Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 21:53
Behavioral task
behavioral1
Sample
2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe
Resource
win7-20240220-en
General
-
Target
2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe
-
Size
5.2MB
-
MD5
61e26f7e69c3c9693997cdce2ef6e5e5
-
SHA1
be3ad5fd6ff9eaa2a2a67c21917a6b8a2a15df1a
-
SHA256
d6f2e59903ba7e920aba30a1877793754c108272f87b296bb13d56f18e633b5d
-
SHA512
4b50d6bfcad7934441358684e44b0fb8c92394ec71f3834eff34aed9825542bd548a8c199050ec2520c73c2669ef3ec07ca996e9fa26e301bbc6d4b001f348cc
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6ll:RWWBibf56utgpPFotBER/mQ32lUp
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule C:\Windows\system\grzrmMq.exe cobalt_reflective_dll C:\Windows\system\OeZFLoB.exe cobalt_reflective_dll C:\Windows\system\HRONBLA.exe cobalt_reflective_dll C:\Windows\system\YYRLhhu.exe cobalt_reflective_dll C:\Windows\system\XFpnhpc.exe cobalt_reflective_dll C:\Windows\system\yTYgULx.exe cobalt_reflective_dll \Windows\system\ckjsoFO.exe cobalt_reflective_dll \Windows\system\fylzEtY.exe cobalt_reflective_dll \Windows\system\xfDgkkn.exe cobalt_reflective_dll \Windows\system\iHwxwlK.exe cobalt_reflective_dll C:\Windows\system\kOMjZjG.exe cobalt_reflective_dll \Windows\system\BVBVVYU.exe cobalt_reflective_dll C:\Windows\system\GgWsbrA.exe cobalt_reflective_dll C:\Windows\system\FhugaeY.exe cobalt_reflective_dll \Windows\system\bbeospH.exe cobalt_reflective_dll C:\Windows\system\IRMmCgm.exe cobalt_reflective_dll C:\Windows\system\LhiETjc.exe cobalt_reflective_dll \Windows\system\YXEhwYh.exe cobalt_reflective_dll C:\Windows\system\SSwtTRJ.exe cobalt_reflective_dll C:\Windows\system\hrcdtLm.exe cobalt_reflective_dll C:\Windows\system\FEeViRd.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule C:\Windows\system\grzrmMq.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\OeZFLoB.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\HRONBLA.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\YYRLhhu.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\XFpnhpc.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\yTYgULx.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\ckjsoFO.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\fylzEtY.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\xfDgkkn.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\iHwxwlK.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\kOMjZjG.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\BVBVVYU.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\GgWsbrA.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\FhugaeY.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\bbeospH.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\IRMmCgm.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\LhiETjc.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\YXEhwYh.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\SSwtTRJ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\hrcdtLm.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\FEeViRd.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule behavioral1/memory/2932-0-0x000000013F500000-0x000000013F851000-memory.dmp UPX C:\Windows\system\grzrmMq.exe UPX C:\Windows\system\OeZFLoB.exe UPX C:\Windows\system\HRONBLA.exe UPX C:\Windows\system\YYRLhhu.exe UPX C:\Windows\system\XFpnhpc.exe UPX C:\Windows\system\yTYgULx.exe UPX behavioral1/memory/2512-12-0x000000013F990000-0x000000013FCE1000-memory.dmp UPX \Windows\system\ckjsoFO.exe UPX behavioral1/memory/2808-45-0x000000013F3B0000-0x000000013F701000-memory.dmp UPX behavioral1/memory/2620-42-0x000000013F720000-0x000000013FA71000-memory.dmp UPX behavioral1/memory/2980-46-0x000000013FB80000-0x000000013FED1000-memory.dmp UPX behavioral1/memory/1936-48-0x000000013F9F0000-0x000000013FD41000-memory.dmp UPX \Windows\system\fylzEtY.exe UPX behavioral1/memory/2508-53-0x000000013F8B0000-0x000000013FC01000-memory.dmp UPX behavioral1/memory/2612-47-0x000000013FF10000-0x0000000140261000-memory.dmp UPX \Windows\system\xfDgkkn.exe UPX behavioral1/memory/2476-61-0x000000013F680000-0x000000013F9D1000-memory.dmp UPX behavioral1/memory/2472-62-0x000000013F270000-0x000000013F5C1000-memory.dmp UPX \Windows\system\iHwxwlK.exe UPX behavioral1/memory/2116-69-0x000000013FB30000-0x000000013FE81000-memory.dmp UPX C:\Windows\system\kOMjZjG.exe UPX behavioral1/memory/2520-76-0x000000013F200000-0x000000013F551000-memory.dmp UPX \Windows\system\BVBVVYU.exe UPX behavioral1/memory/2788-83-0x000000013F3A0000-0x000000013F6F1000-memory.dmp UPX behavioral1/memory/1772-90-0x000000013F8D0000-0x000000013FC21000-memory.dmp UPX C:\Windows\system\GgWsbrA.exe UPX C:\Windows\system\FhugaeY.exe UPX behavioral1/memory/1580-97-0x000000013FE70000-0x00000001401C1000-memory.dmp UPX \Windows\system\bbeospH.exe UPX C:\Windows\system\IRMmCgm.exe UPX