Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 21:47
Behavioral task
behavioral1
Sample
2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe
Resource
win7-20240221-en
General
-
Target
2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe
-
Size
5.2MB
-
MD5
42976fedf39030e8ea9b51a1d58f181d
-
SHA1
3909150b46103bd3201a4e5f1f17dc8c1bea2e7b
-
SHA256
83f98c9b7429b9cb96110499ae4685051a5e2dd61da882b6bf47f555cc4cb4d2
-
SHA512
9c60ed65fafcbc939e4fea6ad9faf2214828b47d57bca1f73862162ad47abad53393eb6009c9c75b8a68d49a8ba734e987b479ed03db279e7aa114d7a4fe6c78
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6la:RWWBibf56utgpPFotBER/mQ32lU+
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule C:\Windows\system\cRMtpMq.exe cobalt_reflective_dll \Windows\system\aKsQtXB.exe cobalt_reflective_dll C:\Windows\system\gbRRwdf.exe cobalt_reflective_dll C:\Windows\system\rnMNaZE.exe cobalt_reflective_dll C:\Windows\system\WaWaftJ.exe cobalt_reflective_dll C:\Windows\system\tPoStFr.exe cobalt_reflective_dll C:\Windows\system\qfGuFPY.exe cobalt_reflective_dll C:\Windows\system\tmDBLGn.exe cobalt_reflective_dll C:\Windows\system\aWjHRXm.exe cobalt_reflective_dll C:\Windows\system\qXZbdki.exe cobalt_reflective_dll C:\Windows\system\mHFUQTE.exe cobalt_reflective_dll \Windows\system\IYNDkjL.exe cobalt_reflective_dll C:\Windows\system\MOPtmZt.exe cobalt_reflective_dll C:\Windows\system\iDkKMLY.exe cobalt_reflective_dll C:\Windows\system\FoDjMbl.exe cobalt_reflective_dll C:\Windows\system\GVwCFmM.exe cobalt_reflective_dll C:\Windows\system\JDlJsDR.exe cobalt_reflective_dll C:\Windows\system\TramaWs.exe cobalt_reflective_dll C:\Windows\system\HENEHtU.exe cobalt_reflective_dll C:\Windows\system\XYvEdYw.exe cobalt_reflective_dll C:\Windows\system\xjAwGKy.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule C:\Windows\system\cRMtpMq.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\aKsQtXB.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\gbRRwdf.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\rnMNaZE.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\WaWaftJ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\tPoStFr.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\qfGuFPY.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\tmDBLGn.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\aWjHRXm.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\qXZbdki.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\mHFUQTE.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\IYNDkjL.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\MOPtmZt.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\iDkKMLY.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\FoDjMbl.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\GVwCFmM.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\JDlJsDR.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\TramaWs.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\HENEHtU.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\XYvEdYw.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\xjAwGKy.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule behavioral1/memory/2536-144-0x000000013F840000-0x000000013FB91000-memory.dmp UPX C:\Windows\system\cRMtpMq.exe UPX \Windows\system\aKsQtXB.exe UPX behavioral1/memory/2996-141-0x000000013FA50000-0x000000013FDA1000-memory.dmp UPX behavioral1/memory/2504-138-0x000000013F0B0000-0x000000013F401000-memory.dmp UPX behavioral1/memory/324-137-0x000000013FE30000-0x0000000140181000-memory.dmp UPX behavioral1/memory/2524-135-0x000000013FA90000-0x000000013FDE1000-memory.dmp UPX behavioral1/memory/2656-134-0x000000013F030000-0x000000013F381000-memory.dmp UPX behavioral1/memory/2992-132-0x000000013F710000-0x000000013FA61000-memory.dmp UPX behavioral1/memory/2448-131-0x000000013F520000-0x000000013F871000-memory.dmp UPX behavioral1/memory/836-130-0x000000013FE30000-0x0000000140181000-memory.dmp UPX behavioral1/memory/2744-129-0x000000013F430000-0x000000013F781000-memory.dmp UPX behavioral1/memory/2860-128-0x000000013F8E0000-0x000000013FC31000-memory.dmp UPX behavioral1/memory/2788-126-0x000000013F1F0000-0x000000013F541000-memory.dmp UPX behavioral1/memory/2180-145-0x000000013FD70000-0x00000001400C1000-memory.dmp UPX behavioral1/memory/2568-125-0x000000013F640000-0x000000013F991000-memory.dmp UPX behavioral1/memory/2564-122-0x000000013FCE0000-0x0000000140031000-memory.dmp UPX behavioral1/memory/1008-121-0x000000013FDA0000-0x00000001400F1000-memory.dmp UPX behavioral1/memory/1872-120-0x000000013FB30000-0x000000013FE81000-memory.dmp UPX behavioral1/memory/2692-119-0x000000013F7E0000-0x000000013FB31000-memory.dmp UPX behavioral1/memory/2088-118-0x000000013FAB0000-0x000000013FE01000-memory.dmp UPX behavioral1/memory/2800-117-0x000000013FB60000-0x000000013FEB1000-memory.dmp UPX behavioral1/memory/2524-163-0x000000013FA90000-0x000000013FDE1000-memory.dmp UPX