Analysis
-
max time kernel
147s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 21:52
Behavioral task
behavioral1
Sample
2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe
Resource
win7-20240221-en
General
-
Target
2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe
-
Size
5.2MB
-
MD5
543b6e2284fbdb0fb9057a455d7e8e68
-
SHA1
8958c3bbf404dc5ce572a1a24d1e6c41e66ddf56
-
SHA256
dbff180c1cd14428a03c7e1699faa9e758c80d0eb31edf04189abfbd2f2f14c9
-
SHA512
9c05c36c83224e9458a003d4af8cf0e94a7a0d26f914741e642ea09b4aff3137dbf268a61f3a32b30f94598ea9040f598f82953e6b60049b1fb611c051f262ed
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lV:RWWBibf56utgpPFotBER/mQ32lUh
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\YeZEXgx.exe cobalt_reflective_dll C:\Windows\system\DEYjaai.exe cobalt_reflective_dll C:\Windows\system\TquvyKR.exe cobalt_reflective_dll \Windows\system\CrJpGsh.exe cobalt_reflective_dll \Windows\system\QxniJYb.exe cobalt_reflective_dll \Windows\system\DRKzuYz.exe cobalt_reflective_dll \Windows\system\zJbXjZf.exe cobalt_reflective_dll C:\Windows\system\BViGbFK.exe cobalt_reflective_dll \Windows\system\RYdnkOe.exe cobalt_reflective_dll \Windows\system\xefKNpM.exe cobalt_reflective_dll \Windows\system\MDFjfNU.exe cobalt_reflective_dll C:\Windows\system\OhFabFa.exe cobalt_reflective_dll C:\Windows\system\TmqSjgv.exe cobalt_reflective_dll \Windows\system\aWPDkrs.exe cobalt_reflective_dll C:\Windows\system\tUOIzUm.exe cobalt_reflective_dll \Windows\system\ByeLOWm.exe cobalt_reflective_dll C:\Windows\system\ATcypFq.exe cobalt_reflective_dll \Windows\system\JRuXiDb.exe cobalt_reflective_dll \Windows\system\knHREJX.exe cobalt_reflective_dll C:\Windows\system\pCurfxR.exe cobalt_reflective_dll \Windows\system\kyPJxoM.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule \Windows\system\YeZEXgx.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\DEYjaai.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\TquvyKR.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\CrJpGsh.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\QxniJYb.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\DRKzuYz.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\zJbXjZf.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\BViGbFK.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\RYdnkOe.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\xefKNpM.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\MDFjfNU.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\OhFabFa.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\TmqSjgv.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\aWPDkrs.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\tUOIzUm.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\ByeLOWm.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\ATcypFq.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\JRuXiDb.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\knHREJX.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\pCurfxR.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\kyPJxoM.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule behavioral1/memory/2908-0-0x000000013F1F0000-0x000000013F541000-memory.dmp UPX \Windows\system\YeZEXgx.exe UPX behavioral1/memory/2332-7-0x000000013F830000-0x000000013FB81000-memory.dmp UPX C:\Windows\system\DEYjaai.exe UPX C:\Windows\system\TquvyKR.exe UPX \Windows\system\CrJpGsh.exe UPX behavioral1/memory/2504-27-0x000000013F630000-0x000000013F981000-memory.dmp UPX behavioral1/memory/2644-29-0x000000013FB20000-0x000000013FE71000-memory.dmp UPX behavioral1/memory/2384-14-0x000000013FBF0000-0x000000013FF41000-memory.dmp UPX \Windows\system\QxniJYb.exe UPX \Windows\system\DRKzuYz.exe UPX \Windows\system\zJbXjZf.exe UPX behavioral1/memory/2588-34-0x000000013FE60000-0x00000001401B1000-memory.dmp UPX behavioral1/memory/2576-49-0x000000013F310000-0x000000013F661000-memory.dmp UPX behavioral1/memory/2256-52-0x000000013F960000-0x000000013FCB1000-memory.dmp UPX behavioral1/memory/2908-53-0x000000013F1F0000-0x000000013F541000-memory.dmp UPX behavioral1/memory/2352-56-0x000000013F470000-0x000000013F7C1000-memory.dmp UPX C:\Windows\system\BViGbFK.exe UPX \Windows\system\RYdnkOe.exe UPX \Windows\system\xefKNpM.exe UPX behavioral1/memory/2908-58-0x000000013FCA0000-0x000000013FFF1000-memory.dmp UPX \Windows\system\MDFjfNU.exe UPX behavioral1/memory/1728-71-0x000000013F530000-0x000000013F881000-memory.dmp UPX C:\Windows\system\OhFabFa.exe UPX behavioral1/memory/2464-89-0x000000013F5C0000-0x000000013F911000-memory.dmp UPX C:\Windows\system\TmqSjgv.exe UPX \Windows\system\aWPDkrs.exe UPX C:\Windows\system\tUOIzUm.exe UPX \Windows\system\ByeLOWm.exe UPX C:\Windows\system\ATcypFq.exe UPX behavioral1/memory/2564-93-0x000000013F960000-0x000000013FCB1000-memory.dmp UPX behavioral1/memory/2332-111-0x000000013F830000-0x000000013FB81000-memory.dmp UPX