IhWNGYH.exe upx C:\Windows\system\iAhZODC.exe upx \Windows\system\KHBWIwk.exe upx \Windows\system\QwxDWZF.exe upx behavioral1/memory/2916-77-0x000000013F1F0000-0x000000013F541000-memory.dmp upx behavioral1/memory/2584-97-0x000000013FF40000-0x0000000140291000-memory.dmp upx behavioral1/memory/2688-96-0x000000013F400000-0x000000013F751000-memory.dmp upx behavioral1/memory/2576-99-0x000000013FEB0000-0x0000000140201000-memory.dmp upx behavioral1/memory/2600-98-0x000000013FA00000-0x000000013FD51000-memory.dmp upx behavioral1/memory/2516-100-0x000000013FB70000-0x000000013FEC1000-memory.dmp upx behavioral1/memory/928-101-0x000000013F620000-0x000000013F971000-memory.dmp upx behavioral1/memory/572-102-0x000000013F810000-0x000000013FB61000-memory.dmp upx behavioral1/memory/2896-103-0x000000013F920000-0x000000013FC71000-memory.dmp upx behavioral1/memory/2548-105-0x000000013FDF0000-0x0000000140141000-memory.dmp upx behavioral1/memory/1408-107-0x000000013FF40000-0x0000000140291000-memory.dmp upx behavioral1/memory/684-108-0x000000013F120000-0x000000013F471000-memory.dmp upx \Windows\system\coqjVRp.exe upx behavioral1/memory/2792-117-0x000000013FD50000-0x00000001400A1000-memory.dmp upx \Windows\system\XwIjnht.exe upx \Windows\system\BFSkCHo.exe upx \Windows\system\LewtDzn.exe upx behavioral1/memory/2724-142-0x000000013F500000-0x000000013F851000-memory.dmp upx behavioral1/memory/1824-144-0x000000013FB50000-0x000000013FEA1000-memory.dmp upx behavioral1/memory/1144-127-0x000000013FC10000-0x000000013FF61000-memory.dmp upx \Windows\system\UiqmnRH.exe upx behavioral1/memory/1536-147-0x000000013F950000-0x000000013FCA1000-memory.dmp upx \Windows\system\OHgxLSo.exe upx behavioral1/memory/2688-149-0x000000013F400000-0x000000013F751000-memory.dmp upx behavioral1/memory/684-151-0x000000013F120000-0x000000013F471000-memory.dmp upx behavioral1/memory/1408-153-0x000000013FF40000-0x0000000140291000-memory.dmp upx behavioral1/memory/2792-155-0x000000013FD50000-0x00000001400A1000-memory.dmp upx behavioral1/memory/1004-159-0x000000013F1C0000-0x000000013F511000-memory.dmp upx behavioral1/memory/1824-169-0x000000013FB50000-0x000000013FEA1000-memory.dmp upx behavioral1/memory/1144-170-0x000000013FC10000-0x000000013FF61000-memory.dmp upx behavioral1/memory/1536-171-0x000000013F950000-0x000000013FCA1000-memory.dmp upx behavioral1/memory/2688-177-0x000000013F400000-0x000000013F751000-memory.dmp upx behavioral1/memory/2584-198-0x000000013FF40000-0x0000000140291000-memory.dmp upx behavioral1/memory/2660-200-0x000000013FED0000-0x0000000140221000-memory.dmp upx behavioral1/memory/2728-202-0x000000013FA90000-0x000000013FDE1000-memory.dmp upx behavioral1/memory/2464-204-0x000000013FC10000-0x000000013FF61000-memory.dmp upx behavioral1/memory/2272-206-0x000000013FBB0000-0x000000013FF01000-memory.dmp upx behavioral1/memory/2548-226-0x000000013FDF0000-0x0000000140141000-memory.dmp upx behavioral1/memory/2916-227-0x000000013F1F0000-0x000000013F541000-memory.dmp upx behavioral1/memory/928-229-0x000000013F620000-0x000000013F971000-memory.dmp upx behavioral1/memory/572-231-0x000000013F810000-0x000000013FB61000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exedescription ioc process File created C:\Windows\System\IhWNGYH.exe 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\QBLfILm.exe 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\ZUIXoGd.exe 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\CKnymyt.exe 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\iAhZODC.exe 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\coqjVRp.exe 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\UiqmnRH.exe 