behavioral1/memory/2656-161-0x000000013F030000-0x000000013F381000-memory.dmp UPX behavioral1/memory/2992-159-0x000000013F710000-0x000000013FA61000-memory.dmp UPX behavioral1/memory/836-157-0x000000013FE30000-0x0000000140181000-memory.dmp UPX behavioral1/memory/2744-155-0x000000013F430000-0x000000013F781000-memory.dmp UPX behavioral1/memory/2860-153-0x000000013F8E0000-0x000000013FC31000-memory.dmp UPX behavioral1/memory/2736-148-0x000000013FC60000-0x000000013FFB1000-memory.dmp UPX behavioral1/memory/1716-108-0x000000013F0D0000-0x000000013F421000-memory.dmp UPX C:\Windows\system\gbRRwdf.exe UPX C:\Windows\system\rnMNaZE.exe UPX C:\Windows\system\WaWaftJ.exe UPX C:\Windows\system\tPoStFr.exe UPX C:\Windows\system\qfGuFPY.exe UPX C:\Windows\system\tmDBLGn.exe UPX C:\Windows\system\aWjHRXm.exe UPX C:\Windows\system\qXZbdki.exe UPX C:\Windows\system\mHFUQTE.exe UPX \Windows\system\IYNDkjL.exe UPX behavioral1/memory/2736-64-0x000000013FC60000-0x000000013FFB1000-memory.dmp UPX C:\Windows\system\MOPtmZt.exe UPX C:\Windows\system\iDkKMLY.exe UPX C:\Windows\system\FoDjMbl.exe UPX C:\Windows\system\GVwCFmM.exe UPX C:\Windows\system\JDlJsDR.exe UPX C:\Windows\system\TramaWs.exe UPX C:\Windows\system\HENEHtU.exe UPX C:\Windows\system\XYvEdYw.exe UPX C:\Windows\system\xjAwGKy.exe UPX behavioral1/memory/2180-0-0x000000013FD70000-0x00000001400C1000-memory.dmp UPX behavioral1/memory/2180-167-0x000000013FD70000-0x00000001400C1000-memory.dmp UPX behavioral1/memory/2180-189-0x000000013FD70000-0x00000001400C1000-memory.dmp UPX behavioral1/memory/324-213-0x000000013FE30000-0x0000000140181000-memory.dmp UPX behavioral1/memory/2504-224-0x000000013F0B0000-0x000000013F401000-memory.dmp UPX behavioral1/memory/1716-223-0x000000013F0D0000-0x000000013F421000-memory.dmp UPX behavioral1/memory/2736-240-0x000000013FC60000-0x000000013FFB1000-memory.dmp UPX behavioral1/memory/1872-244-0x000000013FB30000-0x000000013FE81000-memory.dmp UPX behavioral1/memory/2088-243-0x000000013FAB0000-0x000000013FE01000-memory.dmp UPX behavioral1/memory/2800-258-0x000000013FB60000-0x000000013FEB1000-memory.dmp UPX behavioral1/memory/2692-257-0x000000013F7E0000-0x000000013FB31000-memory.dmp UPX behavioral1/memory/2788-256-0x000000013F1F0000-0x000000013F541000-memory.dmp UPX behavioral1/memory/1008-255-0x000000013FDA0000-0x00000001400F1000-memory.dmp UPX behavioral1/memory/2564-252-0x000000013FCE0000-0x0000000140031000-memory.dmp UPX -
XMRig Miner payload 52 IoCs
Processes:
resource yara_rule behavioral1/memory/2536-144-0x000000013F840000-0x000000013FB91000-memory.dmp xmrig behavioral1/memory/2996-141-0x000000013FA50000-0x000000013FDA1000-memory.dmp xmrig behavioral1/memory/2504-138-0x000000013F0B0000-0x000000013F401000-memory.dmp xmrig behavioral1/memory/324-137-0x000000013FE30000-0x0000000140181000-memory.dmp xmrig behavioral1/memory/2524-135-0x000000013FA90000-0x000000013FDE1000-memory.dmp xmrig behavioral1/memory/2656-134-0x000000013F030000-0x000000013F381000-memory.dmp xmrig behavioral1/memory/2992-132-0x000000013F710000-0x000000013FA61000-memory.dmp xmrig behavioral1/memory/2448-131-0x000000013F520000-0x000000013F871000-memory.dmp xmrig behavioral1/memory/836-130-0x000000013FE30000-0x0000000140181000-memory.dmp xmrig behavioral1/memory/2744-129-0x000000013F430000-0x000000013F781000-memory.dmp xmrig behavioral1/memory/2860-128-0x000000013F8E0000-0x000000013FC31000-memory.dmp xmrig behavioral1/memory/2788-126-0x000000013F1F0000-0x000000013F541000-memory.dmp xmrig behavioral1/memory/2180-145-0x000000013FD70000-0x00000001400C1000-memory.dmp xmrig behavioral1/memory/2568-125-0x000000013F640000-0x000000013F991000-memory.dmp xmrig behavioral1/memory/2564-122-0x000000013FCE0000-0x0000000140031000-memory.dmp xmrig behavioral1/memory/1008-121-0x000000013FDA0000-0x00000001400F1000-memory.dmp xmrig behavioral1/memory/1872-120-0x000000013FB30000-0x000000013FE81000-memory.dmp xmrig behavioral1/memory/2692-119-0x000000013F7E0000-0x000000013FB31000-memory.dmp xmrig behavioral1/memory/2088-118-0x000000013FAB0000-0x000000013FE01000-memory.dmp xmrig behavioral1/memory/2800-117-0x000000013FB60000-0x000000013FEB1000-memory.dmp xmrig behavioral1/memory/2524-163-0x000000013FA90000-0x000000013FDE1000-memory.dmp xmrig behavioral1/memory/2656-161-0x000000013F030000-0x000000013F381000-memory.dmp xmrig behavioral1/memory/2992-159-0x000000013F710000-0x000000013FA61000-memory.dmp xmrig behavioral1/memory/836-157-0x000000013FE30000-0x0000000140181000-memory.dmp xmrig behavioral1/memory/2744-155-0x000000013F430000-0x000000013F781000-memory.dmp xmrig behavioral1/memory/2860-153-0x000000013F8E0000-0x000000013FC31000-memory.dmp xmrig behavioral1/memory/2736-148-0x000000013FC60000-0x000000013FFB1000-memory.dmp xmrig behavioral1/memory/1716-108-0x000000013F0D0000-0x000000013F421000-memory.dmp xmrig behavioral1/memory/2736-64-0x000000013FC60000-0x000000013FFB1000-memory.dmp xmrig behavioral1/memory/2180-167-0x000000013FD70000-0x00000001400C1000-memory.dmp xmrig