behavioral1/memory/2384-112-0x000000013FBF0000-0x000000013FF41000-memory.dmp UPX \Windows\system\JRuXiDb.exe UPX behavioral1/memory/2504-113-0x000000013F630000-0x000000013F981000-memory.dmp UPX behavioral1/memory/2588-116-0x000000013FE60000-0x00000001401B1000-memory.dmp UPX behavioral1/memory/2352-118-0x000000013F470000-0x000000013F7C1000-memory.dmp UPX behavioral1/memory/2112-120-0x000000013F970000-0x000000013FCC1000-memory.dmp UPX behavioral1/memory/2568-121-0x000000013F1B0000-0x000000013F501000-memory.dmp UPX behavioral1/memory/1284-122-0x000000013FDB0000-0x0000000140101000-memory.dmp UPX behavioral1/memory/1960-123-0x000000013FE30000-0x0000000140181000-memory.dmp UPX behavioral1/memory/1964-124-0x000000013F4E0000-0x000000013F831000-memory.dmp UPX behavioral1/memory/2724-125-0x000000013FCA0000-0x000000013FFF1000-memory.dmp UPX behavioral1/memory/584-126-0x000000013FED0000-0x0000000140221000-memory.dmp UPX behavioral1/memory/1544-130-0x000000013F190000-0x000000013F4E1000-memory.dmp UPX \Windows\system\knHREJX.exe UPX C:\Windows\system\pCurfxR.exe UPX behavioral1/memory/1728-134-0x000000013F530000-0x000000013F881000-memory.dmp UPX behavioral1/memory/912-141-0x000000013FB40000-0x000000013FE91000-memory.dmp UPX \Windows\system\kyPJxoM.exe UPX behavioral1/memory/2568-158-0x000000013F1B0000-0x000000013F501000-memory.dmp UPX behavioral1/memory/1960-160-0x000000013FE30000-0x0000000140181000-memory.dmp UPX behavioral1/memory/1964-162-0x000000013F4E0000-0x000000013F831000-memory.dmp UPX behavioral1/memory/2832-165-0x000000013FAD0000-0x000000013FE21000-memory.dmp UPX behavioral1/memory/1544-167-0x000000013F190000-0x000000013F4E1000-memory.dmp UPX behavioral1/memory/2908-169-0x000000013F1F0000-0x000000013F541000-memory.dmp UPX behavioral1/memory/912-172-0x000000013FB40000-0x000000013FE91000-memory.dmp UPX behavioral1/memory/2332-204-0x000000013F830000-0x000000013FB81000-memory.dmp UPX behavioral1/memory/2644-207-0x000000013FB20000-0x000000013FE71000-memory.dmp UPX behavioral1/memory/2504-210-0x000000013F630000-0x000000013F981000-memory.dmp UPX behavioral1/memory/2384-209-0x000000013FBF0000-0x000000013FF41000-memory.dmp UPX behavioral1/memory/2576-257-0x000000013F310000-0x000000013F661000-memory.dmp UPX behavioral1/memory/2256-259-0x000000013F960000-0x000000013FCB1000-memory.dmp UPX behavioral1/memory/2588-262-0x000000013FE60000-0x00000001401B1000-memory.dmp UPX -
XMRig Miner payload 53 IoCs
Processes:
resource yara_rule behavioral1/memory/2504-27-0x000000013F630000-0x000000013F981000-memory.dmp xmrig behavioral1/memory/2908-28-0x000000013FB20000-0x000000013FE71000-memory.dmp xmrig behavioral1/memory/2644-29-0x000000013FB20000-0x000000013FE71000-memory.dmp xmrig behavioral1/memory/2576-49-0x000000013F310000-0x000000013F661000-memory.dmp xmrig behavioral1/memory/2256-52-0x000000013F960000-0x000000013FCB1000-memory.dmp xmrig behavioral1/memory/2908-53-0x000000013F1F0000-0x000000013F541000-memory.dmp xmrig behavioral1/memory/2908-55-0x00000000021F0000-0x0000000002541000-memory.dmp xmrig behavioral1/memory/2352-56-0x000000013F470000-0x000000013F7C1000-memory.dmp xmrig behavioral1/memory/1728-71-0x000000013F530000-0x000000013F881000-memory.dmp xmrig behavioral1/memory/2464-89-0x000000013F5C0000-0x000000013F911000-memory.dmp xmrig behavioral1/memory/2564-93-0x000000013F960000-0x000000013FCB1000-memory.dmp xmrig behavioral1/memory/2332-111-0x000000013F830000-0x000000013FB81000-memory.dmp xmrig behavioral1/memory/2384-112-0x000000013FBF0000-0x000000013FF41000-memory.dmp xmrig behavioral1/memory/2504-113-0x000000013F630000-0x000000013F981000-memory.dmp xmrig behavioral1/memory/2588-116-0x000000013FE60000-0x00000001401B1000-memory.dmp xmrig behavioral1/memory/2352-118-0x000000013F470000-0x000000013F7C1000-memory.dmp xmrig behavioral1/memory/2112-120-0x000000013F970000-0x000000013FCC1000-memory.dmp xmrig behavioral1/memory/2568-121-0x000000013F1B0000-0x000000013F501000-memory.dmp xmrig behavioral1/memory/1284-122-0x000000013FDB0000-0x0000000140101000-memory.dmp xmrig behavioral1/memory/1960-123-0x000000013FE30000-0x0000000140181000-memory.dmp xmrig behavioral1/memory/2724-125-0x000000013FCA0000-0x000000013FFF1000-memory.dmp xmrig behavioral1/memory/584-126-0x000000013FED0000-0x0000000140221000-memory.dmp xmrig behavioral1/memory/1728-134-0x000000013F530000-0x000000013F881000-memory.dmp xmrig behavioral1/memory/2908-139-0x000000013FB40000-0x000000013FE91000-memory.dmp xmrig behavioral1/memory/2568-158-0x000000013F1B0000-0x000000013F501000-memory.dmp xmrig behavioral1/memory/1960-160-0x000000013FE30000-0x0000000140181000-memory.dmp xmrig behavioral1/memory/1964-162-0x000000013F4E0000-0x000000013F831000-memory.dmp xmrig behavioral1/memory/2832-165-0x000000013FAD0000-0x000000013FE21000-memory.dmp xmrig behavioral1/memory/1544-167-0x000000013F190000-0x000000013F4E1000-memory.dmp xmrig behavioral1/memory/2908-169-0x000000013F1F0000-0x000000013F541000-memory.dmp xmrig