behavioral1/memory/2932-110-0x000000013F500000-0x000000013F851000-memory.dmp UPX C:\Windows\system\LhiETjc.exe UPX \Windows\system\YXEhwYh.exe UPX C:\Windows\system\SSwtTRJ.exe UPX behavioral1/memory/1608-131-0x000000013FF70000-0x00000001402C1000-memory.dmp UPX C:\Windows\system\hrcdtLm.exe UPX behavioral1/memory/1380-137-0x000000013FBE0000-0x000000013FF31000-memory.dmp UPX behavioral1/memory/2460-138-0x000000013F040000-0x000000013F391000-memory.dmp UPX behavioral1/memory/1760-136-0x000000013F230000-0x000000013F581000-memory.dmp UPX C:\Windows\system\FEeViRd.exe UPX behavioral1/memory/1612-139-0x000000013F440000-0x000000013F791000-memory.dmp UPX behavioral1/memory/2488-140-0x000000013FA60000-0x000000013FDB1000-memory.dmp UPX behavioral1/memory/1584-141-0x000000013F720000-0x000000013FA71000-memory.dmp UPX behavioral1/memory/2932-145-0x000000013F500000-0x000000013F851000-memory.dmp UPX behavioral1/memory/2520-156-0x000000013F200000-0x000000013F551000-memory.dmp UPX behavioral1/memory/2788-157-0x000000013F3A0000-0x000000013F6F1000-memory.dmp UPX behavioral1/memory/1772-158-0x000000013F8D0000-0x000000013FC21000-memory.dmp UPX behavioral1/memory/2932-167-0x000000013F500000-0x000000013F851000-memory.dmp UPX behavioral1/memory/2512-224-0x000000013F990000-0x000000013FCE1000-memory.dmp UPX behavioral1/memory/2980-226-0x000000013FB80000-0x000000013FED1000-memory.dmp UPX behavioral1/memory/2620-228-0x000000013F720000-0x000000013FA71000-memory.dmp UPX behavioral1/memory/1936-233-0x000000013F9F0000-0x000000013FD41000-memory.dmp UPX behavioral1/memory/2808-232-0x000000013F3B0000-0x000000013F701000-memory.dmp UPX behavioral1/memory/2612-234-0x000000013FF10000-0x0000000140261000-memory.dmp UPX behavioral1/memory/2508-236-0x000000013F8B0000-0x000000013FC01000-memory.dmp UPX behavioral1/memory/2476-238-0x000000013F680000-0x000000013F9D1000-memory.dmp UPX behavioral1/memory/2472-240-0x000000013F270000-0x000000013F5C1000-memory.dmp UPX behavioral1/memory/2116-242-0x000000013FB30000-0x000000013FE81000-memory.dmp UPX behavioral1/memory/2520-246-0x000000013F200000-0x000000013F551000-memory.dmp UPX behavioral1/memory/2788-248-0x000000013F3A0000-0x000000013F6F1000-memory.dmp UPX behavioral1/memory/1772-250-0x000000013F8D0000-0x000000013FC21000-memory.dmp UPX behavioral1/memory/1580-252-0x000000013FE70000-0x00000001401C1000-memory.dmp UPX behavioral1/memory/1608-254-0x000000013FF70000-0x00000001402C1000-memory.dmp UPX -
XMRig Miner payload 51 IoCs
Processes:
resource yara_rule behavioral1/memory/2512-12-0x000000013F990000-0x000000013FCE1000-memory.dmp xmrig behavioral1/memory/2808-45-0x000000013F3B0000-0x000000013F701000-memory.dmp xmrig behavioral1/memory/2620-42-0x000000013F720000-0x000000013FA71000-memory.dmp xmrig behavioral1/memory/2980-46-0x000000013FB80000-0x000000013FED1000-memory.dmp xmrig behavioral1/memory/1936-48-0x000000013F9F0000-0x000000013FD41000-memory.dmp xmrig behavioral1/memory/2508-53-0x000000013F8B0000-0x000000013FC01000-memory.dmp xmrig behavioral1/memory/2612-47-0x000000013FF10000-0x0000000140261000-memory.dmp xmrig behavioral1/memory/2476-61-0x000000013F680000-0x000000013F9D1000-memory.dmp xmrig behavioral1/memory/2472-62-0x000000013F270000-0x000000013F5C1000-memory.dmp xmrig behavioral1/memory/2116-69-0x000000013FB30000-0x000000013FE81000-memory.dmp xmrig behavioral1/memory/2520-76-0x000000013F200000-0x000000013F551000-memory.dmp xmrig behavioral1/memory/2788-83-0x000000013F3A0000-0x000000013F6F1000-memory.dmp xmrig behavioral1/memory/1772-90-0x000000013F8D0000-0x000000013FC21000-memory.dmp xmrig behavioral1/memory/1580-97-0x000000013FE70000-0x00000001401C1000-memory.dmp xmrig behavioral1/memory/2932-110-0x000000013F500000-0x000000013F851000-memory.dmp xmrig behavioral1/memory/1608-131-0x000000013FF70000-0x00000001402C1000-memory.dmp xmrig behavioral1/memory/1380-137-0x000000013FBE0000-0x000000013FF31000-memory.dmp xmrig behavioral1/memory/2460-138-0x000000013F040000-0x000000013F391000-memory.dmp xmrig behavioral1/memory/1760-136-0x000000013F230000-0x000000013F581000-memory.dmp xmrig behavioral1/memory/2932-127-0x000000013FF70000-0x00000001402C1000-memory.dmp xmrig behavioral1/memory/1612-139-0x000000013F440000-0x000000013F791000-memory.dmp xmrig behavioral1/memory/2488-140-0x000000013FA60000-0x000000013FDB1000-memory.dmp xmrig behavioral1/memory/1584-141-0x000000013F720000-0x000000013FA71000-memory.dmp xmrig behavioral1/memory/2932-142-0x000000013FBE0000-0x000000013FF31000-memory.dmp xmrig behavioral1/memory/2932-144-0x000000013FA60000-0x000000013FDB1000-memory.dmp xmrig behavioral1/memory/2932-145-0x000000013F500000-0x000000013F851000-memory.dmp xmrig behavioral1/memory/2520-156-0x000000013F200000-0x000000013F551000-memory.dmp xmrig behavioral1/memory/2788-157-0x000000013F3A0000-0x000000013F6F1000-memory.dmp xmrig behavioral1/memory/1772-158-0x000000013F8D0000-0x000000013FC21000-memory.dmp xmrig