behavioral1/memory/2180-189-0x000000013FD70000-0x00000001400C1000-memory.dmp xmrig behavioral1/memory/324-213-0x000000013FE30000-0x0000000140181000-memory.dmp xmrig behavioral1/memory/2504-224-0x000000013F0B0000-0x000000013F401000-memory.dmp xmrig behavioral1/memory/1716-223-0x000000013F0D0000-0x000000013F421000-memory.dmp xmrig behavioral1/memory/2736-240-0x000000013FC60000-0x000000013FFB1000-memory.dmp xmrig behavioral1/memory/1872-244-0x000000013FB30000-0x000000013FE81000-memory.dmp xmrig behavioral1/memory/2088-243-0x000000013FAB0000-0x000000013FE01000-memory.dmp xmrig behavioral1/memory/2800-258-0x000000013FB60000-0x000000013FEB1000-memory.dmp xmrig behavioral1/memory/2692-257-0x000000013F7E0000-0x000000013FB31000-memory.dmp xmrig behavioral1/memory/2788-256-0x000000013F1F0000-0x000000013F541000-memory.dmp xmrig behavioral1/memory/1008-255-0x000000013FDA0000-0x00000001400F1000-memory.dmp xmrig behavioral1/memory/2564-252-0x000000013FCE0000-0x0000000140031000-memory.dmp xmrig behavioral1/memory/2448-251-0x000000013F520000-0x000000013F871000-memory.dmp xmrig behavioral1/memory/2568-249-0x000000013F640000-0x000000013F991000-memory.dmp xmrig behavioral1/memory/2996-260-0x000000013FA50000-0x000000013FDA1000-memory.dmp xmrig behavioral1/memory/2744-265-0x000000013F430000-0x000000013F781000-memory.dmp xmrig behavioral1/memory/2860-262-0x000000013F8E0000-0x000000013FC31000-memory.dmp xmrig behavioral1/memory/2992-272-0x000000013F710000-0x000000013FA61000-memory.dmp xmrig behavioral1/memory/2656-270-0x000000013F030000-0x000000013F381000-memory.dmp xmrig behavioral1/memory/836-271-0x000000013FE30000-0x0000000140181000-memory.dmp xmrig behavioral1/memory/2524-274-0x000000013FA90000-0x000000013FDE1000-memory.dmp xmrig behavioral1/memory/2536-273-0x000000013F840000-0x000000013FB91000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
xjAwGKy.exeXYvEdYw.exeGVwCFmM.exeHENEHtU.exeTramaWs.exeJDlJsDR.exeFoDjMbl.exeiDkKMLY.exeIYNDkjL.exeMOPtmZt.exeqfGuFPY.exetPoStFr.exemHFUQTE.exeqXZbdki.exeaWjHRXm.exetmDBLGn.exeWaWaftJ.exernMNaZE.execRMtpMq.exegbRRwdf.exeaKsQtXB.exepid process 324 xjAwGKy.exe 2504 XYvEdYw.exe 2736 GVwCFmM.exe 1716 HENEHtU.exe 2800 TramaWs.exe 2088 JDlJsDR.exe 2692 FoDjMbl.exe 1872 iDkKMLY.exe 1008 IYNDkjL.exe 2564 MOPtmZt.exe 2568 qfGuFPY.exe 2788 tPoStFr.exe 2860 mHFUQTE.exe 2744 qXZbdki.exe 836 aWjHRXm.exe 2448 tmDBLGn.exe 2992 WaWaftJ.exe 2656 rnMNaZE.exe 2524 cRMtpMq.exe 2996 gbRRwdf.exe 2536 aKsQtXB.exe -
Loads dropped DLL 21 IoCs
Processes:
2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exepid process 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe -
Processes:
resource yara_rule behavioral1/memory/2536-144-0x000000013F840000-0x000000013FB91000-memory.dmp upx C:\Windows\system\cRMtpMq.exe upx \Windows\system\aKsQtXB.exe upx behavioral1/memory/2996-141-0x000000013FA50000-0x000000013FDA1000-memory.dmp upx behavioral1/memory/2504-138-0x000000013F0B0000-0x000000013F401000-memory.dmp upx behavioral1/memory/324-137-0x000000013FE30000-0x0000000140181000-memory.dmp upx behavioral1/memory/2524-135-0x000000013FA90000-0x000000013FDE1000-memory.dmp upx behavioral1/memory/2656-134-0x000000013F030000-0x000000013F381000-memory.dmp upx behavioral1/memory/2992-132-0x000000013F710000-0x000000013FA61000-memory.dmp upx behavioral1/memory/2448-131-0x000000013F520000-0x000000013F871000-memory.dmp upx behavioral1/memory/836-130-0x000000013FE30000-0x0000000140181000-memory.dmp upx behavioral1/memory/2744-129-0x000000013F430000-0x000000013F781000-memory.dmp upx behavioral1/memory/2860-128-0x000000013F8E0000-0x000000013FC31000-memory.dmp upx behavioral1/memory/2788-126-0x000000013F1F0000-0x000000013F541000-memory.dmp upx behavioral1/memory/2180-145-0x000000013FD70000-0x00000001400C1000-memory.dmp upx behavioral1/memory/2568-125-0x000000013F640000-0x000000013F991000-memory.dmp upx behavioral1/memory/2564-122-0x000000013FCE0000-0x0000000140031000-memory.dmp upx behavioral1/memory/1008-121-0x000000013FDA0000-0x00000001400F1000-memory.dmp upx behavioral1/memory/1872-120-0x000000013FB30000-0x000000013FE81000-memory.dmp upx behavioral1/memory/2692-119-0x000000013F7E0000-0x000000013FB31000-memory.dmp upx behavioral1/memory/2088-118-0x000000013FAB0000-0x000000013FE01000-memory.dmp upx behavioral1/memory/2800-117-0x000000013FB60000-0x000000013FEB1000-memory.dmp upx behavioral1/memory/2524-163-0x000000013FA90000-0x000000013FDE1000-memory.dmp upx behavioral1/memory/2656-161-0x000000013F030000-0x000000013F381000-memory.dmp upx behavioral1/memory/2992-159-0x000000013F710000-0x000000013FA61000-memory.dmp upx behavioral1/memory/836-157-0x000000013FE30000-0x0000000140181000-memory.dmp upx behavioral1/memory/2744-155-0x000000013F430000-0x000000013F781000-memory.dmp upx behavioral1/memory/2860-153-0x000000013F8E0000-0x000000013FC31000-memory.dmp upx behavioral1/memory/2736-148-0x000000013FC60000-0x000000013FFB1000-memory.dmp upx