behavioral1/memory/912-172-0x000000013FB40000-0x000000013FE91000-memory.dmp xmrig behavioral1/memory/2332-204-0x000000013F830000-0x000000013FB81000-memory.dmp xmrig behavioral1/memory/2644-207-0x000000013FB20000-0x000000013FE71000-memory.dmp xmrig behavioral1/memory/2504-210-0x000000013F630000-0x000000013F981000-memory.dmp xmrig behavioral1/memory/2384-209-0x000000013FBF0000-0x000000013FF41000-memory.dmp xmrig behavioral1/memory/2576-257-0x000000013F310000-0x000000013F661000-memory.dmp xmrig behavioral1/memory/2256-259-0x000000013F960000-0x000000013FCB1000-memory.dmp xmrig behavioral1/memory/2588-262-0x000000013FE60000-0x00000001401B1000-memory.dmp xmrig behavioral1/memory/2908-266-0x000000013FAD0000-0x000000013FE21000-memory.dmp xmrig behavioral1/memory/2352-269-0x000000013F470000-0x000000013F7C1000-memory.dmp xmrig behavioral1/memory/2724-271-0x000000013FCA0000-0x000000013FFF1000-memory.dmp xmrig behavioral1/memory/1728-273-0x000000013F530000-0x000000013F881000-memory.dmp xmrig behavioral1/memory/584-275-0x000000013FED0000-0x0000000140221000-memory.dmp xmrig behavioral1/memory/2464-278-0x000000013F5C0000-0x000000013F911000-memory.dmp xmrig behavioral1/memory/2564-279-0x000000013F960000-0x000000013FCB1000-memory.dmp xmrig behavioral1/memory/2112-287-0x000000013F970000-0x000000013FCC1000-memory.dmp xmrig behavioral1/memory/1284-289-0x000000013FDB0000-0x0000000140101000-memory.dmp xmrig behavioral1/memory/2568-293-0x000000013F1B0000-0x000000013F501000-memory.dmp xmrig behavioral1/memory/1960-295-0x000000013FE30000-0x0000000140181000-memory.dmp xmrig behavioral1/memory/1544-298-0x000000013F190000-0x000000013F4E1000-memory.dmp xmrig behavioral1/memory/1964-304-0x000000013F4E0000-0x000000013F831000-memory.dmp xmrig behavioral1/memory/912-306-0x000000013FB40000-0x000000013FE91000-memory.dmp xmrig behavioral1/memory/2832-307-0x000000013FAD0000-0x000000013FE21000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
YeZEXgx.exeDEYjaai.exeTquvyKR.exeCrJpGsh.exeDRKzuYz.exeQxniJYb.exezJbXjZf.exeBViGbFK.exeRYdnkOe.exexefKNpM.exeMDFjfNU.exeOhFabFa.exeTmqSjgv.exeaWPDkrs.exeByeLOWm.exetUOIzUm.exeATcypFq.exeJRuXiDb.exeknHREJX.exepCurfxR.exekyPJxoM.exepid process 2332 YeZEXgx.exe 2384 DEYjaai.exe 2504 TquvyKR.exe 2644 CrJpGsh.exe 2588 DRKzuYz.exe 2576 QxniJYb.exe 2256 zJbXjZf.exe 2352 BViGbFK.exe 2724 RYdnkOe.exe 1728 xefKNpM.exe 584 MDFjfNU.exe 2464 OhFabFa.exe 2564 TmqSjgv.exe 2112 aWPDkrs.exe 2568 ByeLOWm.exe 1284 tUOIzUm.exe 1960 ATcypFq.exe 1964 JRuXiDb.exe 1544 knHREJX.exe 912 pCurfxR.exe 2832 kyPJxoM.exe -
Loads dropped DLL 21 IoCs
Processes:
2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exepid process 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe -
Processes:
resource yara_rule behavioral1/memory/2908-0-0x000000013F1F0000-0x000000013F541000-memory.dmp upx \Windows\system\YeZEXgx.exe upx behavioral1/memory/2332-7-0x000000013F830000-0x000000013FB81000-memory.dmp upx C:\Windows\system\DEYjaai.exe upx C:\Windows\system\TquvyKR.exe upx \Windows\system\CrJpGsh.exe upx behavioral1/memory/2504-27-0x000000013F630000-0x000000013F981000-memory.dmp upx behavioral1/memory/2644-29-0x000000013FB20000-0x000000013FE71000-memory.dmp upx behavioral1/memory/2384-14-0x000000013FBF0000-0x000000013FF41000-memory.dmp upx \Windows\system\QxniJYb.exe upx \Windows\system\DRKzuYz.exe upx \Windows\system\zJbXjZf.exe upx behavioral1/memory/2588-34-0x000000013FE60000-0x00000001401B1000-memory.dmp upx behavioral1/memory/2576-49-0x000000013F310000-0x000000013F661000-memory.dmp upx behavioral1/memory/2256-52-0x000000013F960000-0x000000013FCB1000-memory.dmp upx behavioral1/memory/2908-53-0x000000013F1F0000-0x000000013F541000-memory.dmp upx behavioral1/memory/2352-56-0x000000013F470000-0x000000013F7C1000-memory.dmp upx C:\Windows\system\BViGbFK.exe upx \Windows\system\RYdnkOe.exe upx \Windows\system\xefKNpM.exe upx behavioral1/memory/2908-58-0x000000013FCA0000-0x000000013FFF1000-memory.dmp upx \Windows\system\MDFjfNU.exe upx behavioral1/memory/1728-71-0x000000013F530000-0x000000013F881000-memory.dmp upx C:\Windows\system\OhFabFa.exe upx behavioral1/memory/2464-89-0x000000013F5C0000-0x000000013F911000-memory.dmp upx C:\Windows\system\TmqSjgv.exe upx \Windows\system\aWPDkrs.exe upx C:\Windows\system\tUOIzUm.exe upx \Windows\system\ByeLOWm.exe upx C:\Windows\system\ATcypFq.exe upx behavioral1/memory/2564-93-0x000000013F960000-0x000000013FCB1000-memory.dmp upx behavioral1/memory/2332-111-0x000000013F830000-0x000000013FB81000-memory.dmp upx behavioral1/memory/2384-112-0x000000013FBF0000-0x000000013FF41000-memory.dmp upx \Windows\system\JRuXiDb.exe upx behavioral1/memory/2504-113-0x000000013F630000-0x000000013F981000-memory.dmp upx behavioral1/memory/2588-116-0x000000013FE60000-0x00000001401B1000-memory.dmp upx behavioral1/memory/2352-118-0x000000013F470000-0x000000013F7C1000-memory.dmp upx behavioral1/memory/2112-120-0x000000013F970000-0x000000013FCC1000-memory.dmp upx