behavioral1/memory/2932-167-0x000000013F500000-0x000000013F851000-memory.dmp xmrig behavioral1/memory/2932-199-0x000000013FBE0000-0x000000013FF31000-memory.dmp xmrig behavioral1/memory/2512-224-0x000000013F990000-0x000000013FCE1000-memory.dmp xmrig behavioral1/memory/2980-226-0x000000013FB80000-0x000000013FED1000-memory.dmp xmrig behavioral1/memory/2620-228-0x000000013F720000-0x000000013FA71000-memory.dmp xmrig behavioral1/memory/1936-233-0x000000013F9F0000-0x000000013FD41000-memory.dmp xmrig behavioral1/memory/2808-232-0x000000013F3B0000-0x000000013F701000-memory.dmp xmrig behavioral1/memory/2612-234-0x000000013FF10000-0x0000000140261000-memory.dmp xmrig behavioral1/memory/2508-236-0x000000013F8B0000-0x000000013FC01000-memory.dmp xmrig behavioral1/memory/2476-238-0x000000013F680000-0x000000013F9D1000-memory.dmp xmrig behavioral1/memory/2472-240-0x000000013F270000-0x000000013F5C1000-memory.dmp xmrig behavioral1/memory/2116-242-0x000000013FB30000-0x000000013FE81000-memory.dmp xmrig behavioral1/memory/2520-246-0x000000013F200000-0x000000013F551000-memory.dmp xmrig behavioral1/memory/2788-248-0x000000013F3A0000-0x000000013F6F1000-memory.dmp xmrig behavioral1/memory/1772-250-0x000000013F8D0000-0x000000013FC21000-memory.dmp xmrig behavioral1/memory/1580-252-0x000000013FE70000-0x00000001401C1000-memory.dmp xmrig behavioral1/memory/1608-254-0x000000013FF70000-0x00000001402C1000-memory.dmp xmrig behavioral1/memory/1760-256-0x000000013F230000-0x000000013F581000-memory.dmp xmrig behavioral1/memory/1584-258-0x000000013F720000-0x000000013FA71000-memory.dmp xmrig behavioral1/memory/2460-264-0x000000013F040000-0x000000013F391000-memory.dmp xmrig behavioral1/memory/1380-266-0x000000013FBE0000-0x000000013FF31000-memory.dmp xmrig behavioral1/memory/2488-268-0x000000013FA60000-0x000000013FDB1000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
grzrmMq.exeyTYgULx.exeOeZFLoB.exeHRONBLA.exeXFpnhpc.exeYYRLhhu.execkjsoFO.exefylzEtY.exexfDgkkn.exeiHwxwlK.exekOMjZjG.exeBVBVVYU.exeGgWsbrA.exeFhugaeY.exeLhiETjc.exebbeospH.exeIRMmCgm.exeFEeViRd.exeSSwtTRJ.exeYXEhwYh.exehrcdtLm.exepid process 2512 grzrmMq.exe 2980 yTYgULx.exe 2620 OeZFLoB.exe 2612 HRONBLA.exe 2808 XFpnhpc.exe 1936 YYRLhhu.exe 2508 ckjsoFO.exe 2476 fylzEtY.exe 2472 xfDgkkn.exe 2116 iHwxwlK.exe 2520 kOMjZjG.exe 2788 BVBVVYU.exe 1772 GgWsbrA.exe 1580 FhugaeY.exe 1608 LhiETjc.exe 1584 bbeospH.exe 1760 IRMmCgm.exe 1380 FEeViRd.exe 2460 SSwtTRJ.exe 1612 YXEhwYh.exe 2488 hrcdtLm.exe -
Loads dropped DLL 21 IoCs
Processes:
2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exepid process 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe -
Processes:
resource yara_rule behavioral1/memory/2932-0-0x000000013F500000-0x000000013F851000-memory.dmp upx C:\Windows\system\grzrmMq.exe upx C:\Windows\system\OeZFLoB.exe upx C:\Windows\system\HRONBLA.exe upx C:\Windows\system\YYRLhhu.exe upx C:\Windows\system\XFpnhpc.exe upx C:\Windows\system\yTYgULx.exe upx behavioral1/memory/2512-12-0x000000013F990000-0x000000013FCE1000-memory.dmp upx \Windows\system\ckjsoFO.exe upx behavioral1/memory/2808-45-0x000000013F3B0000-0x000000013F701000-memory.dmp upx behavioral1/memory/2620-42-0x000000013F720000-0x000000013FA71000-memory.dmp upx behavioral1/memory/2980-46-0x000000013FB80000-0x000000013FED1000-memory.dmp upx behavioral1/memory/1936-48-0x000000013F9F0000-0x000000013FD41000-memory.dmp upx \Windows\system\fylzEtY.exe upx behavioral1/memory/2508-53-0x000000013F8B0000-0x000000013FC01000-memory.dmp upx behavioral1/memory/2612-47-0x000000013FF10000-0x0000000140261000-memory.dmp upx \Windows\system\xfDgkkn.exe upx behavioral1/memory/2476-61-0x000000013F680000-0x000000013F9D1000-memory.dmp upx behavioral1/memory/2472-62-0x000000013F270000-0x000000013F5C1000-memory.dmp upx \Windows\system\iHwxwlK.exe upx behavioral1/memory/2116-69-0x000000013FB30000-0x000000013FE81000-memory.dmp upx C:\Windows\system\kOMjZjG.exe upx behavioral1/memory/2520-76-0x000000013F200000-0x000000013F551000-memory.dmp upx \Windows\system\BVBVVYU.exe upx behavioral1/memory/2788-83-0x000000013F3A0000-0x000000013F6F1000-memory.dmp upx behavioral1/memory/1772-90-0x000000013F8D0000-0x000000013FC21000-memory.dmp upx C:\Windows\system\GgWsbrA.exe upx C:\Windows\system\FhugaeY.exe upx behavioral1/memory/1580-97-0x000000013FE70000-0x00000001401C1000-memory.dmp upx \Windows\system\bbeospH.exe upx C:\Windows\system\IRMmCgm.exe upx behavioral1/memory/2932-110-0x000000013F500000-0x000000013F851000-memory.dmp upx C:\Windows\system\LhiETjc.exe upx \Windows\system\YXEhwYh.exe upx C:\Windows\system\SSwtTRJ.exe upx behavioral1/memory/1608-131-0x000000013FF70000-0x00000001402C1000-memory.dmp upx C:\Windows\system\hrcdtLm.exe upx behavioral1/memory/1380-137-0x000000013FBE0000-0x000000013FF31000-memory.dmp upx behavioral1/memory/2460-138-0x000000013F040000-0x000000013F391000-memory.dmp upx behavioral1/memory/1760-136-0x000000013F230000-0x000000013F581000-memory.dmp