Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 22:01
Behavioral task
behavioral1
Sample
2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe
Resource
win7-20240221-en
General
-
Target
2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe
-
Size
5.2MB
-
MD5
d99fbd896cee47679d13aa76c73fc30e
-
SHA1
289dfafc1bffd18a8189c8bb86aa81526cc16a99
-
SHA256
52790220da8cdba2de94087766cfa2d6ee4d0e1ae2823275c7ccfe037cf71731
-
SHA512
4ae820d3fc701ab40fda0d3737738d5fa2b5a03a43de210ac8b7be3709c89858acb1ae0a0e296551e5127455e59d5a5918ff168a25ae94cc704afb0374100fcf
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6l3:RWWBibf56utgpPFotBER/mQ32lUz
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\xkKUueg.exe cobalt_reflective_dll C:\Windows\system\jfpcZAB.exe cobalt_reflective_dll \Windows\system\CbqJayq.exe cobalt_reflective_dll C:\Windows\system\uJHsJBi.exe cobalt_reflective_dll \Windows\system\ZTxNGwL.exe cobalt_reflective_dll C:\Windows\system\xmfbwBI.exe cobalt_reflective_dll \Windows\system\EhSucmC.exe cobalt_reflective_dll \Windows\system\GaDTyXi.exe cobalt_reflective_dll \Windows\system\BUGasPh.exe cobalt_reflective_dll \Windows\system\ihadxiQ.exe cobalt_reflective_dll C:\Windows\system\XsbxERa.exe cobalt_reflective_dll \Windows\system\kSgvzUx.exe cobalt_reflective_dll C:\Windows\system\ancStOa.exe cobalt_reflective_dll \Windows\system\SZxjMdk.exe cobalt_reflective_dll \Windows\system\aEBeHDB.exe cobalt_reflective_dll C:\Windows\system\FIEmqgX.exe cobalt_reflective_dll C:\Windows\system\keCGbql.exe cobalt_reflective_dll C:\Windows\system\qSgLEml.exe cobalt_reflective_dll \Windows\system\wmJOsYS.exe cobalt_reflective_dll C:\Windows\system\XLBXzvW.exe cobalt_reflective_dll C:\Windows\system\paHxYJz.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule \Windows\system\xkKUueg.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\jfpcZAB.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\CbqJayq.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\uJHsJBi.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\ZTxNGwL.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\xmfbwBI.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\EhSucmC.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\GaDTyXi.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\BUGasPh.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\ihadxiQ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\XsbxERa.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\kSgvzUx.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\ancStOa.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\SZxjMdk.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\aEBeHDB.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\FIEmqgX.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\keCGbql.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\qSgLEml.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\wmJOsYS.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\XLBXzvW.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\paHxYJz.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule behavioral1/memory/2516-1-0x000000013F5F0000-0x000000013F941000-memory.dmp UPX \Windows\system\xkKUueg.exe UPX C:\Windows\system\jfpcZAB.exe UPX \Windows\system\CbqJayq.exe UPX C:\Windows\system\uJHsJBi.exe UPX behavioral1/memory/2312-26-0x000000013F200000-0x000000013F551000-memory.dmp UPX behavioral1/memory/2800-30-0x000000013FBE0000-0x000000013FF31000-memory.dmp UPX \Windows\system\ZTxNGwL.exe UPX behavioral1/memory/2868-38-0x000000013FAA0000-0x000000013FDF1000-memory.dmp UPX C:\Windows\system\xmfbwBI.exe UPX behavioral1/memory/2692-42-0x000000013F580000-0x000000013F8D1000-memory.dmp UPX behavioral1/memory/2628-29-0x000000013F600000-0x000000013F951000-memory.dmp UPX behavioral1/memory/1192-28-0x000000013F3E0000-0x000000013F731000-memory.dmp UPX \Windows\system\EhSucmC.exe