behavioral1/memory/2568-121-0x000000013F1B0000-0x000000013F501000-memory.dmp upx behavioral1/memory/1284-122-0x000000013FDB0000-0x0000000140101000-memory.dmp upx behavioral1/memory/1960-123-0x000000013FE30000-0x0000000140181000-memory.dmp upx behavioral1/memory/1964-124-0x000000013F4E0000-0x000000013F831000-memory.dmp upx behavioral1/memory/2724-125-0x000000013FCA0000-0x000000013FFF1000-memory.dmp upx behavioral1/memory/584-126-0x000000013FED0000-0x0000000140221000-memory.dmp upx behavioral1/memory/1544-130-0x000000013F190000-0x000000013F4E1000-memory.dmp upx \Windows\system\knHREJX.exe upx C:\Windows\system\pCurfxR.exe upx behavioral1/memory/1728-134-0x000000013F530000-0x000000013F881000-memory.dmp upx behavioral1/memory/912-141-0x000000013FB40000-0x000000013FE91000-memory.dmp upx \Windows\system\kyPJxoM.exe upx behavioral1/memory/2568-158-0x000000013F1B0000-0x000000013F501000-memory.dmp upx behavioral1/memory/1960-160-0x000000013FE30000-0x0000000140181000-memory.dmp upx behavioral1/memory/1964-162-0x000000013F4E0000-0x000000013F831000-memory.dmp upx behavioral1/memory/2832-165-0x000000013FAD0000-0x000000013FE21000-memory.dmp upx behavioral1/memory/1544-167-0x000000013F190000-0x000000013F4E1000-memory.dmp upx behavioral1/memory/2908-169-0x000000013F1F0000-0x000000013F541000-memory.dmp upx behavioral1/memory/912-172-0x000000013FB40000-0x000000013FE91000-memory.dmp upx behavioral1/memory/2332-204-0x000000013F830000-0x000000013FB81000-memory.dmp upx behavioral1/memory/2644-207-0x000000013FB20000-0x000000013FE71000-memory.dmp upx behavioral1/memory/2504-210-0x000000013F630000-0x000000013F981000-memory.dmp upx behavioral1/memory/2384-209-0x000000013FBF0000-0x000000013FF41000-memory.dmp upx behavioral1/memory/2576-257-0x000000013F310000-0x000000013F661000-memory.dmp upx behavioral1/memory/2256-259-0x000000013F960000-0x000000013FCB1000-memory.dmp upx behavioral1/memory/2588-262-0x000000013FE60000-0x00000001401B1000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exedescription ioc process File created C:\Windows\System\aWPDkrs.exe 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\pCurfxR.exe 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\DEYjaai.exe 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\DRKzuYz.exe 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\QxniJYb.exe 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\RYdnkOe.exe 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\ByeLOWm.exe 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\TmqSjgv.exe 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\CrJpGsh.exe 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\BViGbFK.exe 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\zJbXjZf.exe 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\JRuXiDb.exe 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\kyPJxoM.exe 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\TquvyKR.exe 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\xefKNpM.exe 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\OhFabFa.exe 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\YeZEXgx.exe 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\MDFjfNU.exe 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\ATcypFq.exe 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\tUOIzUm.exe 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\knHREJX.exe 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exedescription pid process Token: SeLockMemoryPrivilege 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe Token: SeLockMemoryPrivilege 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exedescription pid process target process PID 2908 wrote to memory of 2332 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe YeZEXgx.exe PID 2908 wrote to memory of 2332 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe YeZEXgx.exe PID 2908 wrote to memory of 2332 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe YeZEXgx.exe PID 2908 wrote to memory of 2384 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe DEYjaai.exe PID 2908 wrote to memory of 2384 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe DEYjaai.exe PID 2908 wrote to memory of 2384 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe DEYjaai.exe PID 2908 wrote to memory of 2504 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe TquvyKR.exe PID 2908 wrote to memory of 2504 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe TquvyKR.exe PID 2908 wrote to memory of 2504 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe TquvyKR.exe PID 2908 wrote to memory of 2644 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe CrJpGsh.exe PID 2908 wrote to memory of 2644 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe CrJpGsh.exe PID 2908 wrote to memory of 2644 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe CrJpGsh.exe PID 2908 wrote to memory of 2588 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe DRKzuYz.exe PID 2908 wrote to memory of 2588 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe DRKzuYz.exe PID 2908 wrote to memory of 2588 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe DRKzuYz.exe PID 2908 wrote to memory of 2576 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe QxniJYb.exe PID 2908 wrote to memory of 2576 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe QxniJYb.exe PID 2908 wrote to memory of 2576 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe QxniJYb.exe PID 2908 wrote to memory of 2352 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe BViGbFK.exe PID 2908 wrote to memory of 2352 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe BViGbFK.exe PID 2908 wrote to memory of 2352 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe BViGbFK.exe PID 2908 wrote to memory of 2256 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe zJbXjZf.exe PID 2908 wrote to memory of 2256 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe zJbXjZf.exe PID 2908 wrote to memory of 2256 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe zJbXjZf.exe PID 2908 wrote to memory of 2724 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe RYdnkOe.exe PID 2908 wrote to memory of 2724 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe RYdnkOe.exe PID 2908 wrote to memory of 2724 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe RYdnkOe.exe PID 2908 wrote to memory of 1728 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe xefKNpM.exe PID 2908 wrote to memory of 1728 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe xefKNpM.exe PID 2908 wrote to memory of 1728 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe xefKNpM.exe PID 2908 wrote to memory of 584 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe MDFjfNU.exe PID 2908 wrote to memory of 584 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe MDFjfNU.exe PID 2908 wrote to memory of 584 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe MDFjfNU.exe PID 2908 wrote to memory of 2464 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe OhFabFa.exe PID 2908 wrote to memory of 2464 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe OhFabFa.exe PID 2908 wrote to memory of 2464 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe OhFabFa.exe PID 2908 wrote to memory of 2568 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe ByeLOWm.exe PID 2908 wrote to memory of 2568 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe ByeLOWm.exe PID 2908 wrote to memory of 2568 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe ByeLOWm.exe PID 2908 wrote to memory of 2564 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe TmqSjgv.exe PID 2908 wrote to memory of 2564 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe TmqSjgv.exe PID 2908 wrote to memory of 2564 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe TmqSjgv.exe PID 2908 wrote to memory of 1960 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe ATcypFq.exe PID 2908 wrote to memory of 1960 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe ATcypFq.exe PID 2908 wrote to memory of 1960 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe ATcypFq.exe PID 2908 wrote to memory of 2112 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe aWPDkrs.exe PID 2908 wrote to memory of 2112 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe aWPDkrs.exe PID 2908 wrote to memory of 2112 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe aWPDkrs.exe PID 2908 wrote to memory of 1964 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe JRuXiDb.exe PID 2908 wrote to memory of 1964 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe JRuXiDb.exe PID 2908 wrote to memory of 1964 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe JRuXiDb.exe PID 2908 wrote to memory of 1284 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe tUOIzUm.exe PID 2908 wrote to memory of 1284 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe tUOIzUm.exe PID 2908 wrote to memory of 1284 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe tUOIzUm.exe PID 2908 wrote to memory of 1544 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe knHREJX.exe PID 2908 wrote to memory of 1544 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe knHREJX.exe PID 2908 wrote to memory of 1544 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe knHREJX.exe PID 2908 wrote to memory of 912 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe pCurfxR.exe PID 2908 wrote to memory of 912 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe pCurfxR.exe PID 2908 wrote to memory of 912 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe pCurfxR.exe PID 2908 wrote to memory of 2832 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe kyPJxoM.exe PID 2908 wrote to memory of 2832 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe kyPJxoM.exe PID 2908 wrote to memory of 2832 2908 2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe kyPJxoM.