upx C:\Windows\system\FEeViRd.exe upx behavioral1/memory/1612-139-0x000000013F440000-0x000000013F791000-memory.dmp upx behavioral1/memory/2488-140-0x000000013FA60000-0x000000013FDB1000-memory.dmp upx behavioral1/memory/1584-141-0x000000013F720000-0x000000013FA71000-memory.dmp upx behavioral1/memory/2932-145-0x000000013F500000-0x000000013F851000-memory.dmp upx behavioral1/memory/2520-156-0x000000013F200000-0x000000013F551000-memory.dmp upx behavioral1/memory/2788-157-0x000000013F3A0000-0x000000013F6F1000-memory.dmp upx behavioral1/memory/1772-158-0x000000013F8D0000-0x000000013FC21000-memory.dmp upx behavioral1/memory/2932-167-0x000000013F500000-0x000000013F851000-memory.dmp upx behavioral1/memory/2512-224-0x000000013F990000-0x000000013FCE1000-memory.dmp upx behavioral1/memory/2980-226-0x000000013FB80000-0x000000013FED1000-memory.dmp upx behavioral1/memory/2620-228-0x000000013F720000-0x000000013FA71000-memory.dmp upx behavioral1/memory/1936-233-0x000000013F9F0000-0x000000013FD41000-memory.dmp upx behavioral1/memory/2808-232-0x000000013F3B0000-0x000000013F701000-memory.dmp upx behavioral1/memory/2612-234-0x000000013FF10000-0x0000000140261000-memory.dmp upx behavioral1/memory/2508-236-0x000000013F8B0000-0x000000013FC01000-memory.dmp upx behavioral1/memory/2476-238-0x000000013F680000-0x000000013F9D1000-memory.dmp upx behavioral1/memory/2472-240-0x000000013F270000-0x000000013F5C1000-memory.dmp upx behavioral1/memory/2116-242-0x000000013FB30000-0x000000013FE81000-memory.dmp upx behavioral1/memory/2520-246-0x000000013F200000-0x000000013F551000-memory.dmp upx behavioral1/memory/2788-248-0x000000013F3A0000-0x000000013F6F1000-memory.dmp upx behavioral1/memory/1772-250-0x000000013F8D0000-0x000000013FC21000-memory.dmp upx behavioral1/memory/1580-252-0x000000013FE70000-0x00000001401C1000-memory.dmp upx behavioral1/memory/1608-254-0x000000013FF70000-0x00000001402C1000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exedescription ioc process File created C:\Windows\System\xfDgkkn.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\BVBVVYU.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\FEeViRd.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\YXEhwYh.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\grzrmMq.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\yTYgULx.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\YYRLhhu.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\XFpnhpc.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\SSwtTRJ.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\OeZFLoB.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\HRONBLA.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\ckjsoFO.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\fylzEtY.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\bbeospH.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\IRMmCgm.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\hrcdtLm.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\iHwxwlK.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\kOMjZjG.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\GgWsbrA.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\FhugaeY.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\LhiETjc.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exedescription pid process Token: SeLockMemoryPrivilege 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe Token: SeLockMemoryPrivilege 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exedescription pid process target process PID 2932 wrote to memory of 2512 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe grzrmMq.exe PID 2932 wrote to memory of 2512 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe grzrmMq.exe PID 2932 wrote to memory of 2512 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe grzrmMq.exe PID 2932 wrote to memory of 2980 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe yTYgULx.exe PID 2932 wrote to memory of 2980 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe yTYgULx.exe PID 2932 wrote to memory of 2980 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe yTYgULx.exe PID 2932 wrote to memory of 2620 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe OeZFLoB.exe PID 2932 wrote to memory of 2620 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe OeZFLoB.exe PID 2932 wrote to memory of 2620 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe OeZFLoB.exe PID 2932 wrote to memory of 2612 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe HRONBLA.exe PID 2932 wrote to memory of 2612 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe HRONBLA.exe PID 2932 wrote to memory of 2612 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe HRONBLA.exe PID 2932 wrote to memory of 1936 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe YYRLhhu.exe PID 2932 wrote to