UPX \Windows\system\GaDTyXi.exe UPX \Windows\system\BUGasPh.exe UPX \Windows\system\ihadxiQ.exe UPX behavioral1/memory/2440-61-0x000000013FF30000-0x0000000140281000-memory.dmp UPX behavioral1/memory/2604-47-0x000000013FAD0000-0x000000013FE21000-memory.dmp UPX C:\Windows\system\XsbxERa.exe UPX behavioral1/memory/2480-70-0x000000013F670000-0x000000013F9C1000-memory.dmp UPX behavioral1/memory/2888-71-0x000000013F120000-0x000000013F471000-memory.dmp UPX \Windows\system\kSgvzUx.exe UPX C:\Windows\system\ancStOa.exe UPX \Windows\system\SZxjMdk.exe UPX \Windows\system\aEBeHDB.exe UPX behavioral1/memory/2516-72-0x000000013F5F0000-0x000000013F941000-memory.dmp UPX behavioral1/memory/2416-91-0x000000013FDE0000-0x0000000140131000-memory.dmp UPX C:\Windows\system\FIEmqgX.exe UPX C:\Windows\system\keCGbql.exe UPX C:\Windows\system\qSgLEml.exe UPX behavioral1/memory/2724-97-0x000000013F4D0000-0x000000013F821000-memory.dmp UPX \Windows\system\wmJOsYS.exe UPX C:\Windows\system\XLBXzvW.exe UPX behavioral1/memory/1928-126-0x000000013FB90000-0x000000013FEE1000-memory.dmp UPX behavioral1/memory/1904-132-0x000000013F8C0000-0x000000013FC11000-memory.dmp UPX behavioral1/memory/2276-133-0x000000013F0F0000-0x000000013F441000-memory.dmp UPX behavioral1/memory/2712-136-0x000000013F580000-0x000000013F8D1000-memory.dmp UPX behavioral1/memory/2036-139-0x000000013FFA0000-0x00000001402F1000-memory.dmp UPX C:\Windows\system\paHxYJz.exe UPX behavioral1/memory/1464-144-0x000000013FAF0000-0x000000013FE41000-memory.dmp UPX behavioral1/memory/388-138-0x000000013F220000-0x000000013F571000-memory.dmp UPX behavioral1/memory/1672-125-0x000000013FDA0000-0x00000001400F1000-memory.dmp UPX behavioral1/memory/2740-123-0x000000013F260000-0x000000013F5B1000-memory.dmp UPX behavioral1/memory/2516-146-0x000000013F5F0000-0x000000013F941000-memory.dmp UPX behavioral1/memory/2692-151-0x000000013F580000-0x000000013F8D1000-memory.dmp UPX behavioral1/memory/2868-152-0x000000013FAA0000-0x000000013FDF1000-memory.dmp UPX behavioral1/memory/2440-154-0x000000013FF30000-0x0000000140281000-memory.dmp UPX behavioral1/memory/2604-153-0x000000013FAD0000-0x000000013FE21000-memory.dmp UPX behavioral1/memory/2416-157-0x000000013FDE0000-0x0000000140131000-memory.dmp UPX behavioral1/memory/388-163-0x000000013F220000-0x000000013F571000-memory.dmp UPX behavioral1/memory/1464-167-0x000000013FAF0000-0x000000013FE41000-memory.dmp UPX behavioral1/memory/2516-168-0x000000013F5F0000-0x000000013F941000-memory.dmp UPX behavioral1/memory/1192-217-0x000000013F3E0000-0x000000013F731000-memory.dmp UPX behavioral1/memory/2312-219-0x000000013F200000-0x000000013F551000-memory.dmp UPX behavioral1/memory/2800-221-0x000000013FBE0000-0x000000013FF31000-memory.dmp UPX behavioral1/memory/2628-223-0x000000013F600000-0x000000013F951000-memory.dmp UPX behavioral1/memory/2692-230-0x000000013F580000-0x000000013F8D1000-memory.dmp UPX behavioral1/memory/2868-232-0x000000013FAA0000-0x000000013FDF1000-memory.dmp UPX behavioral1/memory/2440-237-0x000000013FF30000-0x0000000140281000-memory.dmp UPX behavioral1/memory/2888-240-0x000000013F120000-0x000000013F471000-memory.dmp UPX behavioral1/memory/2480-239-0x000000013F670000-0x000000013F9C1000-memory.dmp UPX behavioral1/memory/2604-235-0x000000013FAD0000-0x000000013FE21000-memory.dmp UPX behavioral1/memory/2416-247-0x000000013FDE0000-0x0000000140131000-memory.dmp UPX -
XMRig Miner payload 52 IoCs
Processes:
resource yara_rule behavioral1/memory/2312-26-0x000000013F200000-0x000000013F551000-memory.dmp xmrig behavioral1/memory/2800-30-0x000000013FBE0000-0x000000013FF31000-memory.dmp xmrig behavioral1/memory/2692-42-0x000000013F580000-0x000000013F8D1000-memory.dmp xmrig behavioral1/memory/2628-29-0x000000013F600000-0x000000013F951000-memory.dmp xmrig behavioral1/memory/1192-28-0x000000013F3E0000-0x000000013F731000-memory.dmp xmrig behavioral1/memory/2440-61-0x000000013FF30000-0x0000000140281000-memory.dmp xmrig behavioral1/memory/2480-70-0x000000013F670000-0x000000013F9C1000-memory.dmp xmrig behavioral1/memory/2888-71-0x000000013F120000-0x000000013F471000-memory.dmp xmrig behavioral1/memory/2516-85-0x000000013FDE0000-0x0000000140131000-memory.dmp xmrig behavioral1/memory/2516-72-0x000000013F5F0000-0x000000013F941000-memory.dmp xmrig behavioral1/memory/2416-91-0x000000013FDE0000-0x0000000140131000-memory.dmp xmrig behavioral1/memory/2724-97-0x000000013F4D0000-0x000000013F821000-memory.dmp xmrig behavioral1/memory/2516-119-0x000000013F260000-0x000000013F5B1000-memory.dmp xmrig behavioral1/memory/1928-126-0x000000013FB90000-0x000000013FEE1000-memory.dmp xmrig behavioral1/memory/1904-132-0x000000013F8C0000-0x000000013FC11000-memory.dmp xmrig behavioral1/memory/2276-133-0x000000013F0F0000-0x000000013F441000-memory.dmp xmrig behavioral1/memory/2712-136-0x000000013F580000-0x000000013F8D1000-memory.dmp xmrig behavioral1/memory/2036-139-0x000000013FFA0000-0x00000001402F1000-memory.dmp xmrig behavioral1/memory/388-138-0x000000013F220000-0x000000013F571000-memory.dmp xmrig behavioral1/memory/1672-125-0x000000013FDA0000-0x00000001400F1000-memory.dmp xmrig behavioral1/memory/2740-123-0x000000013F260000-0x000000013F5B1000-memory.dmp xmrig behavioral1/memory/2516-146-0x000000013F5F0000-0x000000013F941000-memory.dmp xmrig behavioral1/memory/2692-151-0x000000013F580000-0x000000013F8D1000-memory.dmp xmrig behavioral1/memory/2868-152-0x000000013FAA0000-0x000000013FDF1000-memory.dmp xmrig behavioral1/memory/2440-154-0x000000013FF30000-0x0000000140281000-memory.dmp xmrig behavioral1/memory/2604-153-0x000000013FAD0000-0x000000013FE21000-memory.dmp xmrig behavioral1/memory/2416-157-0x000000013FDE0000-0x0000000140131000-memory.dmp xmrig behavioral1/memory/388-163-0x000000013F220000-0x000000013F571000-memory.dmp xmrig behavioral1/memory/1464-167-0x000000013FAF0000-0x000000013FE41000-memory.dmp xmrig behavioral1/memory/2516-168-0x000000013F5F0000-0x000000013F941000-memory.dmp xmrig behavioral1/memory/2516-208-0x000000013FAF0000-0x000000013FE41000-memory.dmp xmrig behavioral1/memory/1192-217-0x000000013F3E0000-0x000000013F731000-memory.dmp xmrig behavioral1/memory/2312-219-0x000000013F200000-0x000000013F551000-memory.dmp xmrig behavioral1/memory/2800-221-0x000000013FBE0000-0x000000013FF31000-memory.dmp xmrig behavioral1/memory/2628-223-0x000000013F600000-0x000000013F951000-memory.dmp xmrig behavioral1/memory/2692-230-0x000000013F580000-0x000000013F8D1000-memory.dmp xmrig behavioral1/memory/2868-232-0x000000013FAA0000-0x000000013FDF1000-memory.dmp xmrig behavioral1/memory/2440-237-0x000000013FF30000-0x0000000140281000-memory.dmp xmrig behavioral1/memory/2888-240-0x000000013F120000-0x000000013F471000-memory.dmp xmrig behavioral1/memory/2480-239-0x000000013F670000-0x000000013F9C1000-memory.dmp xmrig behavioral1/memory/2604-235-0x000000013FAD0000-0x000000013FE21000-memory.dmp xmrig behavioral1/memory/2416-247-0x000000013FDE0000-0x0000000140131000-memory.dmp xmrig behavioral1/memory/2724-249-0x000000013F4D0000-0x000000013F821000-memory.dmp xmrig behavioral1/memory/2740-251-0x000000013F260000-0x000000013F5B1000-memory.dmp xmrig behavioral1/memory/2712-253-0x000000013F580000-0x000000013F8D1000-memory.dmp xmrig behavioral1/memory/2276-257-0x000000013F0F0000-0x000000013F441000-memory.dmp xmrig behavioral1/memory/1904-256-0x000000013F8C0000-0x000000013FC11000-memory.dmp xmrig behavioral1/memory/1672-259-0x000000013FDA0000-0x00000001400F1000-memory.dmp xmrig behavioral1/memory/1928-264-0x000000013FB90000-0x000000013FEE1000-memory.dmp xmrig behavioral1/memory/2036-266-0x000000013FFA0000-0x00000001402F1000-memory.dmp xmrig behavioral1/memory/388-268-0x000000013F220000-0x000000013F571000-memory.dmp xmrig behavioral1/memory/1464-270-0x000000013FAF0000-0x000000013FE41000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