behavioral1/memory/1716-108-0x000000013F0D0000-0x000000013F421000-memory.dmp upx C:\Windows\system\gbRRwdf.exe upx C:\Windows\system\rnMNaZE.exe upx C:\Windows\system\WaWaftJ.exe upx C:\Windows\system\tPoStFr.exe upx C:\Windows\system\qfGuFPY.exe upx C:\Windows\system\tmDBLGn.exe upx C:\Windows\system\aWjHRXm.exe upx C:\Windows\system\qXZbdki.exe upx C:\Windows\system\mHFUQTE.exe upx \Windows\system\IYNDkjL.exe upx behavioral1/memory/2736-64-0x000000013FC60000-0x000000013FFB1000-memory.dmp upx C:\Windows\system\MOPtmZt.exe upx C:\Windows\system\iDkKMLY.exe upx C:\Windows\system\FoDjMbl.exe upx C:\Windows\system\GVwCFmM.exe upx C:\Windows\system\JDlJsDR.exe upx C:\Windows\system\TramaWs.exe upx C:\Windows\system\HENEHtU.exe upx C:\Windows\system\XYvEdYw.exe upx C:\Windows\system\xjAwGKy.exe upx behavioral1/memory/2180-0-0x000000013FD70000-0x00000001400C1000-memory.dmp upx behavioral1/memory/2180-167-0x000000013FD70000-0x00000001400C1000-memory.dmp upx behavioral1/memory/2180-189-0x000000013FD70000-0x00000001400C1000-memory.dmp upx behavioral1/memory/324-213-0x000000013FE30000-0x0000000140181000-memory.dmp upx behavioral1/memory/2504-224-0x000000013F0B0000-0x000000013F401000-memory.dmp upx behavioral1/memory/1716-223-0x000000013F0D0000-0x000000013F421000-memory.dmp upx behavioral1/memory/2736-240-0x000000013FC60000-0x000000013FFB1000-memory.dmp upx behavioral1/memory/1872-244-0x000000013FB30000-0x000000013FE81000-memory.dmp upx behavioral1/memory/2088-243-0x000000013FAB0000-0x000000013FE01000-memory.dmp upx behavioral1/memory/2800-258-0x000000013FB60000-0x000000013FEB1000-memory.dmp upx behavioral1/memory/2692-257-0x000000013F7E0000-0x000000013FB31000-memory.dmp upx behavioral1/memory/2788-256-0x000000013F1F0000-0x000000013F541000-memory.dmp upx behavioral1/memory/1008-255-0x000000013FDA0000-0x00000001400F1000-memory.dmp upx behavioral1/memory/2564-252-0x000000013FCE0000-0x0000000140031000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exedescription ioc process File created C:\Windows\System\XYvEdYw.exe 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\GVwCFmM.exe 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\tPoStFr.exe 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\WaWaftJ.exe 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\rnMNaZE.exe 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\xjAwGKy.exe 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\mHFUQTE.exe 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\JDlJsDR.exe 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\qXZbdki.exe 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\FoDjMbl.exe 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\aWjHRXm.exe 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\qfGuFPY.exe 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\gbRRwdf.exe 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\IYNDkjL.exe 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\HENEHtU.exe 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\iDkKMLY.exe 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\MOPtmZt.exe 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\cRMtpMq.exe 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\tmDBLGn.exe 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\TramaWs.exe 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\aKsQtXB.exe 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exedescription pid process Token: SeLockMemoryPrivilege 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe Token: SeLockMemoryPrivilege 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exedescription pid process target process PID 2180 wrote to memory of 324 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe xjAwGKy.exe PID 2180 wrote to memory of 324 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe xjAwGKy.exe PID 2180 wrote to memory of 324 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe xjAwGKy.exe PID 2180 wrote to memory of 2504 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe XYvEdYw.exe PID 2180 wrote to memory of 2504 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe XYvEdYw.exe PID 2180 wrote to memory of 2504 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe XYvEdYw.exe PID 2180 wrote to memory of 2736 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe GVwCFmM.exe PID 2180 wrote to memory of 2736 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe GVwCFmM.exe PID 2180 wrote to memory of 2736 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe GVwCFmM.exe PID 2180 wrote to memory of 1008 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe IYNDkjL.exe PID 2180 wrote to memory of 1008 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe IYNDkjL.exe PID 2180 wrote to memory of 1008 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe IYNDkjL.exe PID 2180 wrote to memory of 1716 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe HENEHtU.exe PID 2180 wrote to memory