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\YeZEXgx.exeC:\Windows\System\YeZEXgx.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\DEYjaai.exeC:\Windows\System\DEYjaai.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\TquvyKR.exeC:\Windows\System\TquvyKR.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CrJpGsh.exeC:\Windows\System\CrJpGsh.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\DRKzuYz.exeC:\Windows\System\DRKzuYz.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\QxniJYb.exeC:\Windows\System\QxniJYb.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\BViGbFK.exeC:\Windows\System\BViGbFK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zJbXjZf.exeC:\Windows\System\zJbXjZf.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RYdnkOe.exeC:\Windows\System\RYdnkOe.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\xefKNpM.exeC:\Windows\System\xefKNpM.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\MDFjfNU.exeC:\Windows\System\MDFjfNU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\OhFabFa.exeC:\Windows\System\OhFabFa.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ByeLOWm.exeC:\Windows\System\ByeLOWm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\TmqSjgv.exeC:\Windows\System\TmqSjgv.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ATcypFq.exeC:\Windows\System\ATcypFq.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aWPDkrs.exeC:\Windows\System\aWPDkrs.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\JRuXiDb.exeC:\Windows\System\JRuXiDb.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\tUOIzUm.exeC:\Windows\System\tUOIzUm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\knHREJX.exeC:\Windows\System\knHREJX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\pCurfxR.exeC:\Windows\System\pCurfxR.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\kyPJxoM.exeC:\Windows\System\kyPJxoM.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\ATcypFq.exeFilesize
5.2MB
MD563cde64c1500aaf3cba43f2035461c77
SHA1d69f1806a7f4a121127e6a1e041e3a0ff50c70a7
SHA256b354ecf0269d5674937a7d947083d6da34b46e8b145a605f5c0e951ca971ffe8
SHA5122df32f0cf4a9a5ca53b100a668614e345fc0b87b3eb5cc93a9c3497854cedee8f98535b2322c275503675503237f1a88d93c58726dfae2692ed472e8fa027b1b
-
C:\Windows\system\BViGbFK.exeFilesize
5.2MB
MD5be6d4b5b64b3416a8b212dd42203a9f7
SHA1cca8a7b7c1a3170590c005085186bb85a577a864
SHA256cee2688127c82626dcca025ff994d8a326c66ff23982b3477b222eee84fba58f
SHA512f544ae79e906b94b5cd2826c61ddab76431ee9bd442fa3b9357a6b5fe642d2b3fd86d8cae02e09509db43e80a6306ffd7aa0a902bce30b49024ad23639e6cdc0
-
C:\Windows\system\DEYjaai.exeFilesize
5.2MB
MD5c67e34cecc84c8321faea85ce5376e21
SHA12ec760751ee87ac7a9a083743c521abd8360c9d0
SHA256fdf315bca937d289b2f676a7c7ed1741d6704df663ab326b1d4e2622f6dc7272
SHA512cd026f6d2ef08ce95927f62187ee1c89f346b22e543a773551c8a3578b58a1291426a31846f7a2147cbe1cc2f5e5143bc8533b132b238e8242415d74dc7e0a52
-
C:\Windows\system\OhFabFa.exeFilesize
5.2MB
MD52a144e9b8f18637d249094acc325ecbd
SHA1abe1f988ce322c58ef2d91850e305d34a4d9ef06
SHA2561e9f51e22e8a75930d7c455966087cf37c640f8d5b89e0fb0aa5cb327650390a
SHA512e05e8b3d17c16f1a3d24917bcff17601b579500ee2392df2418e94f532e0ee8bacd9bd287abaab35fbec976d02a5470b7ca23d2e1fd82c43f3b770cb716f1fa7
-
C:\Windows\system\TmqSjgv.exeFilesize
5.2MB
MD5c30fbaf74bda35dbd8ddbd7d94d954c8
SHA111c0b6233ebb1c60194b42ab8e05f96cb064f803
SHA25614cbfb71097385423c46026de827a4c9c3755e9987c87aed2f41880f3a81a6c9
SHA51282625d8b2e8d33847447ceda101e565d56eecd2f08049bfa6674183482a19224b42e09052bfd810896f39f614db599bbf32c757255d2d5ba05762d1b79d44b13
-
C:\Windows\system\TquvyKR.exeFilesize
5.2MB
MD534e80b55dd66724babb340269b511b65
SHA14abbc566fe189d1489c915ddf913c0215b111eec
SHA256daa2cb08d2a8f1516fd1af98044b7dff81fb6717fbb2b5fe31ce3c06a52e6468
SHA5122524c34735469f3e971b007b300470c9e36d8c1a8ae6c50b681f311f0304da88ec7fb9c2a93f649395f3d63dceb37d1ade98d534835faedbf003f60326ba8ec9
-
C:\Windows\system\pCurfxR.exeFilesize
5.2MB
MD5105fdb51cd6b0771803321fb813cd39f
SHA1b2b2139a7bb5f3fbf21e5d1c506c49c5fe909b28
SHA25699615f1574ee94e14145e81dcb266378ff5632082d0250cce6bb9a126e656a17
SHA51210f18cb9d0993d69f57441d244e8d9991f183997ddf7fbb9c33345b71e3a5c722c1cbc27bc0aedb57415154f7910cd7a90660037863876cab9441edf25c19327
-
C:\Windows\system\tUOIzUm.exeFilesize
5.2MB
MD52fe536e59d14bdfbf25b68a433879478
SHA1f9436e21e86bdf608c72923489556687cfd06e79
SHA25649fd3becba79d747652f1760a9171e6616db08793f046e90de32898e55f68abe
SHA5126639ebe2cb3720ccf0350e5eecd193501e67114ec11ce01a2d9037364e3fe4af455bcb35abcce7ff63a0197338d74c29286567242e39dc791d266770bd739c31
-
\Windows\system\ByeLOWm.exeFilesize
5.2MB
MD57afa274dd723d761475284a95dca71e0
SHA1c5abb031ef52a8fb13b8c488006cdecf910ea420
SHA2561ac916a2abced60bd5bebcbbc3aebabeb02a34e19347a6743523e30fab8f66c4