xkKUueg.exejfpcZAB.exeCbqJayq.exeuJHsJBi.exeZTxNGwL.exexmfbwBI.exeGaDTyXi.exeEhSucmC.exeihadxiQ.exeBUGasPh.exeXsbxERa.exeancStOa.exekSgvzUx.exeaEBeHDB.exeSZxjMdk.exeFIEmqgX.exekeCGbql.exeqSgLEml.exewmJOsYS.exeXLBXzvW.exepaHxYJz.exepid process 1192 xkKUueg.exe 2312 jfpcZAB.exe 2628 CbqJayq.exe 2800 uJHsJBi.exe 2868 ZTxNGwL.exe 2692 xmfbwBI.exe 2604 GaDTyXi.exe 2440 EhSucmC.exe 2480 ihadxiQ.exe 2888 BUGasPh.exe 2416 XsbxERa.exe 2724 ancStOa.exe 2740 kSgvzUx.exe 2712 aEBeHDB.exe 1672 SZxjMdk.exe 1928 FIEmqgX.exe 1904 keCGbql.exe 2276 qSgLEml.exe 388 wmJOsYS.exe 2036 XLBXzvW.exe 1464 paHxYJz.exe -
Loads dropped DLL 21 IoCs
Processes:
2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exepid process 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe -
Processes:
resource yara_rule behavioral1/memory/2516-1-0x000000013F5F0000-0x000000013F941000-memory.dmp upx \Windows\system\xkKUueg.exe upx C:\Windows\system\jfpcZAB.exe upx behavioral1/memory/2516-7-0x00000000023A0000-0x00000000026F1000-memory.dmp upx \Windows\system\CbqJayq.exe upx C:\Windows\system\uJHsJBi.exe upx behavioral1/memory/2312-26-0x000000013F200000-0x000000013F551000-memory.dmp upx behavioral1/memory/2800-30-0x000000013FBE0000-0x000000013FF31000-memory.dmp upx \Windows\system\ZTxNGwL.exe upx behavioral1/memory/2868-38-0x000000013FAA0000-0x000000013FDF1000-memory.dmp upx C:\Windows\system\xmfbwBI.exe upx behavioral1/memory/2692-42-0x000000013F580000-0x000000013F8D1000-memory.dmp upx behavioral1/memory/2628-29-0x000000013F600000-0x000000013F951000-memory.dmp upx behavioral1/memory/1192-28-0x000000013F3E0000-0x000000013F731000-memory.dmp upx \Windows\system\EhSucmC.exe upx \Windows\system\GaDTyXi.exe upx \Windows\system\BUGasPh.exe upx \Windows\system\ihadxiQ.exe upx behavioral1/memory/2440-61-0x000000013FF30000-0x0000000140281000-memory.dmp upx behavioral1/memory/2604-47-0x000000013FAD0000-0x000000013FE21000-memory.dmp upx C:\Windows\system\XsbxERa.exe upx behavioral1/memory/2480-70-0x000000013F670000-0x000000013F9C1000-memory.dmp upx behavioral1/memory/2888-71-0x000000013F120000-0x000000013F471000-memory.dmp upx \Windows\system\kSgvzUx.exe upx C:\Windows\system\ancStOa.exe upx \Windows\system\SZxjMdk.exe upx \Windows\system\aEBeHDB.exe upx behavioral1/memory/2516-72-0x000000013F5F0000-0x000000013F941000-memory.dmp upx behavioral1/memory/2416-91-0x000000013FDE0000-0x0000000140131000-memory.dmp upx C:\Windows\system\FIEmqgX.exe upx C:\Windows\system\keCGbql.exe upx C:\Windows\system\qSgLEml.exe upx behavioral1/memory/2724-97-0x000000013F4D0000-0x000000013F821000-memory.dmp upx \Windows\system\wmJOsYS.exe upx C:\Windows\system\XLBXzvW.exe upx behavioral1/memory/1928-126-0x000000013FB90000-0x000000013FEE1000-memory.dmp upx behavioral1/memory/1904-132-0x000000013F8C0000-0x000000013FC11000-memory.dmp upx behavioral1/memory/2276-133-0x000000013F0F0000-0x000000013F441000-memory.dmp upx behavioral1/memory/2712-136-0x000000013F580000-0x000000013F8D1000-memory.dmp upx behavioral1/memory/2036-139-0x000000013FFA0000-0x00000001402F1000-memory.dmp upx C:\Windows\system\paHxYJz.exe upx behavioral1/memory/1464-144-0x000000013FAF0000-0x000000013FE41000-memory.dmp upx behavioral1/memory/388-138-0x000000013F220000-0x000000013F571000-memory.dmp upx behavioral1/memory/1672-125-0x000000013FDA0000-0x00000001400F1000-memory.dmp upx behavioral1/memory/2740-123-0x000000013F260000-0x000000013F5B1000-memory.dmp upx behavioral1/memory/2516-146-0x000000013F5F0000-0x000000013F941000-memory.dmp upx behavioral1/memory/2692-151-0x000000013F580000-0x000000013F8D1000-memory.dmp upx behavioral1/memory/2868-152-0x000000013FAA0000-0x000000013FDF1000-memory.dmp upx behavioral1/memory/2440-154-0x000000013FF30000-0x0000000140281000-memory.dmp upx behavioral1/memory/2604-153-0x000000013FAD0000-0x000000013FE21000-memory.dmp upx behavioral1/memory/2416-157-0x000000013FDE0000-0x0000000140131000-memory.dmp upx