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\eRGYxJh.exe 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\ZRsAZHj.exe 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\QwxDWZF.exe 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\LewtDzn.exe 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\OHgxLSo.exe 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\KHBWIwk.exe 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\BFSkCHo.exe 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\VagtcXs.exe 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\LXCILUA.exe 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\XDUbOfY.exe 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\yKgkKfC.exe 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\UyiNRsE.exe 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\cyAzPgT.exe 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\XwIjnht.exe 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exedescription pid process Token: SeLockMemoryPrivilege 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe Token: SeLockMemoryPrivilege 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exedescription pid process target process PID 2688 wrote to memory of 2584 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe eRGYxJh.exe PID 2688 wrote to memory of 2584 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe eRGYxJh.exe PID 2688 wrote to memory of 2584 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe eRGYxJh.exe PID 2688 wrote to memory of 2660 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe VagtcXs.exe PID 2688 wrote to memory of 2660 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe VagtcXs.exe PID 2688 wrote to memory of 2660 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe VagtcXs.exe PID 2688 wrote to memory of 2548 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe LXCILUA.exe PID 2688 wrote to memory of 2548 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe LXCILUA.exe PID 2688 wrote to memory of 2548 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe LXCILUA.exe PID 2688 wrote to memory of 2728 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe QBLfILm.exe PID 2688 wrote to memory of 2728 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe QBLfILm.exe PID 2688 wrote to memory of 2728 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe QBLfILm.exe PID 2688 wrote to memory of 2600 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe XDUbOfY.exe PID 2688 wrote to memory of 2600 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe XDUbOfY.exe PID 2688 wrote to memory of 2600 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe XDUbOfY.exe PID 2688 wrote to memory of 2464 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe yKgkKfC.exe PID 2688 wrote to memory of 2464 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe yKgkKfC.exe PID 2688 wrote to memory of 2464 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe yKgkKfC.exe PID 2688 wrote to memory of 2576 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe UyiNRsE.exe PID 2688 wrote to memory of 2576 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe UyiNRsE.exe PID 2688 wrote to memory of 2576 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe UyiNRsE.exe PID 2688 wrote to memory of 2272 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe cyAzPgT.exe PID 2688 wrote to memory of 2272 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe cyAzPgT.exe PID 2688 wrote to memory of 2272 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe cyAzPgT.exe PID 2688 wrote to memory of 2516 