memory of 1936 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe YYRLhhu.exe PID 2932 wrote to memory of 1936 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe YYRLhhu.exe PID 2932 wrote to memory of 2808 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe XFpnhpc.exe PID 2932 wrote to memory of 2808 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe XFpnhpc.exe PID 2932 wrote to memory of 2808 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe XFpnhpc.exe PID 2932 wrote to memory of 2508 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe ckjsoFO.exe PID 2932 wrote to memory of 2508 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe ckjsoFO.exe PID 2932 wrote to memory of 2508 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe ckjsoFO.exe PID 2932 wrote to memory of 2476 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe fylzEtY.exe PID 2932 wrote to memory of 2476 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe fylzEtY.exe PID 2932 wrote to memory of 2476 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe fylzEtY.exe PID 2932 wrote to memory of 2472 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe xfDgkkn.exe PID 2932 wrote to memory of 2472 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe xfDgkkn.exe PID 2932 wrote to memory of 2472 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe xfDgkkn.exe PID 2932 wrote to memory of 2116 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe iHwxwlK.exe PID 2932 wrote to memory of 2116 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe iHwxwlK.exe PID 2932 wrote to memory of 2116 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe iHwxwlK.exe PID 2932 wrote to memory of 2520 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe kOMjZjG.exe PID 2932 wrote to memory of 2520 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe kOMjZjG.exe PID 2932 wrote to memory of 2520 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe kOMjZjG.exe PID 2932 wrote to memory of 2788 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe BVBVVYU.exe PID 2932 wrote to memory of 2788 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe BVBVVYU.exe PID 2932 wrote to memory of 2788 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe BVBVVYU.exe PID 2932 wrote to memory of 1772 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe GgWsbrA.exe PID 2932 wrote to memory of 1772 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe GgWsbrA.exe PID 2932 wrote to memory of 1772 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe GgWsbrA.exe PID 2932 wrote to memory of 1580 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe FhugaeY.exe PID 2932 wrote to memory of 1580 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe FhugaeY.exe PID 2932 wrote to memory of 1580 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe FhugaeY.exe PID 2932 wrote to memory of 1608 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe LhiETjc.exe PID 2932 wrote to memory of 1608 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe LhiETjc.exe PID 2932 wrote to memory of 1608 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe LhiETjc.exe PID 2932 wrote to memory of 1760 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe IRMmCgm.exe PID 2932 wrote to memory of 1760 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe IRMmCgm.exe PID 2932 wrote to memory of 1760 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe IRMmCgm.exe PID 2932 wrote to memory of 1584 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe bbeospH.exe PID 2932 wrote to memory of 1584 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe bbeospH.exe PID 2932 wrote to memory of 1584 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe bbeospH.exe PID 2932 wrote to memory of 1380 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe FEeViRd.exe PID 2932 wrote to memory of 1380 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe FEeViRd.exe PID 2932 wrote to memory of 1380 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe FEeViRd.exe PID 2932 wrote to memory of 2460 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe SSwtTRJ.exe PID 2932 wrote to memory of 2460 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe SSwtTRJ.exe PID 2932 wrote to memory of 2460 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe SSwtTRJ.exe PID 2932 wrote to memory of 2488 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe hrcdtLm.exe PID 2932 wrote to memory of 2488 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe hrcdtLm.exe PID 2932 wrote to memory of 2488 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe hrcdtLm.exe PID 2932 wrote to memory of 1612 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe YXEhwYh.exe PID 2932 wrote to memory of 1612 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe YXEhwYh.exe PID 2932 wrote to memory of 1612 2932 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe YXEhwYh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\grzrmMq.exeC:\Windows\System\grzrmMq.