behavioral1/memory/388-163-0x000000013F220000-0x000000013F571000-memory.dmp upx behavioral1/memory/1464-167-0x000000013FAF0000-0x000000013FE41000-memory.dmp upx behavioral1/memory/2516-168-0x000000013F5F0000-0x000000013F941000-memory.dmp upx behavioral1/memory/1192-217-0x000000013F3E0000-0x000000013F731000-memory.dmp upx behavioral1/memory/2312-219-0x000000013F200000-0x000000013F551000-memory.dmp upx behavioral1/memory/2800-221-0x000000013FBE0000-0x000000013FF31000-memory.dmp upx behavioral1/memory/2628-223-0x000000013F600000-0x000000013F951000-memory.dmp upx behavioral1/memory/2692-230-0x000000013F580000-0x000000013F8D1000-memory.dmp upx behavioral1/memory/2868-232-0x000000013FAA0000-0x000000013FDF1000-memory.dmp upx behavioral1/memory/2440-237-0x000000013FF30000-0x0000000140281000-memory.dmp upx behavioral1/memory/2888-240-0x000000013F120000-0x000000013F471000-memory.dmp upx behavioral1/memory/2480-239-0x000000013F670000-0x000000013F9C1000-memory.dmp upx behavioral1/memory/2604-235-0x000000013FAD0000-0x000000013FE21000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exedescription ioc process File created C:\Windows\System\CbqJayq.exe 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\EhSucmC.exe 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\aEBeHDB.exe 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\XLBXzvW.exe 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\paHxYJz.exe 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\SZxjMdk.exe 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\wmJOsYS.exe 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\keCGbql.exe 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\uJHsJBi.exe 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\xmfbwBI.exe 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\GaDTyXi.exe 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\BUGasPh.exe 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\XsbxERa.exe 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\ancStOa.exe 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\kSgvzUx.exe 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\FIEmqgX.exe 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\qSgLEml.exe 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\xkKUueg.exe 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\jfpcZAB.exe 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\ZTxNGwL.exe 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\ihadxiQ.exe 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exedescription pid process Token: SeLockMemoryPrivilege 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe Token: SeLockMemoryPrivilege 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exedescription pid process target process PID 2516 wrote to memory of 1192 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe xkKUueg.exe PID 2516 wrote to memory of 1192 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe xkKUueg.exe PID 2516 wrote to memory of 1192 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe xkKUueg.exe PID 2516 wrote to memory of 2312 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe jfpcZAB.exe PID 2516 wrote to memory of 2312 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe jfpcZAB.exe PID 2516 wrote to memory of 2312 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe jfpcZAB.exe PID 2516 wrote to memory of 2628 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe CbqJayq.exe PID 2516 wrote to memory of 2628 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe CbqJayq.exe PID 2516 wrote to memory of 2628 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe CbqJayq.exe PID 2516 wrote to memory of 2800 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe uJHsJBi.exe PID 2516 wrote to memory of 2800 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe uJHsJBi.exe PID 2516 wrote to memory of 2800 