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe ZRsAZHj.exe PID 2688 wrote to memory of 2516 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe ZRsAZHj.exe PID 2688 wrote to memory of 2516 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe ZRsAZHj.exe PID 2688 wrote to memory of 2916 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe ZUIXoGd.exe PID 2688 wrote to memory of 2916 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe ZUIXoGd.exe PID 2688 wrote to memory of 2916 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe ZUIXoGd.exe PID 2688 wrote to memory of 684 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe IhWNGYH.exe PID 2688 wrote to memory of 684 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe IhWNGYH.exe PID 2688 wrote to memory of 684 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe IhWNGYH.exe PID 2688 wrote to memory of 928 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe CKnymyt.exe PID 2688 wrote to memory of 928 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe CKnymyt.exe PID 2688 wrote to memory of 928 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe CKnymyt.exe PID 2688 wrote to memory of 1408 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe QwxDWZF.exe PID 2688 wrote to memory of 1408 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe QwxDWZF.exe PID 2688 wrote to memory of 1408 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe QwxDWZF.exe PID 2688 wrote to memory of 572 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe iAhZODC.exe PID 2688 wrote to memory of 572 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe iAhZODC.exe PID 2688 wrote to memory of 572 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe iAhZODC.exe PID 2688 wrote to memory of 2792 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe coqjVRp.exe PID 2688 wrote to memory of 2792 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe coqjVRp.exe PID 2688 wrote to memory of 2792 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe coqjVRp.exe PID 2688 wrote to memory of 2896 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe KHBWIwk.exe PID 2688 wrote to memory of 2896 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe KHBWIwk.exe PID 2688 wrote to memory of 2896 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe KHBWIwk.exe PID 2688 wrote to memory of 1824 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe BFSkCHo.exe PID 2688 wrote to memory of 1824 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe BFSkCHo.exe PID 2688 wrote to memory of 1824 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe BFSkCHo.exe PID 2688 wrote to memory of 1144 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe XwIjnht.exe PID 2688 wrote to memory of 1144 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe XwIjnht.exe PID 2688 wrote to memory of 1144 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe XwIjnht.exe PID 2688 wrote to memory of 1536 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe UiqmnRH.exe PID 2688 wrote to memory of 1536 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe UiqmnRH.exe PID 2688 wrote to memory of 1536 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe UiqmnRH.exe PID 2688 wrote to memory of 2724 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe LewtDzn.exe PID 2688 wrote to memory of 2724 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe LewtDzn.exe PID 2688 wrote to memory of 2724 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe LewtDzn.exe PID 2688 wrote to memory of 1004 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe OHgxLSo.exe PID 2688 wrote to memory of 1004 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe OHgxLSo.exe PID 2688 wrote to memory of 1004 2688 2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe OHgxLSo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-31_6f713228f63c1b6a5ca7cb7dabcab1e0_cobalt-strike_cobaltstrike.