of 1716 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe HENEHtU.exe PID 2180 wrote to memory of 1716 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe HENEHtU.exe PID 2180 wrote to memory of 2788 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe tPoStFr.exe PID 2180 wrote to memory of 2788 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe tPoStFr.exe PID 2180 wrote to memory of 2788 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe tPoStFr.exe PID 2180 wrote to memory of 2800 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe TramaWs.exe PID 2180 wrote to memory of 2800 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe TramaWs.exe PID 2180 wrote to memory of 2800 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe TramaWs.exe PID 2180 wrote to memory of 2860 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe mHFUQTE.exe PID 2180 wrote to memory of 2860 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe mHFUQTE.exe PID 2180 wrote to memory of 2860 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe mHFUQTE.exe PID 2180 wrote to memory of 2088 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe JDlJsDR.exe PID 2180 wrote to memory of 2088 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe JDlJsDR.exe PID 2180 wrote to memory of 2088 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe JDlJsDR.exe PID 2180 wrote to memory of 2744 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe qXZbdki.exe PID 2180 wrote to memory of 2744 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe qXZbdki.exe PID 2180 wrote to memory of 2744 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe qXZbdki.exe PID 2180 wrote to memory of 2692 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe FoDjMbl.exe PID 2180 wrote to memory of 2692 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe FoDjMbl.exe PID 2180 wrote to memory of 2692 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe FoDjMbl.exe PID 2180 wrote to memory of 836 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe aWjHRXm.exe PID 2180 wrote to memory of 836 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe aWjHRXm.exe PID 2180 wrote to memory of 836 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe aWjHRXm.exe PID 2180 wrote to memory of 1872 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe iDkKMLY.exe PID 2180 wrote to memory of 1872 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe iDkKMLY.exe PID 2180 wrote to memory of 1872 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe iDkKMLY.exe PID 2180 wrote to memory of 2992 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe WaWaftJ.exe PID 2180 wrote to memory of 2992 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe WaWaftJ.exe PID 2180 wrote to memory of 2992 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe WaWaftJ.exe PID 2180 wrote to memory of 2564 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe MOPtmZt.exe PID 2180 wrote to memory of 2564 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe MOPtmZt.exe PID 2180 wrote to memory of 2564 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe MOPtmZt.exe PID 2180 wrote to memory of 2656 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe rnMNaZE.exe PID 2180 wrote to memory of 2656 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe rnMNaZE.exe PID 2180 wrote to memory of 2656 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe rnMNaZE.exe PID 2180 wrote to memory of 2568 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe qfGuFPY.exe PID 2180 wrote to memory of 2568 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe qfGuFPY.exe PID 2180 wrote to memory of 2568 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe qfGuFPY.exe PID 2180 wrote to memory of 2524 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe cRMtpMq.exe PID 2180 wrote to memory of 2524 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe cRMtpMq.exe PID 2180 wrote to memory of 2524 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe cRMtpMq.exe PID 2180 wrote to memory of 2448 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe tmDBLGn.exe PID 2180 wrote to memory of 2448 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe tmDBLGn.exe PID 2180 wrote to memory of 2448 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe tmDBLGn.exe PID 2180 wrote to memory of 2536 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe aKsQtXB.exe PID 2180 wrote to memory of 2536 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe aKsQtXB.exe PID 2180 wrote to memory of 2536 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe aKsQtXB.exe PID 2180 wrote to memory of 2996 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe gbRRwdf.exe PID 2180 wrote to memory of 2996 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe gbRRwdf.exe PID 2180 wrote to memory of 2996 2180 2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe gbRRwdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-16_42976fedf39030e8ea9b51a1d58f181d_cobalt-strike_cobaltstrike.