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe uJHsJBi.exe PID 2516 wrote to memory of 2692 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe xmfbwBI.exe PID 2516 wrote to memory of 2692 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe xmfbwBI.exe PID 2516 wrote to memory of 2692 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe xmfbwBI.exe PID 2516 wrote to memory of 2868 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe ZTxNGwL.exe PID 2516 wrote to memory of 2868 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe ZTxNGwL.exe PID 2516 wrote to memory of 2868 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe ZTxNGwL.exe PID 2516 wrote to memory of 2604 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe GaDTyXi.exe PID 2516 wrote to memory of 2604 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe GaDTyXi.exe PID 2516 wrote to memory of 2604 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe GaDTyXi.exe PID 2516 wrote to memory of 2440 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe EhSucmC.exe PID 2516 wrote to memory of 2440 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe EhSucmC.exe PID 2516 wrote to memory of 2440 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe EhSucmC.exe PID 2516 wrote to memory of 2480 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe ihadxiQ.exe PID 2516 wrote to memory of 2480 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe ihadxiQ.exe PID 2516 wrote to memory of 2480 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe ihadxiQ.exe PID 2516 wrote to memory of 2888 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe BUGasPh.exe PID 2516 wrote to memory of 2888 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe BUGasPh.exe PID 2516 wrote to memory of 2888 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe BUGasPh.exe PID 2516 wrote to memory of 2416 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe XsbxERa.exe PID 2516 wrote to memory of 2416 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe XsbxERa.exe PID 2516 wrote to memory of 2416 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe XsbxERa.exe PID 2516 wrote to memory of 2724 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe ancStOa.exe PID 2516 wrote to memory of 2724 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe ancStOa.exe PID 2516 wrote to memory of 2724 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe ancStOa.exe PID 2516 wrote to memory of 2712 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe aEBeHDB.exe PID 2516 wrote to memory of 2712 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe aEBeHDB.exe PID 2516 wrote to memory of 2712 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe aEBeHDB.exe PID 2516 wrote to memory of 2740 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe kSgvzUx.exe PID 2516 wrote to memory of 2740 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe kSgvzUx.exe PID 2516 wrote to memory of 2740 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe kSgvzUx.exe PID 2516 wrote to memory of 1672 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe SZxjMdk.exe PID 2516 wrote to memory of 1672 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe SZxjMdk.exe PID 2516 wrote to memory of 1672 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe SZxjMdk.exe PID 2516 wrote to memory of 1928 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe FIEmqgX.exe PID 2516 wrote to memory of 1928 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe FIEmqgX.exe PID 2516 wrote to memory of 1928 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe FIEmqgX.exe PID 2516 wrote to memory of 388 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe wmJOsYS.exe PID 2516 wrote to memory of 388 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe wmJOsYS.exe PID 2516 wrote to memory of 388 