SHA512c04adea17e6fb7cbb971f76d9298f8e9a3305824c92433d3a39ed85d304992a6af763759252b537aaf3080820aee7b2a31f23576c842d8e81c80db9125d4759b
-
\Windows\system\CrJpGsh.exeFilesize
5.2MB
MD5edffe21ce52087aec6543924b04c3b8b
SHA1191f69212a45bcdedbccb51351c96587949cdefa
SHA256d759c3fef688dbaef16dc7963d10af1760c2c0133b8a052358ddbb1a0cbe1878
SHA5129425455b9d8678823febbdb105e029b062dcdba617b1e69ed7f6968fe3ae16f69c1b6bca554f716ad6b011fd6fee22aeabf6112494469dc960cba3bbb1da8db0
-
\Windows\system\DRKzuYz.exeFilesize
5.2MB
MD518144c28f05728622e3d74b0dc81f3f1
SHA1f3ce2eb33ce2b30fb42cda2589585cbd9a0e4089
SHA256d937a85c54d72258ca76b39430df03402df9118e15ad6937e18d5843b6451f77
SHA512e30c716aeaa83cd7e14474d0a7fd41d7ae9aba65e315dac59b1dd5921da17eef31c883e89e408b71f9fe83a3d50886f839edce88d47c45d5a0e8b8f86d838378
-
\Windows\system\JRuXiDb.exeFilesize
5.2MB
MD55108e6ec209b02a044b57aa541e943b1
SHA124875cc76df11c33b6095df9b0856031071bd9e4
SHA2561317cfcc898c9f381a983b191f9cc5858215120c9ac38b724d99ab86b5d02cfa
SHA512608a3ba5c366b9319dfc421fb590234820fb5c8202e76c8daf84234ee1ff86a756000717e59f9eff4d847cdfb7184e0ac76dbd932a037efa4a8391386f490da6
-
\Windows\system\MDFjfNU.exeFilesize
5.2MB
MD5b46cda6180529200a038a82e789819fd
SHA1713402074d0c0021755b6beddc339641f1c53fc2
SHA256c1bd49139df1f7f48843dd80168e07e523e1522d4a1b0ad53311bf9272e640f1
SHA5127efc426c975fd6a4d4e88fd45c9d86ce34d9feabde9f33c6b2d12cfdbcb24b0e4dc6272e164f46fdea649b8a0a0ae8f4df3df4ef19ebccb77c7e54dff322bcc1
-
\Windows\system\QxniJYb.exeFilesize
5.2MB
MD5427200bd9cfc56d9dd7e2a4ed41d849d
SHA14c6890074909df36d87c9ed30bea1b64b5fe043a
SHA256009cf96b122116f0920e970d7a24f1b1df6085942ba12867cd2404fb46dfc9f1
SHA51208ea0c9c9a650a34c9db817e7ae8c02d13df7548f4d9cbb32207e1904b8b1f8656f2c81f74af16fe3a005f307098e7ce0222c2b171cffd3f51770a6a239559fa
-
\Windows\system\RYdnkOe.exeFilesize
5.2MB
MD5ed35fbbc8bc6f485bf1ce0c4ef1ed6e0
SHA1f9c9e42510702b9e0e5f7c75e2a19b2ae2ab5879
SHA25682bb11d53c5f162e0d96c0144a99fde5f3dede76175a266e3d3e6ca4c4161515
SHA5128d91cdef9bb1a214c05abf46a5bb93b47b75eaca9f615a2ea3822e9fa3f136ee61206be8d1d7bdd9627a633da2602c3631ff2759e934e64f7cb680e2ca3e6a17
-
\Windows\system\YeZEXgx.exeFilesize
5.2MB
MD5562a6aefe4bdcdd99bf0103b930ca292
SHA1b302eeea53f20fda51082782dc17cf1d9cc83b2c
SHA2565232fd5267e11e0ca929c4833bc4a5061d33ff555c4e835bfe3b0e9168456cd1
SHA512e423c72ef2ecffb618c15dbb95fc96993f93f2cc0a2cc99d48341a1aac571f854e9e23238b5d61ebaf553f8f6c84ad20ff2b05c1e8eccde69ef5f7c20e3f8857
-
\Windows\system\aWPDkrs.exeFilesize
5.2MB
MD555dbc9f3147ea2c013c66a62ebd15991
SHA104861a46c1d0c6718e404b3e70888feec6f54b31
SHA256cb110be50b15e172718ab5281cb2c51bf1b90a86e1a3bd858d02b6847f5da494
SHA51228ad7d72dcc50d681c1ca24ce7b0f213096caa0a620cdfefd1d6dd661650da0c4558b61cbd2e26940a8a2c185629f2d492e00fe54e1b13400e39ce7da3bd0ac4
-
\Windows\system\knHREJX.exeFilesize
5.2MB
MD55b54366d164b4ad7ebffa49055121967
SHA1bea326ca1fb92bc53ff4a4a02c7dd6d36429e55f
SHA256a79e63711b9b2d663f4e698ffbe3c8e7a696d25382efb49be0eefa95e48846fb
SHA512a211cb2e629bbda26e3a159c1a9468a627a970be8e145084801a224db73eaaa2b96a41b14133192b0a9fc21c24c6deb5c7dd0a24576221a4ef9c6423a80edb40
-
\Windows\system\kyPJxoM.exeFilesize
5.2MB
MD5e15187017a73b60907cab647b27d8c33
SHA1f3bef5da6546441fcb01a074abe767eb0f2470be
SHA256452c17c8083ac3b94448cf058a7b41946d79c005d5537792633523136629a917
SHA512406cec40c8c4a71b26673f56a4162673211d6640d370a8b59756fb5cbdff0c1cacc2e5e227c942821fefa4da30a3cc93b8f3ad685d21e0e32ef874c77cea4231
-
\Windows\system\xefKNpM.exeFilesize
5.2MB
MD56dd9e91cb45131635f89597945dced26
SHA1802c3757ba3c6119f292a42a6baef4305372e2b4
SHA2564a2f7e33e9c72de342ca3149eefb199ae85edf4a5bc231c9c46da63f7d5287de
SHA5124b64776ec4e0438b7f5b62ed6848f37459cbea70603560a0662901c84dcdd2e5df3f913e6680d2e994b0165793cf666997539d4e7c77bc69cb4fdb91563699e3
-
\Windows\system\zJbXjZf.exeFilesize
5.2MB
MD53eda60c34662aa064b7cdb468cf5ad58
SHA15e6b751bbcc0da945b818226c45711e14043b4d1
SHA2562ef66df4ec77a7c341ec06e5fd0c204a45a9e419ed44cb814cc46ec748415be3
SHA5122c8e0925d1a2b12142210a93cad265afac495c9a4c442023a0f44c3e119df4dc0956234ab3f4b422fa2eb9fcb201bf4326e53b10ca95cab2a13ad5c6a31f864e
-
memory/584-275-0x000000013FED0000-0x0000000140221000-memory.dmpFilesize
3.3MB
-
memory/584-126-0x000000013FED0000-0x0000000140221000-memory.dmpFilesize
3.3MB
-
memory/912-141-0x000000013FB40000-0x000000013FE91000-memory.dmpFilesize
3.3MB
-
memory/912-172-0x000000013FB40000-0x000000013FE91000-memory.dmpFilesize
3.3MB
-
memory/912-306-0x000000013FB40000-0x000000013FE91000-memory.dmpFilesize
3.3MB
-
memory/1284-122-0x000000013FDB0000-0x0000000140101000-memory.dmpFilesize
3.3MB
-
memory/1284-289-0x000000013FDB0000-0x0000000140101000-memory.dmpFilesize
3.3MB
-
memory/1544-130-0x000000013F190000-0x000000013F4E1000-memory.dmpFilesize
3.3MB
-
memory/1544-167-0x000000013F190000-0x000000013F4E1000-memory.dmpFilesize
3.3MB
-
memory/1544-298-0x000000013F190000-0x000000013F4E1000-memory.dmpFilesize
3.3MB
-
memory/1728-134-0x000000013F530000-0x000000013F881000-memory.dmpFilesize