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\xjAwGKy.exeC:\Windows\System\xjAwGKy.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\XYvEdYw.exeC:\Windows\System\XYvEdYw.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\GVwCFmM.exeC:\Windows\System\GVwCFmM.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\IYNDkjL.exeC:\Windows\System\IYNDkjL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\HENEHtU.exeC:\Windows\System\HENEHtU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\tPoStFr.exeC:\Windows\System\tPoStFr.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\TramaWs.exeC:\Windows\System\TramaWs.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\mHFUQTE.exeC:\Windows\System\mHFUQTE.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\JDlJsDR.exeC:\Windows\System\JDlJsDR.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\qXZbdki.exeC:\Windows\System\qXZbdki.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\FoDjMbl.exeC:\Windows\System\FoDjMbl.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aWjHRXm.exeC:\Windows\System\aWjHRXm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\iDkKMLY.exeC:\Windows\System\iDkKMLY.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\WaWaftJ.exeC:\Windows\System\WaWaftJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\MOPtmZt.exeC:\Windows\System\MOPtmZt.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\rnMNaZE.exeC:\Windows\System\rnMNaZE.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\qfGuFPY.exeC:\Windows\System\qfGuFPY.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\cRMtpMq.exeC:\Windows\System\cRMtpMq.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\tmDBLGn.exeC:\Windows\System\tmDBLGn.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aKsQtXB.exeC:\Windows\System\aKsQtXB.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\gbRRwdf.exeC:\Windows\System\gbRRwdf.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\FoDjMbl.exeFilesize
5.2MB
MD5185a23f35ba49a665e5884b4000c3c1b
SHA1c6fd61998cb9975303815d8b440277d393566133
SHA2566abd428930ea86f69cabae2769997f2fff12b8c2678e85db957d2e7c91ca1d0a
SHA5127740d671f9d33bb4a3b6b4deec9339ed0c6fd9bef0037d67838fcf54ae92edef02e9411f8f4d64cbc4e4ee96d2eba61a2a5b7084885e40481f15c35dc2adfdd3
-
C:\Windows\system\GVwCFmM.exeFilesize
5.2MB
MD5dfaace2d817c60dfcde29d059d2a6af4
SHA1717b284d8885209cf7466eba158b5e30314cc383
SHA25699ea96ca0231ae921cd825dbd6a0ee6c4c26b646426cc1e6340beaae8394dc44
SHA512de0efc70b660d54d67894757a3db8de5bd502b6afe28b9fb58f3d14eacbaba0eff18f0b724ab1ca758c453860559412e5ce5dc52cb3bfeb712fbf8030758bc64
-
C:\Windows\system\HENEHtU.exeFilesize
5.2MB
MD5cd4c2bea12bdc5f05ffa63d547923c6f
SHA1c3ff144d821ffde6ae849bd220fc07dc1d53812f
SHA256f1a277054d65c3a4e7a04f8f41e0806ebc3ebe9bbacdfed1ad5fe33c0491d29d
SHA512645ba8d8e48f724eec3f8bfa435a1694451b6fd2319dbdce80878c313148e5206e04908987a493c0ce01c07bfd186a7f2fa23d42713afd76a9058e377f977763
-
C:\Windows\system\JDlJsDR.exeFilesize
5.2MB
MD5cf2a13a59d0af7ce3069f897f9bce8f3
SHA1376e3b755a906513c54779aaaffab1448c46249c
SHA256d9ec285ffbb1444f7c66ebc0bf30673b91d48f2410bb436c5171c6fa88cd6aa1
SHA512621c8e78a0ef845f462cb24b57af68b029653c711ef82d35b4148b09e3f1c95c8ac0f19bebdcee36a17a532e66792ab5a6206fc1d12951054aba9b0a0c4fc0f3
-
C:\Windows\system\MOPtmZt.exeFilesize
5.2MB
MD55b59222807eed7f6c06bd5d6a01d3965
SHA1c0e7b7103f6ba7445e3b263656349001a58118e1
SHA2565726e22c291723b4675a954331c4ff2e8ba71f3df086b138be36db9aadd32ca4
SHA512a43723e48c8d57584df882177d3b9b3e7777cf69cede2d6a6e03158fa5e88dd7dc69a1d87acc2fe2960be7b17d7ff5faed3cfa2586ff3f2a91b5ff31333af899
-
C:\Windows\system\TramaWs.exeFilesize
5.2MB
MD56ac19b829ad80162f6e61e1c9c6ed1e3
SHA1423501d7b3e5a1436270b80f5d3a9374b5bc3872
SHA256971286572c125a555357c4fa4d836bff12f0efa2574664a67f4b3605e69e56b6
SHA51273905f938066d8f188a7e3e090fb12355035e9809b67de5acd73a8e0224d8f6db92b995f23b46da12931dafefad936df1b9ee0602c20ea887a69d376aacfccfe
-
C:\Windows\system\WaWaftJ.exeFilesize
5.2MB
MD525d31a994b407491f4283416a3567b68
SHA118c383c7e6c575adfe0186839d59c5b199fb040c
SHA256e515b24460dc91c550218b17cb6aa2f864903ed9d104e72e8fc95dd852e8f002
SHA512d8b88f0f0a59fcaee1c62805d7360d3916f4148bb60369fec700b6f7b00801c1d90b79309b11850197e805b278d11ef972f62562ab7429946e8cc7d6ca2af7fa
-
C:\Windows\system\XYvEdYw.exeFilesize
5.2MB
MD51ab2e78cae0c8428dd3a008f367bb74b
SHA10d6ffd6f897366039cb426ae2a5d8cb669f701aa
SHA2568c4656f3b86671ce2b2e4577ae9affd4d14739b36e28580c5b473a1d7dd79494
SHA5129fc3c2d167d98b4d1370456749f5e2b128b4b0e4bdaf84e2afbef7edbac009783145b58fdcc3e74c201e498d8125c21b2748e9a570d8975d120335c03f68aa0c
-
C:\Windows\system\aWjHRXm.exeFilesize
5.2MB
MD54bf5dfe1f69aee72d11fd56dee4bf72a
SHA193a0a1db3e82016aead6a90bd615e6c3700570b9
SHA256d00871d88ab43b375f967b197a5c1bf0d234f2f2b0b7c7dc6f77fd51c702829d