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\eRGYxJh.exeC:\Windows\System\eRGYxJh.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\VagtcXs.exeC:\Windows\System\VagtcXs.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\LXCILUA.exeC:\Windows\System\LXCILUA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\QBLfILm.exeC:\Windows\System\QBLfILm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\XDUbOfY.exeC:\Windows\System\XDUbOfY.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\yKgkKfC.exeC:\Windows\System\yKgkKfC.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\UyiNRsE.exeC:\Windows\System\UyiNRsE.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\cyAzPgT.exeC:\Windows\System\cyAzPgT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ZRsAZHj.exeC:\Windows\System\ZRsAZHj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ZUIXoGd.exeC:\Windows\System\ZUIXoGd.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\IhWNGYH.exeC:\Windows\System\IhWNGYH.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CKnymyt.exeC:\Windows\System\CKnymyt.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\QwxDWZF.exeC:\Windows\System\QwxDWZF.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\iAhZODC.exeC:\Windows\System\iAhZODC.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\coqjVRp.exeC:\Windows\System\coqjVRp.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\KHBWIwk.exeC:\Windows\System\KHBWIwk.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\BFSkCHo.exeC:\Windows\System\BFSkCHo.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\XwIjnht.exeC:\Windows\System\XwIjnht.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\UiqmnRH.exeC:\Windows\System\UiqmnRH.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\LewtDzn.exeC:\Windows\System\LewtDzn.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\OHgxLSo.exeC:\Windows\System\OHgxLSo.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\CKnymyt.exeFilesize
5.2MB
MD51618244ad88f57204327c5d3d52dedda
SHA1164525d83f9ee343464ae3787667643f212475fa
SHA25618af50a642a12060f0fc468ce195f883dc5c596ef3967a91cba6d25f525c1d5d
SHA512f8caca93f400f5520d4daa2a8a4a8f82f9096b691965971322eaa9a5e030a7a79a2dece19e807cd35a4e3ec5c6d470a6e1104c52722b2f28009e4ac431931f1f
-
C:\Windows\system\LXCILUA.exeFilesize
5.2MB
MD575af0826411dbd793787e4c79b6ff83c
SHA1aa414abf1e01dda67dce706b14d73c771705fb14
SHA256b70dbbac37ab211630d96cb4d5d3d8be63bb2b20637b3994eb6da8a506894317
SHA51296d078599eb06e5b6910460381fd4467a1df6d5c1804c6db795c7364475ba6b13537b2bc72761ee98f6488e0c2ecb4ad7e1488b66043275baee7e6351b74e1c7
-
C:\Windows\system\QBLfILm.exeFilesize
5.2MB
MD5d5ad60e008a78576bacc3f5aad851342
SHA16cf7e4945812a0d9d2a205144da073df3057acbb
SHA2562ef13829b57503325f4ce339c2f3d9433a37c17e61c3a8efba5e1a23f06082b1
SHA512609cf19868d6ca7fb486aab2125da3c5c3c8b3a7778ea28ff6d262386e8b188e23e351b0abf0b39b1a05357d4256ae26a7d1bb2919bd7e314165374de71a0dbe
-
C:\Windows\system\XDUbOfY.exeFilesize
5.2MB
MD5e5f411b4eba5780a8a5267cd4302fccf
SHA18ac319073f29e486574f7a3b2011e93bc9162d19
SHA2568e700bd158cb2518101d3849b42c890f2c101fc1561bc3a5be97b2a15e470752
SHA5121567cde15390a2b9d7913adf3cadaba185ad6e813a0fa05ff3c3e2c8dbbfa4d869b9d1c86cbebeb4b28bf43437924370686a8066d3c9849f700a15ad7721e289
-
C:\Windows\system\iAhZODC.exeFilesize
5.2MB
MD5e9c2fac9adf810fbbbebe264ae51bbfd