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\yTYgULx.exeC:\Windows\System\yTYgULx.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\OeZFLoB.exeC:\Windows\System\OeZFLoB.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\HRONBLA.exeC:\Windows\System\HRONBLA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YYRLhhu.exeC:\Windows\System\YYRLhhu.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\XFpnhpc.exeC:\Windows\System\XFpnhpc.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ckjsoFO.exeC:\Windows\System\ckjsoFO.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\fylzEtY.exeC:\Windows\System\fylzEtY.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\xfDgkkn.exeC:\Windows\System\xfDgkkn.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\iHwxwlK.exeC:\Windows\System\iHwxwlK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\kOMjZjG.exeC:\Windows\System\kOMjZjG.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\BVBVVYU.exeC:\Windows\System\BVBVVYU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\GgWsbrA.exeC:\Windows\System\GgWsbrA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\FhugaeY.exeC:\Windows\System\FhugaeY.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\LhiETjc.exeC:\Windows\System\LhiETjc.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\IRMmCgm.exeC:\Windows\System\IRMmCgm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bbeospH.exeC:\Windows\System\bbeospH.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\FEeViRd.exeC:\Windows\System\FEeViRd.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\SSwtTRJ.exeC:\Windows\System\SSwtTRJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\hrcdtLm.exeC:\Windows\System\hrcdtLm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YXEhwYh.exeC:\Windows\System\YXEhwYh.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\FEeViRd.exeFilesize
5.2MB
MD5256b3b9980dd95e93fe78841e814a1a4
SHA1898a0b5d957e7f0d421bc402534bb4ef6a2da29f
SHA256d3f6255610aedebc5651c38afc14e0e834caf9cc80d67b2a09f5fe9214036982
SHA512b8836ceb5099d931510b4bdd69c96e026971115c8b02875d342838373c171d1d457b8dee307a70c086055ba1b62204ea898d1cd677b51a15473a35c43d1d465f
-
C:\Windows\system\FhugaeY.exeFilesize
5.2MB
MD52f6a062b989eb140525026e95b779215
SHA1e4df4bd7d67cd61728c99a8cd99db9cde2a0c010
SHA25675ed5a5c7bcc75612f735de4b741d7c56cff27a611d9bf6ef89f55faf8968d95
SHA512ce71ce104844ab2b9d72050cbf1fbaf35b8d8c38cbaedb0e9c2bbf6be2316372fb45afbe473218f581107af4983026261c0b9f8253eba8a8c086694623348a66
-
C:\Windows\system\GgWsbrA.exeFilesize
5.2MB
MD5b5480ed43d172be86566f95ac71676b0
SHA1a076f6ea921afeed4491700286c765a75d3fb4ad
SHA25638bd52ddd2721cfb70a70a56c19f96908ef7454c34425033056c1a3be725cd87
SHA512d10b6dfd39ad2baa4b942d3194b4de26da94af099a932070e2b8a1db44ebfc1835518ef48df24c934be3145905d459af40c13a499e7af48ea9275cce05a2e457
-
C:\Windows\system\HRONBLA.exeFilesize
5.2MB
MD54d0577299baed3ecdd8e20e77f8cb8d6
SHA18aa7a9020e0900a3e97b26bef7dc633cb0f7c592
SHA2563afa786be92f031f56a4251051297f644fc95d7297d01bcaeb55a2eee6da87f0
SHA512854e5905d823617928f010764517180dc42b98c1f2cfccf92139cbc60a53b0d8f0ba4c0cf95820346805b691216e26592c9384a73683c383a1e996b17a815d98
-
C:\Windows\system\IRMmCgm.exeFilesize
5.2MB
MD5c39accd366347ff62bf9d37ff3e51493
SHA1f26a52b93e3047c366112b61016520d5ebf4bb05
SHA256ff1020996c3ea1c00c2e1d06a54ea31718c16dde68197137f2425dcfd477a2c4
SHA51254450639e7a0825e7e5b259e034220872e7506f5d6077f9f2658023acccd0bd15c5c4beb3228a3f262bdf578bb14fb7885671df0d90f8937d2e3b4b7763fb977
-
C:\Windows\system\LhiETjc.exeFilesize
5.2MB
MD52080def53f1743be4a94fa92c1c102b0
SHA11d87ed56e86db18e50b5093c2b11690df0209f52
SHA2565cd6f54d218a0b42c25a72321441f2e9b08913c49a6b987df7af3324ae4551a0
SHA5128540dd406aa1122e82c594a13363b073a2632ba4724e873e782077c09308c43b8b213b3e961959465304a01b93f61a080435f14b95560576062c1fbb78565580
-
C:\Windows\system\OeZFLoB.exeFilesize
5.2MB
MD5335418525ba57fec369eb14f5ab3d075
SHA1a6c9067b38beff20d1fd814a50b08b441f970e2b
SHA2564572ca12d5479c2316c32f6d1cb30cf1acdc959b02a6eb0883bbec5d5c644281
SHA5120a782074616a85cb30f89fbb33835ef6ac3de4e583a6e02cf6c6d3854d03c89d3d9a3499050a862f6d7b6e864fabd88eca998df52815ca209e099965131a7063
-
C:\Windows\system\SSwtTRJ.exeFilesize
5.2MB
MD563f5237e5c33f88307e8cb89024aa252
SHA18498ede6bf4b33e8d2d896e38ffd757015141186
SHA25697b4ba85d7cd75b60458a7c84de9f670f7ce1366acf736f882388dd79b1ac7e5
SHA5120980ec92afd152beba5d781685fcf05a82da8386c82f8e77a0771b1a9cb179a64ed0d835d335ea8dd8c2d21fc6f8508dab39e0712a0a3929d297f545afb84fa1
-
C:\Windows\system\XFpnhpc.exeFilesize
5.2MB
MD59d5b5dd4d0c72ada2b23de2f3f4f3fde
SHA11773094c28dc9c6a08cf704fc18405f156d8efed
SHA256828a3d29039c4971a7d2d0b3be4fe24ca64fb578137769156f8e6566f8a7da70