SHA5120a4f67343ed6685a0c1d8429ebb6dc5cfd9c309cb145c52e5c96cc6f9660b8767613292cbcec0922a1c17ae4dff0857feae2d4890c49fe813d3ae385fe86aae0
-
C:\Windows\system\cRMtpMq.exeFilesize
5.2MB
MD5f47ee78f33ffcb88c278e1cfd84e0b4b
SHA1add41bb325679fc590f14de7ca157d63de3daf0f
SHA2568dfdf81bd5e30c0332d1686f58e83ad67495ca563191a6160efac94fe49ba367
SHA512cf2142534c32eb3db62f31f3ff0f07b10bdae499503eb898b91e16c45f8034ac344d5198c1bbc538ce93c179c37b7ac42a51b043eda74bf23b4fbd408eb0e487
-
C:\Windows\system\gbRRwdf.exeFilesize
5.2MB
MD52d9a448ed24eb3243da14a782acd0160
SHA10221662123f9390a9643a8eaaee40ab417e54b31
SHA2566e53276ab0c57af00269a6d7551b5582f6dc856ef24f18223886f8f586b359e1
SHA51219726c3eff9a87af3b9383d8a4fc69612f8695561d00d3a4e4c85006e09c2c2bd62359ded40dc20b4ee8846f6422ffea03d7dc4c1407ccf9f45ae9905ab45163
-
C:\Windows\system\iDkKMLY.exeFilesize
5.2MB
MD5e7cf7d631ba9d4b88d58c455797a795c
SHA1d9e34e16bfa56840fa2541d19509e0063d0be6b2
SHA2560001f0e21252f756695941866416ea386cc7f0c9bbd19aa95397779958cb80fe
SHA512fc801be6fd848c9f62d0b0800b7fac3976df4ba134c922b0191d179448b8fe974a3621babf16e48f9e6eef190bd0c45dd9998ac72090c9eeba035f401f641696
-
C:\Windows\system\mHFUQTE.exeFilesize
5.2MB
MD579703cda841cb2233f949991bf467650
SHA1229e32cb20037db415e36de14aa1bf36cfe2b542
SHA256d227bb8eb88e8669eff4940b14fc78053cca71f8a561e0272724c35915bd67ab
SHA512e1f738849c320306bba4551cb3f5e7a734854e5bb81f31ff4730ccbb3ece3ddf5aba02ea07b920d226a089fb46ac430f300f0ffd042fab81091da1442d63945a
-
C:\Windows\system\qXZbdki.exeFilesize
5.2MB
MD5e2a633811c87a47df37ccab7df9a6935
SHA115a6b2615595e625afe5d6fa68e4acee73ee19ea
SHA25676ccaf848457a3b8e5ffb1397b4c4d30cc98361cc1ad9acc7cccdfb3a570789a
SHA512afa592018c6904a47658382890ed6954d1448f6e562a3f88650db4243846f2070f0ce21d27e1257f3b5b90630c468988ceb8c2c3f89102864609ad0408b19c2f
-
C:\Windows\system\qfGuFPY.exeFilesize
5.2MB
MD533f4058956f65885054d58a3bbf4df41
SHA116a08fab77e613c3e3d1ea1b3cbf51bdea7b4132
SHA25676901520b22f8eaac216c13a1666d6408fe2a8d50d0eb3ffc97d1a0fe5fc8da7
SHA51282a69ac8a1401b8338270461952de8698c7b98a6cea1f724a32a3bc92ea8a7838a82835b9dbba5be29b24973bff232a354458e0f864cc0dc39609623c0ef5541
-
C:\Windows\system\rnMNaZE.exeFilesize
5.2MB
MD592f23726d6a3cee4a759a64df8f19749
SHA12f453c821c5e8cb4c2d1f2edc9a01bf2ceaffefb
SHA256cf237762cc9e427207fbebbb75f5f9688d7015002e301761830fc7d8a2b1c7b2
SHA512b6a99d278318466886e3fbe3a7c43d69adcd26f0c5cc4118a56a10d05e6f911da57ad52e1ae484123808d0b26618c8558a5cf6f12f82ba2cc39231e749654b00
-
C:\Windows\system\tPoStFr.exeFilesize
5.2MB
MD573c3ebf36a65afbfa8785efcde9b99bd
SHA11eee9e9f8d3ec59efda0d1825b0de4993216a2a7
SHA25687a3fc6d21d44f545dad2984b1e1c21b16a810056c7b2e050f49a819c36b4ef2
SHA5124dc24271b356ceaac5eceedd1e559bc2a2324d12faa477ba5036d09ddd754589ebc397537c36b6a24d4129b9de095271df7d5251f593977e966a8331e79595c8
-
C:\Windows\system\tmDBLGn.exeFilesize
5.2MB
MD5f0eaefdd507e2a6b46138a71a30734cd
SHA1b2668e64991329f00a2b4648bddf69f1e3d4694d
SHA256d64659b1e8b5125b36bed919034ea35cf40647a9c25bf263bc10357361769593
SHA5123fdfc74c64b08e3ab11ab33ff32244bae43a68f87d24884d9cc9fdf74492988ee880addd2ecef570b21d880a6376c53a744a2f441a6d6fc47f656c875257a655
-
C:\Windows\system\xjAwGKy.exeFilesize
5.2MB
MD5d784e04319cf6384056a1b24db9123ea
SHA1debadb82b5f16ef44fbdeb1b6f265d26f708b765
SHA25691fec465299f17e531e7c585dd3e6ffa63dcdc992439d2460f0f28ab766a6706
SHA512d309349500871a478fa8b9ed4271373d3920aca30b144604315a5c735f87608569c9596905ecb4e14d37861ace09054687f5bb2050a7e69c7b24a77a0bb74975
-
\Windows\system\IYNDkjL.exeFilesize
5.2MB
MD50f3fac5735ddc2cff00e4c67c008456c
SHA187e4a101bdac3f2291e8af9f6c279cb674842bb5
SHA256046e568ff08092ebca6b4601f3f07e268d402c4296622899aab640e815c8f23d
SHA512a5ecf7c09b2758d34192ee9d634f15616f22c8d01b93422bf4a7b4c4426b74751cd7f52e46c1b84179b6da02b65d135e7ca925ceda25b403cef07f58785654e9
-
\Windows\system\aKsQtXB.exeFilesize
5.2MB
MD5f5b7aaea599b85cdad21c6bd6ea4f05c
SHA1bfa7fa1ef3177bb7c0e7601db8450b6fd16a1e45
SHA256a5495961b6a6311c4dad38696f75459a3911fa96bf7aa1fa2b90d96b8dda0c86
SHA5122773d0014e4fcbd24091eec2f925f7b545405862db96161ed782540cf84421479eeac6b4c4aa7b2c1e62e6238934e61d5bfbddcfcc072824e534eba2d8222096
-
memory/324-213-0x000000013FE30000-0x0000000140181000-memory.dmpFilesize
3.3MB
-
memory/324-137-0x000000013FE30000-0x0000000140181000-memory.dmpFilesize
3.3MB
-
memory/836-157-0x000000013FE30000-0x0000000140181000-memory.dmpFilesize
3.3MB
-
memory/836-130-0x000000013FE30000-0x0000000140181000-memory.dmpFilesize
3.3MB
-
memory/836-271-0x000000013FE30000-0x0000000140181000-memory.dmpFilesize
3.3MB
-
memory/1008-121-0x000000013FDA0000-0x00000001400F1000-memory.dmpFilesize
3.3MB
-
memory/1008-255-0x000000013FDA0000-0x00000001400F1000-memory.dmpFilesize
3.3MB
-
memory/1716-223-0x000000013F0D0000-0x000000013F421000-memory.dmpFilesize
3.3MB
-
memory/1716-108-0x000000013F0D0000-0x000000013F421000-memory.dmpFilesize
3.3MB
-
memory/1872-120-0x000000013FB30000-0x000000013FE81000-memory.dmpFilesize