SHA10ff2168d7f81111a68445ded43b5135f1c56346b
SHA2563b069aa4dfa311013eef09a4b67c10e44c776d2c79ae8ba252b862cc797234df
SHA51255338bcfdaed5d4874ebd489f272009a6bbf46495e2fa2b4f18c42f4ac04aa442b45eeb0e737c485535131441dd19a4d9732ceb0587ccab71bf5fe53951cf7a3
-
\Windows\system\BFSkCHo.exeFilesize
5.2MB
MD51ee05699cbbac1beb8c1c7db8dbfcca9
SHA17075f170f2c6f5995f31529f699f30fba20a535d
SHA256916715baaec319e549f8e96c0d771a23379e944672b6723d2e0380686ebbe28e
SHA512bca09ecd49a5c7fb8089c5378647933f4282ec1d9f5df1049ae9834f174dd3a4f9ff927d54a393240c1001073d74af6ec52906c70c04ed1155cb7d36b993d730
-
\Windows\system\IhWNGYH.exeFilesize
5.2MB
MD5bbebd29b3a4ffb7f95fe248f85c007bb
SHA1ba804225d1abdfdd00af861de81f3cc13c173b2b
SHA25664224d3232cd136f77f43d067fe002c6e9d210bba41499079ad17fd429cf31ed
SHA512e24ad2b0a0da3f2e9ff90f5a33476c3449dafbfd865b9b2b7a3cddd888940e65b465826ded181fb934417458dac4b426a8271695acf9f34f63c2a1a727f479fe
-
\Windows\system\KHBWIwk.exeFilesize
5.2MB
MD582b18379b9573b96fa8805a631c3ef87
SHA1d7e6ded02089a7bf396e7cd9564d964c00d4b22d
SHA256c2da5787169ec5d1214ec99c574bd7b9f80cc2a47f177a0389969a871285f383
SHA512dcd0365fb80748b1ab4d8d423db130a6696f368db0afecd9d5ed49d7c8568894fea0503c538d23ca7cdbbf41502d0a424ad8ff4ce2707be8aead15f6ac307f40
-
\Windows\system\LewtDzn.exeFilesize
5.2MB
MD5064faf83df23bcaa9c4059489015851d
SHA1445ca2694898a619538f678bd2238a21969c8f3f
SHA256f14938ba1fc0b4b79c6dc008f3d9d4f28e9071a2217dd0e80d1b492a2ba678d5
SHA5121ca2bd7fe23eb182c365e677004a09d04c7aaf816c05ceb15adf0d59d2a86a3ae7144cada95cb004c15f379641e3a22ac481d9ff8a95b371f7c192933a04fb4f
-
\Windows\system\OHgxLSo.exeFilesize
5.2MB
MD579f86ba7c2aef730e5cbb221e50e785f
SHA1a4abede69fb1d4e6656da3e38588b6b660081ad6
SHA2563a07ecf4716b192b71dc1bba04d6c44a115d21bd668e065a3f22cd0d3676928c
SHA512d6641377ee8a09d4dbea5ef1d932f4bb3dd3551379c5692310f1198df6fdd997ddd2a1dc981841c3be92b9cef24f6ecaf6a36d0422a14ee16e9b8f2ec6075fda
-
\Windows\system\QwxDWZF.exeFilesize
5.2MB
MD52d435020c46e0e17ea89d4760335f0d1
SHA1fdfe5bc9fd4feed5a777828eb0e821a926d8d7ba
SHA256a2f7b8c393c495a629ed4223cb16829d212449ca67a553d858db730a288e5cc8
SHA512362cc51dad894832fc4161cff53ea5ca1a0930d769c9791a139637301b95bb4b5248d90cc0856ee693ce857c726bf8656dd0bc2b8d938dff133d714e54f7bfa0
-
\Windows\system\UiqmnRH.exeFilesize
5.2MB
MD57ecefd888bc5849bb7142be14947c30f
SHA14c5791ac14c197c8f8788f29d3d160a3f3360308
SHA2568e3e0c9a96f11c4c074abdcbb80e0d01ef8823b0927e2cff9cd1e04570fc8871
SHA5121efe5cb16694a376afabee6aee6c787b6b8e83d430ee164361249ddc72dbff66a2f3323b6135fd4c1b911da1d19db0e1a883006eefabb82d7635a05a61eaf8c0
-
\Windows\system\UyiNRsE.exeFilesize
5.2MB
MD5bbdd0bf330af8c2b9c08e885f249be29
SHA1f61fc3a3bdcbd23032dc29595539f70f8afefe97
SHA2569311094bc8131fee98e62b69013c7d839ea87b259a431572303d74cef93fccbe
SHA512b177eafc124653f95ea53b0a8093cfa619ec34f72a5da6f4f07edd04a77fbd514af40e34fb5556e16d03aa90032686fd5f3f64bd563dc71287f8694516677b9e
-
\Windows\system\VagtcXs.exeFilesize
5.2MB
MD5d4873ca04e1db6e1971bf882896e1138
SHA1172249bb94cada504bd2225681c873fb82a8714f
SHA256c855ec793dadc571990d22e1e7b23359d497489ee3b7e31b4a8597b774aaeaaa
SHA5123869ed3fac455a14c4566f083bd103eb8375449376a945cc4bbbb960e89e14f2f18c85aa1b15b0de76b078e21956b0375c20708ff626d741b86134055359fe24
-
\Windows\system\XwIjnht.exeFilesize
5.2MB
MD556a2fdc7dc01965b4076c63475bff0ca
SHA102a2d855929659df42079b9158a4934bac0ce503
SHA2562ffb287dc4df586e2841d7c0384d502b6e24b56afc3af2eebac88a73b729fafb
SHA512ab460990a2296b7007e7c267e316fe7bbbd1f6bc4e6a2882828ba81a0425e7448ec362091c578b7c67db9426f8ed47f4f3fc2248e5dfbe439c8cff636c0233fc
-
\Windows\system\ZRsAZHj.exeFilesize
5.2MB
MD584fbeefed4c498ea7abad18a8e4c3eaf