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe wmJOsYS.exe PID 2516 wrote to memory of 1904 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe keCGbql.exe PID 2516 wrote to memory of 1904 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe keCGbql.exe PID 2516 wrote to memory of 1904 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe keCGbql.exe PID 2516 wrote to memory of 2036 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe XLBXzvW.exe PID 2516 wrote to memory of 2036 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe XLBXzvW.exe PID 2516 wrote to memory of 2036 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe XLBXzvW.exe PID 2516 wrote to memory of 2276 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe qSgLEml.exe PID 2516 wrote to memory of 2276 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe qSgLEml.exe PID 2516 wrote to memory of 2276 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe qSgLEml.exe PID 2516 wrote to memory of 1464 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe paHxYJz.exe PID 2516 wrote to memory of 1464 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe paHxYJz.exe PID 2516 wrote to memory of 1464 2516 2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe paHxYJz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-16_d99fbd896cee47679d13aa76c73fc30e_cobalt-strike_cobaltstrike.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\xkKUueg.exeC:\Windows\System\xkKUueg.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\jfpcZAB.exeC:\Windows\System\jfpcZAB.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CbqJayq.exeC:\Windows\System\CbqJayq.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\uJHsJBi.exeC:\Windows\System\uJHsJBi.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\xmfbwBI.exeC:\Windows\System\xmfbwBI.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ZTxNGwL.exeC:\Windows\System\ZTxNGwL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\GaDTyXi.exeC:\Windows\System\GaDTyXi.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\EhSucmC.exeC:\Windows\System\EhSucmC.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ihadxiQ.exeC:\Windows\System\ihadxiQ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\BUGasPh.exeC:\Windows\System\BUGasPh.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\XsbxERa.exeC:\Windows\System\XsbxERa.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ancStOa.exeC:\Windows\System\ancStOa.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aEBeHDB.exeC:\Windows\System\aEBeHDB.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\kSgvzUx.exeC:\Windows\System\kSgvzUx.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\SZxjMdk.exeC:\Windows\System\SZxjMdk.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\FIEmqgX.exeC:\Windows\System\FIEmqgX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wmJOsYS.exeC:\Windows\System\wmJOsYS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\keCGbql.exeC:\Windows\System\keCGbql.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\XLBXzvW.exeC:\Windows\System\XLBXzvW.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\qSgLEml.exeC:\Windows\System\qSgLEml.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\paHxYJz.exeC:\Windows\System\paHxYJz.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\FIEmqgX.exeFilesize
5.2MB
MD595caf6afb682586774a14a7fe8f27401
SHA1ba0043945d4c2b572b11fb4a9b6f89f313ce4a08
SHA256a7b2ebf8304f1f65d4df9e6ad314019edfcaf8f9068d1eff9373c7c88ad34446
SHA512ecc3f568a6365faee9067e84131b436a570350df24874842d74b929986d39b2612c80d3b5cef626dee3f24f686e0c42b17a094571669492651bcb1e41ea9464f
-
C:\Windows\system\XLBXzvW.exeFilesize
5.2MB
MD5e98a90fd1f2d52bd67d670895716acc6
SHA175340466e02c9c539c519396a49d1f7239def76a
SHA256b1601183d73df3f2f6d6ae864b7d974624c788086baa0eb1a2c52ec9029782f1