3.3MB
-
memory/1872-244-0x000000013FB30000-0x000000013FE81000-memory.dmpFilesize
3.3MB
-
memory/2088-118-0x000000013FAB0000-0x000000013FE01000-memory.dmpFilesize
3.3MB
-
memory/2088-243-0x000000013FAB0000-0x000000013FE01000-memory.dmpFilesize
3.3MB
-
memory/2180-123-0x000000013F030000-0x000000013F381000-memory.dmpFilesize
3.3MB
-
memory/2180-189-0x000000013FD70000-0x00000001400C1000-memory.dmpFilesize
3.3MB
-
memory/2180-167-0x000000013FD70000-0x00000001400C1000-memory.dmpFilesize
3.3MB
-
memory/2180-0-0x000000013FD70000-0x00000001400C1000-memory.dmpFilesize
3.3MB
-
memory/2180-113-0x000000013F430000-0x000000013F781000-memory.dmpFilesize
3.3MB
-
memory/2180-112-0x0000000002310000-0x0000000002661000-memory.dmpFilesize
3.3MB
-
memory/2180-111-0x000000013F8E0000-0x000000013FC31000-memory.dmpFilesize
3.3MB
-
memory/2180-110-0x0000000002310000-0x0000000002661000-memory.dmpFilesize
3.3MB
-
memory/2180-124-0x0000000002310000-0x0000000002661000-memory.dmpFilesize
3.3MB
-
memory/2180-115-0x0000000002310000-0x0000000002661000-memory.dmpFilesize
3.3MB
-
memory/2180-116-0x0000000002310000-0x0000000002661000-memory.dmpFilesize
3.3MB
-
memory/2180-1-0x00000000000F0000-0x0000000000100000-memory.dmpFilesize
64KB
-
memory/2180-114-0x000000013F7E0000-0x000000013FB31000-memory.dmpFilesize
3.3MB
-
memory/2180-136-0x0000000002310000-0x0000000002661000-memory.dmpFilesize
3.3MB
-
memory/2180-23-0x000000013F0B0000-0x000000013F401000-memory.dmpFilesize
3.3MB
-
memory/2180-139-0x000000013F710000-0x000000013FA61000-memory.dmpFilesize
3.3MB
-
memory/2180-72-0x000000013F0D0000-0x000000013F421000-memory.dmpFilesize
3.3MB
-
memory/2180-145-0x000000013FD70000-0x00000001400C1000-memory.dmpFilesize
3.3MB
-
memory/2180-109-0x000000013F1F0000-0x000000013F541000-memory.dmpFilesize
3.3MB
-
memory/2180-127-0x000000013F520000-0x000000013F871000-memory.dmpFilesize
3.3MB
-
memory/2180-56-0x0000000002310000-0x0000000002661000-memory.dmpFilesize
3.3MB
-
memory/2180-140-0x000000013F640000-0x000000013F991000-memory.dmpFilesize
3.3MB
-
memory/2448-251-0x000000013F520000-0x000000013F871000-memory.dmpFilesize
3.3MB
-
memory/2448-131-0x000000013F520000-0x000000013F871000-memory.dmpFilesize
3.3MB
-
memory/2504-138-0x000000013F0B0000-0x000000013F401000-memory.dmpFilesize
3.3MB
-
memory/2504-224-0x000000013F0B0000-0x000000013F401000-memory.dmpFilesize
3.3MB
-
memory/2524-274-0x000000013FA90000-0x000000013FDE1000-memory.dmpFilesize
3.3MB
-
memory/2524-135-0x000000013FA90000-0x000000013FDE1000-memory.dmpFilesize
3.3MB
-
memory/2524-163-0x000000013FA90000-0x000000013FDE1000-memory.dmpFilesize
3.3MB
-
memory/2536-144-0x000000013F840000-0x000000013FB91000-memory.dmpFilesize
3.3MB
-
memory/2536-273-0x000000013F840000-0x000000013FB91000-memory.dmpFilesize
3.3MB
-
memory/2564-252-0x000000013FCE0000-0x0000000140031000-memory.dmpFilesize
3.3MB
-
memory/2564-122-0x000000013FCE0000-0x0000000140031000-memory.dmpFilesize
3.3MB
-
memory/2568-249-0x000000013F640000-0x000000013F991000-memory.dmpFilesize
3.3MB
-
memory/2568-125-0x000000013F640000-0x000000013F991000-memory.dmpFilesize
3.3MB
-
memory/2656-161-0x000000013F030000-0x000000013F381000-memory.dmpFilesize
3.3MB
-
memory/2656-270-0x000000013F030000-0x000000013F381000-memory.dmpFilesize
3.3MB
-
memory/2656-134-0x000000013F030000-0x000000013F381000-memory.dmpFilesize
3.3MB
-
memory/2692-119-0x000000013F7E0000-0x000000013FB31000-memory.dmpFilesize
3.3MB
-
memory/2692-257-0x000000013F7E0000-0x000000013FB31000-memory.dmpFilesize
3.3MB
-
memory/2736-240-0x000000013FC60000-0x000000013FFB1000-memory.dmpFilesize
3.3MB
-
memory/2736-148-0x000000013FC60000-0x000000013FFB1000-memory.dmpFilesize
3.3MB
-
memory/2736-64-0x000000013FC60000-0x000000013FFB1000-memory.dmpFilesize
3.3MB
-
memory/2744-265-0x000000013F430000-0x000000013F781000-memory.dmpFilesize
3.3MB
-
memory/2744-129-0x000000013F430000-0x000000013F781000-memory.dmpFilesize
3.3MB
-
memory/2744-155-0x000000013F430000-0x000000013F781000-memory.dmpFilesize
3.3MB
-
memory/2788-256-0x000000013F1F0000-0x000000013F541000-memory.dmpFilesize
3.3MB
-
memory/2788-126-0x000000013F1F0000-0x000000013F541000-memory.dmpFilesize
3.3MB
-
memory/2800-258-0x000000013FB60000-0x000000013FEB1000-memory.dmpFilesize
3.3MB
-
memory/2800-117-0x000000013FB60000-0x000000013FEB1000-memory.dmpFilesize
3.3MB
-
memory/2860-128-0x000000013F8E0000-0x000000013FC31000-memory.dmpFilesize
3.3MB
-
memory/2860-153-0x000000013F8E0000-0x000000013FC31000-memory.dmpFilesize
3.3MB
-
memory/2860-262-0x000000013F8E0000-0x000000013FC31000-memory.dmpFilesize
3.3MB
-
memory/2992-272-0x000000013F710000-0x000000013FA61000-memory.dmpFilesize
3.3MB
-
memory/2992-132-0x000000013F710000-0x000000013FA61000-memory.dmpFilesize
3.3MB
-
memory/2992-159-0x000000013F710000-0x000000013FA61000-memory.dmpFilesize
3.3MB
-
memory/2996-141-0x000000013FA50000-0x000000013FDA1000-memory.dmpFilesize
3.3MB
-
memory/2996-260-0x000000013FA50000-0x000000013FDA1000-memory.dmpFilesize
3.3MB