SHA512fc684d081e29a1f9312d6d7dc2c26349d32aa287ce67afa853143a2cf972dde35af90a19db4890dba8406dd660b8290b02dc5765951bc58d83d7bfae85ceb839
-
C:\Windows\system\YYRLhhu.exeFilesize
5.2MB
MD5a101ca2965d014368989106a463d88d0
SHA17187d32d6e2ff5697427597f9a789ac3a5b90c0e
SHA256824a36fc1bb6618226fe080db22772c592e0f714617d609bd5d05d4684bca5af
SHA512f51a2b33316acd050903f505f2b8d495cfaa267e44872998ce0969df8bf895d624f7a0163a5754bc919e5fd993bb0d67490173a686730df604f06c38b3bc7a53
-
C:\Windows\system\grzrmMq.exeFilesize
5.2MB
MD50115217a24948e80e04d2275007dfa71
SHA1210812c6b7676e0ddf456ed7cf11a886bc55106b
SHA2561c67d545739e10e068c6344c4ec57b96681dd6e153f505af6fdc136483e77274
SHA512056533d02e8edfb8ce2447671092b6557891663e35fb953dd3eae34d1680051a6cb49f679719748476e5114fd897bdf123e27f695fff9752ab0d92b2e90ed81c
-
C:\Windows\system\hrcdtLm.exeFilesize
5.2MB
MD5241ea006319da638eb0bda53be210e2d
SHA199cd57592a2ebbb9c0697ffaef9c1b0c07e27956
SHA25604db9268bfc1fff1f5aa888d9def6bb0e7ec872c3fefabbe77e68f48dc46fcc1
SHA512821f718d4909f3e046665403ed363f9fc788710ec5a9d372f35c59a7fb33e6e3729d30151f9f0645f0227d8dfe781f2340b8b9617051de584e081f1ec15431fa
-
C:\Windows\system\kOMjZjG.exeFilesize
5.2MB
MD58b52cf3902feba84da856576bc0004c8
SHA1c139527ffcce711010c05b4ad13f39d840d2914c
SHA256e3b5b559adc92fd7ee12c270d3180645ba32f03137f46415bb08dec07622d416
SHA512c3ede2f2a6a562e43afe530b8e988937ab785e3faa597cdecea19f52cb41c85dc0c33ac1b37397e35eac8d2e0e8f2c1c8c42c762efcdd2913dd618a895cbb83f
-
C:\Windows\system\yTYgULx.exeFilesize
5.2MB
MD5e855bf26392dbd1d081a47a7e823228d
SHA1550607a00beee9f2b31b3a3d0d27473149d5ace6
SHA256e8aa8f6172ba658b5ec4f6e9ed76e686384cc56f6bf11f0c3a2deceef0c9a17c
SHA512ca23c015801281dfd1f0e97044725667038713989e040ee936e9b30f14a8f63b036119b71da165c176348481f3aa2ef7077c9c3c5f5ab5afc847d1b262cea741
-
\Windows\system\BVBVVYU.exeFilesize
5.2MB
MD517151d2a034f1ecfea9c953619f09a1c
SHA150e018e61d288291b999e2195b71ad1bbb2477eb
SHA256b981462a47d30c2f32369a10eed6b7935b8e8a18d551f3487edf03eeabe73f6e
SHA5120b61764db6adcd5afa3d4296aa23d6271aa9367cc7921b2bc9630a9b6d830dff7e8ca21b1c9c7f72b31b8b7f54d6c732291333c49b7bdbf8508297ed3aa9eaaa
-
\Windows\system\YXEhwYh.exeFilesize
5.2MB
MD569d42110e5ccf8423112c459fb4ed4cd
SHA11d042ef13fc2b73f4ed1dc88285aac8d0eb2f9d9
SHA256af6b4bab478fad174bdc9c4057930e45857a93c3aa20ec00c75242e85d11568c
SHA51213b0d54aff660d79e43c6c395d51cad3c313485a97be45b2065c25149cb4baf17ece2bdaab9539248a8c46ad60b50cc5d737cffaa04210b4f849a6fb7b7bd318
-
\Windows\system\bbeospH.exeFilesize
5.2MB
MD57c35684648bc49ff6d7e96ff974233ea
SHA163c68b52a647eede0013a6dea32f15b943b98e35
SHA2568edaab2504e4588b91bbd08900944b36c81bf074dcf252d95cf8119926ac0018
SHA5121ee34070093176ef45cbb6b0af7e526e6e711c38c7266e49309b3d931dfeda4840b4b3bbf854599ea43e27622851e57487e494b114f18022c7d0fa8ef5867826
-
\Windows\system\ckjsoFO.exeFilesize
5.2MB
MD535a28f4e8ed3a3c0c4c80258f336d38f
SHA14f4d4e1bedfdbcef4a101dbd321819c9e1d10f30
SHA2560e9b2551b7048cd9b73980e121c7bde7bcff106d9a7b2b6350beebf8f62cb364
SHA5123b25ef61dc9f6e2ef1e072e2ff1e3fa77dc266506f07a15f71b2a2c2a84fae335124ce567e1fee0cec819f6c5c06129f3d206ee9cf46ec6674ef406bd523d106
-
\Windows\system\fylzEtY.exeFilesize
5.2MB
MD574ee306cbad67ab92489c7d44df8b756
SHA1165f51fa8b71c2649e7d10b905e48a1e0f50f492
SHA256b73bf6ef460e4ebe413d54f2c58316d183c0827428529026be57d93874ba7d84
SHA512db30fdd899058f5226545749822fa5b8c063909d1bf306a73b090ac212903bbea48e616efe77c95fb51842cba94256fe5509c2a2339eb73ea5e931b8244b03bc
-
\Windows\system\iHwxwlK.exeFilesize
5.2MB
MD5427a67e4153946399abe9b3e1a599251
SHA183dd361a194a01b291bd6495e3d8c517fe0145ef
SHA256018a11add2f5367880e578cdd19db35b276b5bfe301257d22485ca118aeaf007
SHA512138e5166b78364fd4d871b1e4b03851c9c82d36fd2fad1eb2837ca7aca62a1e571d5889b1661e73ce0fd40dddad3bd99bb72dfc691d3a2d831c85e7b1d3ac807
-
\Windows\system\xfDgkkn.exeFilesize
5.2MB
MD5603f8aa193ea1eac0b169747d3bece72
SHA1995b48eb8ad1e94ff93a3250cfc266e409ceb7c6
SHA2569acd60310f9e2b15d8765880980ce30b3b558e6454b8255231b20b777dbf6d7b
SHA512986e5eed22041904f6c54775cdf423c62d69decfa50f0f3498b265b79d045611d3fc6356534267a732628dfbbce976ef1f80a84e8a900de4f27ee1f18f217f63
-
memory/1380-266-0x000000013FBE0000-0x000000013FF31000-memory.dmpFilesize
3.3MB
-
memory/1380-137-0x000000013FBE0000-0x000000013FF31000-memory.dmpFilesize
3.3MB
-
memory/1580-252-0x000000013FE70000-0x00000001401C1000-memory.dmpFilesize
3.3MB
-
memory/1580-97-0x000000013FE70000-0x00000001401C1000-memory.dmpFilesize
3.3MB
-
memory/1584-141-0x000000013F720000-0x000000013FA71000-memory.dmpFilesize
3.3MB
-
memory/1584-258-0x000000013F720000-0x000000013FA71000-memory.dmpFilesize
3.3MB
-
memory/1608-254-0x000000013FF70000-0x00000001402C1000-memory.dmpFilesize
3.3MB
-
memory/1608-131-0x000000013FF70000-0x00000001402C1000-memory.dmpFilesize
3.3MB
-
memory/1612-139-0x000000013F440000-0x000000013F791000-memory.dmpFilesize
3.3MB
-