SHA1419f625589d7315517ed5532559e279ca2aa5b64
SHA2568fdae35ee6361ce6095c7f8cd803d5575c7e720c61b7f91b96f5d524beb57824
SHA512f7682bf06def740c7a82c11f94139368bfc88ee1d180cb06d407a691118b56eb9bc70ad73c747adb65ff2bab8aabd142b2b9887bdf083b1d1e111cfe791d5150
-
\Windows\system\ZUIXoGd.exeFilesize
5.2MB
MD53203724d1aad8f5566a1d69764e5cb08
SHA19ba75d466ce1b9ad13a192c1e4d166f1b8903b0c
SHA2560a71e65df791094537bd2027729cd29691174375b21bb24f4990d2f04a53d546
SHA51212ec334bd6eee7aa14fbdfc83a151134764b78dcacc338673aacba624f7cb9799e5a07b95c4ac68b08001dc7a251771a424fffe0b32e71fa55a9d5914fb03436
-
\Windows\system\coqjVRp.exeFilesize
5.2MB
MD5ac69dfa4bcfb51046e23be962e07c2f8
SHA1773b37293f8a2567828f2b6dfdcd77a1073cabf2
SHA256f20b360ac7c956f9aa6cc54506f9c96b38d86beec7bb20c9592098db4c502a2b
SHA51242cbeccf3ee4793d756a2cf20e33ded376decceeed289fd76d8b96d55059d5dcff8c860c948592fa451b66cce855486bb821d3226631267264105e16497d129d
-
\Windows\system\cyAzPgT.exeFilesize
5.2MB
MD5fad1d958eb506cb5e80cfb9a0f3a0b56
SHA162ec71396229d35fc43000d1049dd0b894577bd1
SHA256753e5421d2f847fa96a291d548deedc55ed83c39dd651910af9fb78e25b19752
SHA512e46c6c74cd3a5433df15816b52e12cc164582bf0c9649e5244aeb5205cdc9732328c4d06b1edc7e7cd9aa1d056e27460971c0eeffe9f9aa278742e043ef2eebe
-
\Windows\system\eRGYxJh.exeFilesize
5.2MB
MD54ccddd2cf9e98dbad0f698390c7a4b87
SHA1d17194e6cb4c544c3f1b4edf9a5dabc81273db41
SHA2566a58f56a1ac9ef8cd9bbad2cf650d9c8960627a31189491d878a73008b01d073
SHA51226141b00f3c95088dcb896ff8138827b75f45cb97489c278a29f56c239ef25a101cd771b83a30823abce5ea9b4c59ac9f83b04e87496cfc294a71a32abc9907e
-
\Windows\system\yKgkKfC.exeFilesize
5.2MB
MD59c920733da838a1dce52aca9defc3a64
SHA10782416d2fb1085593d26a3c1af08d9bbdc78c61
SHA2562ca62baa3d625c34c5064cf93ee07d778c8d4dc511d6b1724785fb8b824406b0
SHA512a3a9357c00f68c92421b64277daba33a479b7da7a4f816e0d33e5325d5d09ec8dae737bceca3df783d1ace9102340976bad9f0e73d78b246ca875a059f32d624
-
memory/572-102-0x000000013F810000-0x000000013FB61000-memory.dmpFilesize
3.3MB
-
memory/572-231-0x000000013F810000-0x000000013FB61000-memory.dmpFilesize
3.3MB
-
memory/684-108-0x000000013F120000-0x000000013F471000-memory.dmpFilesize
3.3MB
-
memory/684-151-0x000000013F120000-0x000000013F471000-memory.dmpFilesize
3.3MB
-
memory/684-243-0x000000013F120000-0x000000013F471000-memory.dmpFilesize
3.3MB
-
memory/928-101-0x000000013F620000-0x000000013F971000-memory.dmpFilesize
3.3MB
-
memory/928-229-0x000000013F620000-0x000000013F971000-memory.dmpFilesize
3.3MB
-
memory/1004-159-0x000000013F1C0000-0x000000013F511000-memory.dmpFilesize
3.3MB
-
memory/1004-259-0x000000013F1C0000-0x000000013F511000-memory.dmpFilesize
3.3MB
-
memory/1144-127-0x000000013FC10000-0x000000013FF61000-memory.dmpFilesize
3.3MB
-
memory/1144-170-0x000000013FC10000-0x000000013FF61000-memory.dmpFilesize
3.3MB
-
memory/1144-248-0x000000013FC10000-0x000000013FF61000-memory.dmpFilesize
3.3MB
-
memory/1408-153-0x000000013FF40000-0x0000000140291000-memory.dmpFilesize
3.3MB
-
memory/1408-107-0x000000013FF40000-0x0000000140291000-memory.dmpFilesize
3.3MB
-
memory/1408-245-0x000000013FF40000-0x0000000140291000-memory.dmpFilesize
3.3MB
-
memory/1536-147-0x000000013F950000-0x000000013FCA1000-memory.dmpFilesize
3.3MB
-
memory/1536-171-0x000000013F950000-0x000000013FCA1000-memory.dmpFilesize
3.3MB
-
memory/1536-255-0x000000013F950000-0x000000013FCA1000-memory.dmpFilesize
3.3MB
-
memory/1824-144-0x000000013FB50000-0x000000013FEA1000-memory.dmpFilesize
3.3MB
-
memory/1824-169-0x000000013FB50000-0x000000013FEA1000-memory.dmpFilesize
3.3MB
-
memory/1824-253-0x000000013FB50000-0x000000013FEA1000-memory.dmpFilesize
3.3MB
-
memory/2272-206-0x000000013FBB0000-0x000000013FF01000-memory.dmpFilesize