3.3MB
-
memory/1728-71-0x000000013F530000-0x000000013F881000-memory.dmpFilesize
3.3MB
-
memory/1728-273-0x000000013F530000-0x000000013F881000-memory.dmpFilesize
3.3MB
-
memory/1960-123-0x000000013FE30000-0x0000000140181000-memory.dmpFilesize
3.3MB
-
memory/1960-160-0x000000013FE30000-0x0000000140181000-memory.dmpFilesize
3.3MB
-
memory/1960-295-0x000000013FE30000-0x0000000140181000-memory.dmpFilesize
3.3MB
-
memory/1964-304-0x000000013F4E0000-0x000000013F831000-memory.dmpFilesize
3.3MB
-
memory/1964-162-0x000000013F4E0000-0x000000013F831000-memory.dmpFilesize
3.3MB
-
memory/1964-124-0x000000013F4E0000-0x000000013F831000-memory.dmpFilesize
3.3MB
-
memory/2112-287-0x000000013F970000-0x000000013FCC1000-memory.dmpFilesize
3.3MB
-
memory/2112-120-0x000000013F970000-0x000000013FCC1000-memory.dmpFilesize
3.3MB
-
memory/2256-259-0x000000013F960000-0x000000013FCB1000-memory.dmpFilesize
3.3MB
-
memory/2256-52-0x000000013F960000-0x000000013FCB1000-memory.dmpFilesize
3.3MB
-
memory/2332-7-0x000000013F830000-0x000000013FB81000-memory.dmpFilesize
3.3MB
-
memory/2332-111-0x000000013F830000-0x000000013FB81000-memory.dmpFilesize
3.3MB
-
memory/2332-204-0x000000013F830000-0x000000013FB81000-memory.dmpFilesize
3.3MB
-
memory/2352-269-0x000000013F470000-0x000000013F7C1000-memory.dmpFilesize
3.3MB
-
memory/2352-118-0x000000013F470000-0x000000013F7C1000-memory.dmpFilesize
3.3MB
-
memory/2352-56-0x000000013F470000-0x000000013F7C1000-memory.dmpFilesize
3.3MB
-
memory/2384-209-0x000000013FBF0000-0x000000013FF41000-memory.dmpFilesize
3.3MB
-
memory/2384-112-0x000000013FBF0000-0x000000013FF41000-memory.dmpFilesize
3.3MB
-
memory/2384-14-0x000000013FBF0000-0x000000013FF41000-memory.dmpFilesize
3.3MB
-
memory/2464-278-0x000000013F5C0000-0x000000013F911000-memory.dmpFilesize
3.3MB
-
memory/2464-89-0x000000013F5C0000-0x000000013F911000-memory.dmpFilesize
3.3MB
-
memory/2504-113-0x000000013F630000-0x000000013F981000-memory.dmpFilesize
3.3MB
-
memory/2504-210-0x000000013F630000-0x000000013F981000-memory.dmpFilesize
3.3MB
-
memory/2504-27-0x000000013F630000-0x000000013F981000-memory.dmpFilesize
3.3MB
-
memory/2564-93-0x000000013F960000-0x000000013FCB1000-memory.dmpFilesize
3.3MB
-
memory/2564-279-0x000000013F960000-0x000000013FCB1000-memory.dmpFilesize
3.3MB
-
memory/2568-158-0x000000013F1B0000-0x000000013F501000-memory.dmpFilesize
3.3MB
-
memory/2568-293-0x000000013F1B0000-0x000000013F501000-memory.dmpFilesize
3.3MB
-
memory/2568-121-0x000000013F1B0000-0x000000013F501000-memory.dmpFilesize
3.3MB
-
memory/2576-257-0x000000013F310000-0x000000013F661000-memory.dmpFilesize
3.3MB
-
memory/2576-49-0x000000013F310000-0x000000013F661000-memory.dmpFilesize
3.3MB
-
memory/2588-262-0x000000013FE60000-0x00000001401B1000-memory.dmpFilesize
3.3MB
-
memory/2588-116-0x000000013FE60000-0x00000001401B1000-memory.dmpFilesize
3.3MB
-
memory/2588-34-0x000000013FE60000-0x00000001401B1000-memory.dmpFilesize
3.3MB
-
memory/2644-29-0x000000013FB20000-0x000000013FE71000-memory.dmpFilesize
3.3MB
-
memory/2644-207-0x000000013FB20000-0x000000013FE71000-memory.dmpFilesize
3.3MB
-
memory/2724-125-0x000000013FCA0000-0x000000013FFF1000-memory.dmpFilesize
3.3MB
-
memory/2724-271-0x000000013FCA0000-0x000000013FFF1000-memory.dmpFilesize
3.3MB
-
memory/2832-165-0x000000013FAD0000-0x000000013FE21000-memory.dmpFilesize
3.3MB
-
memory/2832-307-0x000000013FAD0000-0x000000013FE21000-memory.dmpFilesize
3.3MB
-
memory/2908-28-0x000000013FB20000-0x000000013FE71000-memory.dmpFilesize
3.3MB
-
memory/2908-139-0x000000013FB40000-0x000000013FE91000-memory.dmpFilesize
3.3MB
-
memory/2908-168-0x000000013FE60000-0x00000001401B1000-memory.dmpFilesize
3.3MB
-
memory/2908-255-0x000000013FB40000-0x000000013FE91000-memory.dmpFilesize
3.3MB
-
memory/2908-266-0x000000013FAD0000-0x000000013FE21000-memory.dmpFilesize
3.3MB
-
memory/2908-164-0x000000013FAD0000-0x000000013FE21000-memory.dmpFilesize
3.3MB
-
memory/2908-186-0x00000000021F0000-0x0000000002541000-memory.dmpFilesize
3.3MB
-
memory/2908-202-0x00000000021F0000-0x0000000002541000-memory.dmpFilesize
3.3MB
-
memory/2908-12-0x000000013FBF0000-0x000000013FF41000-memory.dmpFilesize
3.3MB
-
memory/2908-169-0x000000013F1F0000-0x000000013F541000-memory.dmpFilesize
3.3MB
-
memory/2908-50-0x000000013F960000-0x000000013FCB1000-memory.dmpFilesize
3.3MB
-
memory/2908-53-0x000000013F1F0000-0x000000013F541000-memory.dmpFilesize
3.3MB
-
memory/2908-23-0x000000013F630000-0x000000013F981000-memory.dmpFilesize
3.3MB
-
memory/2908-55-0x00000000021F0000-0x0000000002541000-memory.dmpFilesize
3.3MB
-
memory/2908-80-0x000000013FED0000-0x0000000140221000-memory.dmpFilesize
3.3MB
-
memory/2908-0-0x000000013F1F0000-0x000000013F541000-memory.dmpFilesize
3.3MB
-
memory/2908-58-0x000000013FCA0000-0x000000013FFF1000-memory.dmpFilesize
3.3MB
-
memory/2908-1-0x00000000002F0000-0x0000000000300000-memory.dmpFilesize
64KB
-
memory/2908-187-0x000000013FCA0000-0x000000013FFF1000-memory.dmpFilesize
3.3MB