memory/1760-256-0x000000013F230000-0x000000013F581000-memory.dmpFilesize
3.3MB
-
memory/1760-136-0x000000013F230000-0x000000013F581000-memory.dmpFilesize
3.3MB
-
memory/1772-158-0x000000013F8D0000-0x000000013FC21000-memory.dmpFilesize
3.3MB
-
memory/1772-250-0x000000013F8D0000-0x000000013FC21000-memory.dmpFilesize
3.3MB
-
memory/1772-90-0x000000013F8D0000-0x000000013FC21000-memory.dmpFilesize
3.3MB
-
memory/1936-233-0x000000013F9F0000-0x000000013FD41000-memory.dmpFilesize
3.3MB
-
memory/1936-48-0x000000013F9F0000-0x000000013FD41000-memory.dmpFilesize
3.3MB
-
memory/2116-69-0x000000013FB30000-0x000000013FE81000-memory.dmpFilesize
3.3MB
-
memory/2116-242-0x000000013FB30000-0x000000013FE81000-memory.dmpFilesize
3.3MB
-
memory/2460-138-0x000000013F040000-0x000000013F391000-memory.dmpFilesize
3.3MB
-
memory/2460-264-0x000000013F040000-0x000000013F391000-memory.dmpFilesize
3.3MB
-
memory/2472-240-0x000000013F270000-0x000000013F5C1000-memory.dmpFilesize
3.3MB
-
memory/2472-62-0x000000013F270000-0x000000013F5C1000-memory.dmpFilesize
3.3MB
-
memory/2476-61-0x000000013F680000-0x000000013F9D1000-memory.dmpFilesize
3.3MB
-
memory/2476-238-0x000000013F680000-0x000000013F9D1000-memory.dmpFilesize
3.3MB
-
memory/2488-140-0x000000013FA60000-0x000000013FDB1000-memory.dmpFilesize
3.3MB
-
memory/2488-268-0x000000013FA60000-0x000000013FDB1000-memory.dmpFilesize
3.3MB
-
memory/2508-236-0x000000013F8B0000-0x000000013FC01000-memory.dmpFilesize
3.3MB
-
memory/2508-53-0x000000013F8B0000-0x000000013FC01000-memory.dmpFilesize
3.3MB
-
memory/2512-224-0x000000013F990000-0x000000013FCE1000-memory.dmpFilesize
3.3MB
-
memory/2512-12-0x000000013F990000-0x000000013FCE1000-memory.dmpFilesize
3.3MB
-
memory/2520-246-0x000000013F200000-0x000000013F551000-memory.dmpFilesize
3.3MB
-
memory/2520-156-0x000000013F200000-0x000000013F551000-memory.dmpFilesize
3.3MB
-
memory/2520-76-0x000000013F200000-0x000000013F551000-memory.dmpFilesize
3.3MB
-
memory/2612-47-0x000000013FF10000-0x0000000140261000-memory.dmpFilesize
3.3MB
-
memory/2612-234-0x000000013FF10000-0x0000000140261000-memory.dmpFilesize
3.3MB
-
memory/2620-228-0x000000013F720000-0x000000013FA71000-memory.dmpFilesize
3.3MB
-
memory/2620-42-0x000000013F720000-0x000000013FA71000-memory.dmpFilesize
3.3MB
-
memory/2788-248-0x000000013F3A0000-0x000000013F6F1000-memory.dmpFilesize
3.3MB
-
memory/2788-157-0x000000013F3A0000-0x000000013F6F1000-memory.dmpFilesize
3.3MB
-
memory/2788-83-0x000000013F3A0000-0x000000013F6F1000-memory.dmpFilesize
3.3MB
-
memory/2808-45-0x000000013F3B0000-0x000000013F701000-memory.dmpFilesize
3.3MB
-
memory/2808-232-0x000000013F3B0000-0x000000013F701000-memory.dmpFilesize
3.3MB
-
memory/2932-167-0x000000013F500000-0x000000013F851000-memory.dmpFilesize
3.3MB
-
memory/2932-78-0x0000000002320000-0x0000000002671000-memory.dmpFilesize
3.3MB
-
memory/2932-96-0x000000013FE70000-0x00000001401C1000-memory.dmpFilesize
3.3MB
-
memory/2932-181-0x000000013F8D0000-0x000000013FC21000-memory.dmpFilesize
3.3MB
-
memory/2932-190-0x000000013FE70000-0x00000001401C1000-memory.dmpFilesize
3.3MB
-
memory/2932-191-0x000000013FF70000-0x00000001402C1000-memory.dmpFilesize
3.3MB
-
memory/2932-199-0x000000013FBE0000-0x000000013FF31000-memory.dmpFilesize
3.3MB
-
memory/2932-201-0x000000013FA60000-0x000000013FDB1000-memory.dmpFilesize
3.3MB
-
memory/2932-110-0x000000013F500000-0x000000013F851000-memory.dmpFilesize
3.3MB
-
memory/2932-1-0x00000000002F0000-0x0000000000300000-memory.dmpFilesize
64KB
-
memory/2932-143-0x000000013F040000-0x000000013F391000-memory.dmpFilesize
3.3MB
-
memory/2932-145-0x000000013F500000-0x000000013F851000-memory.dmpFilesize
3.3MB
-
memory/2932-142-0x000000013FBE0000-0x000000013FF31000-memory.dmpFilesize
3.3MB
-
memory/2932-88-0x000000013F8D0000-0x000000013FC21000-memory.dmpFilesize
3.3MB
-
memory/2932-74-0x0000000002320000-0x0000000002671000-memory.dmpFilesize
3.3MB
-
memory/2932-68-0x000000013FB30000-0x000000013FE81000-memory.dmpFilesize
3.3MB
-
memory/2932-59-0x0000000002320000-0x0000000002671000-memory.dmpFilesize
3.3MB
-
memory/2932-0-0x000000013F500000-0x000000013F851000-memory.dmpFilesize
3.3MB
-
memory/2932-36-0x000000013FF10000-0x0000000140261000-memory.dmpFilesize
3.3MB
-
memory/2932-127-0x000000013FF70000-0x00000001402C1000-memory.dmpFilesize
3.3MB
-
memory/2932-134-0x0000000002320000-0x0000000002671000-memory.dmpFilesize
3.3MB
-
memory/2932-144-0x000000013FA60000-0x000000013FDB1000-memory.dmpFilesize
3.3MB
-
memory/2932-44-0x0000000002320000-0x0000000002671000-memory.dmpFilesize
3.3MB
-
memory/2932-7-0x000000013F990000-0x000000013FCE1000-memory.dmpFilesize
3.3MB
-
memory/2932-29-0x0000000002320000-0x0000000002671000-memory.dmpFilesize
3.3MB
-
memory/2932-37-0x000000013F9F0000-0x000000013FD41000-memory.dmpFilesize
3.3MB
-
memory/2980-46-0x000000013FB80000-0x000000013FED1000-memory.dmpFilesize
3.3MB
-
memory/2980-226-0x000000013FB80000-0x000000013FED1000-memory.dmpFilesize
3.3MB