3.3MB
-
memory/2272-50-0x000000013FBB0000-0x000000013FF01000-memory.dmpFilesize
3.3MB
-
memory/2464-204-0x000000013FC10000-0x000000013FF61000-memory.dmpFilesize
3.3MB
-
memory/2464-47-0x000000013FC10000-0x000000013FF61000-memory.dmpFilesize
3.3MB
-
memory/2516-100-0x000000013FB70000-0x000000013FEC1000-memory.dmpFilesize
3.3MB
-
memory/2516-234-0x000000013FB70000-0x000000013FEC1000-memory.dmpFilesize
3.3MB
-
memory/2548-105-0x000000013FDF0000-0x0000000140141000-memory.dmpFilesize
3.3MB
-
memory/2548-226-0x000000013FDF0000-0x0000000140141000-memory.dmpFilesize
3.3MB
-
memory/2548-44-0x000000013FDF0000-0x0000000140141000-memory.dmpFilesize
3.3MB
-
memory/2576-99-0x000000013FEB0000-0x0000000140201000-memory.dmpFilesize
3.3MB
-
memory/2584-9-0x000000013FF40000-0x0000000140291000-memory.dmpFilesize
3.3MB
-
memory/2584-97-0x000000013FF40000-0x0000000140291000-memory.dmpFilesize
3.3MB
-
memory/2584-198-0x000000013FF40000-0x0000000140291000-memory.dmpFilesize
3.3MB
-
memory/2600-98-0x000000013FA00000-0x000000013FD51000-memory.dmpFilesize
3.3MB
-
memory/2660-19-0x000000013FED0000-0x0000000140221000-memory.dmpFilesize
3.3MB
-
memory/2660-200-0x000000013FED0000-0x0000000140221000-memory.dmpFilesize
3.3MB
-
memory/2688-51-0x000000013FDF0000-0x0000000140141000-memory.dmpFilesize
3.3MB
-
memory/2688-1-0x00000000002F0000-0x0000000000300000-memory.dmpFilesize
64KB
-
memory/2688-149-0x000000013F400000-0x000000013F751000-memory.dmpFilesize
3.3MB
-
memory/2688-143-0x000000013FF40000-0x0000000140291000-memory.dmpFilesize
3.3MB
-
memory/2688-158-0x000000013FED0000-0x0000000140221000-memory.dmpFilesize
3.3MB
-
memory/2688-15-0x000000013FED0000-0x0000000140221000-memory.dmpFilesize
3.3MB
-
memory/2688-48-0x000000013FEB0000-0x0000000140201000-memory.dmpFilesize
3.3MB
-
memory/2688-0-0x000000013F400000-0x000000013F751000-memory.dmpFilesize
3.3MB
-
memory/2688-53-0x000000013FA90000-0x000000013FDE1000-memory.dmpFilesize
3.3MB
-
memory/2688-177-0x000000013F400000-0x000000013F751000-memory.dmpFilesize
3.3MB
-
memory/2688-196-0x00000000022B0000-0x0000000002601000-memory.dmpFilesize
3.3MB
-
memory/2688-6-0x000000013FF40000-0x0000000140291000-memory.dmpFilesize
3.3MB
-
memory/2688-140-0x000000013F950000-0x000000013FCA1000-memory.dmpFilesize
3.3MB
-
memory/2688-46-0x000000013FC10000-0x000000013FF61000-memory.dmpFilesize
3.3MB
-
memory/2688-141-0x00000000022B0000-0x0000000002601000-memory.dmpFilesize
3.3MB
-
memory/2688-45-0x000000013FA00000-0x000000013FD51000-memory.dmpFilesize
3.3MB
-
memory/2688-96-0x000000013F400000-0x000000013F751000-memory.dmpFilesize
3.3MB
-
memory/2688-49-0x000000013FBB0000-0x000000013FF01000-memory.dmpFilesize
3.3MB
-
memory/2688-124-0x000000013FB50000-0x000000013FEA1000-memory.dmpFilesize
3.3MB
-
memory/2724-251-0x000000013F500000-0x000000013F851000-memory.dmpFilesize
3.3MB
-
memory/2724-142-0x000000013F500000-0x000000013F851000-memory.dmpFilesize
3.3MB
-
memory/2728-202-0x000000013FA90000-0x000000013FDE1000-memory.dmpFilesize
3.3MB
-
memory/2728-43-0x000000013FA90000-0x000000013FDE1000-memory.dmpFilesize
3.3MB
-
memory/2792-155-0x000000013FD50000-0x00000001400A1000-memory.dmpFilesize
3.3MB
-
memory/2792-249-0x000000013FD50000-0x00000001400A1000-memory.dmpFilesize
3.3MB
-
memory/2792-117-0x000000013FD50000-0x00000001400A1000-memory.dmpFilesize
3.3MB
-
memory/2896-235-0x000000013F920000-0x000000013FC71000-memory.dmpFilesize
3.3MB
-
memory/2896-103-0x000000013F920000-0x000000013FC71000-memory.dmpFilesize
3.3MB
-
memory/2916-77-0x000000013F1F0000-0x000000013F541000-memory.dmpFilesize
3.3MB
-
memory/2916-227-0x000000013F1F0000-0x000000013F541000-memory.dmpFilesize
3.3MB