SHA51253b734ba6327727c9259ebf93741d1b95135525cbdb7ddd6abde7a7930a5029b9535b8ea01b8a584faf298de01799c8ea84581d1c30b83c0bdcca9b2c23cdac6
-
C:\Windows\system\XsbxERa.exeFilesize
5.2MB
MD536fb73ab4772770c40b8c5b28547e3f7
SHA14ccf1fdde3884a15eceb07f039638dc1057d1b60
SHA25631f55f25be95b6ca35e7b8d83c07f01ee56b9553569c1e02845b1b1c62be10ed
SHA51220366da740c2b76355bd4dfcec2c6afb6946927670977a6d912fa7e9f60bc64c7da28465c24c3cae643ca0bb99035a8bb82534ba71fda9a05116b8b374ce06dd
-
C:\Windows\system\ancStOa.exeFilesize
5.2MB
MD545f22eb7b6c2ab459e8918b4286aba0c
SHA12ceb4552f34a35881c6d9e172db09cbe878d9348
SHA25645ae773692004ebf02b7a6770caf0bd29d6b6f6a8288899942ffc68bad99900b
SHA51291b892cf2ecc0bbef7abba0cc217b6beb0a0cf279d429c02ea0305c3013def72b5025847dc4793e667bb4db2f33b68b8437de56a8fcbc791d07a3c82f122fa9a
-
C:\Windows\system\jfpcZAB.exeFilesize
5.2MB
MD57451a129c504ecc93905894c0a91f5cf
SHA1ffef4cdedcaf4097f4f2652659497829bc62789e
SHA256210d48e8724b2bd7b3e0bc7f5335dfa627b13e407eb858e3fc31f8e3ccbdde7b
SHA5122fd56388b9f12ea7ac043f1102eef749fad38589791a90f930ea57ec2394be61c4721e6454c9d24b8b3c3e18b20f3028f13dca37bf0e1f66a59cc7b5e410c89e
-
C:\Windows\system\keCGbql.exeFilesize
5.2MB
MD57253150a64bcb0d469f78703f47658ae
SHA1f5c2cd5fb8981f2fd04bd32aeae84cf6b1d70c58
SHA256e2b0a1f1da78487297017509dfcfad91def94f04220126bb5830af6c2a8e4f8b
SHA512e2090faf4dfaba0a6770a2c68dc9c62a8e6b468b5c0ec4e1cfe2d69799235f58c6ccdeeffa4dcfed8e5f6cc5b9b8a13708b08092091d53a76229782a79f18ffa
-
C:\Windows\system\paHxYJz.exeFilesize
5.2MB
MD544b063fd11abecba03bc928ea45ab1f6
SHA192a244bfb0c498b803e9c814551e3ed393d7facd
SHA25699b79644a03ac63fa70be38044da67069a0296c61b0ee80452f8eee90029aa34
SHA512eaad688d3064d099a6460fe740de43a64052c9899bee271cf2771fd480f756363fa88557f0db96e8e8acf2e5f6e6122da22b5d5f537f99dd9500b135cc2042aa
-
C:\Windows\system\qSgLEml.exeFilesize
5.2MB
MD5e2225c82546010efb700ab3ab9f08b5e
SHA19c865bbf6ad2df3c8f005d12bab104f2df7b9e0a
SHA256673c6e0a5b4309b935fc9e2ef8f28f7664b813224843ee9c7937e111e5ae44d0
SHA5122e7f42984319ed40370fbe52e56247e0441b4e77f3a65e7676de6d61c83f23d1e579219da415f4cc489ff23c94d6a93a78f85ef877906caec80bd0d2be0de6ad
-
C:\Windows\system\uJHsJBi.exeFilesize
5.2MB
MD5234e14fbee5f77f8d50141a8d4d9a5d0
SHA1d724c6e91adcaea2c92918c05dafc4bcad38bdb2
SHA256f976394158860aa39418c59a3ab41d0245af67fb95c756c76d726e5f10a713fb
SHA51282cecb19e914002719cf84e72926ad017b0b42093474c30ae7ad8f802bddeb54662517126e7a416bb44cdc2fc845f01e442ce071caecd1ddf77961c4448d107c
-
C:\Windows\system\xmfbwBI.exeFilesize
5.2MB
MD577324f5b4cb6fc701f481b8a79d5ec7d
SHA1bc674ead66cb1e22fcf0b451edad93021e1b6d4d
SHA2564cd86fedbb67727efee7b172ab64650dcb53b04c8a861d94ef00dff0bcfc71e8
SHA512e6585b112e497606447f5743af22a57bd26fb7649a13888cfc45a3d84886ac9e884e5a540054073e2b29e9b4ccee52f2e7306a06ed8441c600917941d74cc213
-
\Windows\system\BUGasPh.exeFilesize
5.2MB
MD526c2828418811e13ce04f0ac6fa9a749
SHA1b460b345723519ca17a2880c438527cc1e785b34
SHA25621f480ef211101a492678ddcfb81ec1fe6fe6c903b85aca3af215f5f9b2a95b9
SHA512d93a02e225951ebd0005af2dc2a60f28a30419fb2f36de84e0c812646ab44ed1849df97c7b1a287a7331156621209b7477a281c5f16f5b46d3929ec335070e48
-
\Windows\system\CbqJayq.exeFilesize
5.2MB
MD51760e50f19a984529890edf26de43d6d
SHA1723f9ebe4cbeae0b7a39ddddab0d3befc0af3e1e
SHA256c04da52990f7a6831c423feaf3efc95f762a96abd4055718ddc86a139c1034c5
SHA512ec0597bdc29660705ccd362d1253c7b5c06ffb8aee4bb1f04ace53e46d1466e4aac93fa8110b9dd134179b20416921c0a1453d5acaa6917b1d041bc3213c2666
-
\Windows\system\EhSucmC.exeFilesize
5.2MB
MD53016fd767d0e6b9408dc945c668ef172
SHA1fea75dbb656bf8a9c7e46fed7fac79e3570516e7
SHA256a50dfae182872a77777458a9104d425174462977f036661680d5246d2688f855
SHA5127cc5886f7bec3fd97b621f30447c4a7578614dd9c3a4d8ca750fc0ef4be1361af3593aea2af1bc6b2e967a276dc847807cec9d38a2ccce74f0d3905c0f578a32
-
\Windows\system\GaDTyXi.exeFilesize
5.2MB
MD55bfaa1d330ca7441fb4fee9e9479d504
SHA12ead9f3e41917d6734192bdd733c51cb7e11a1ee
SHA256f869696cccd1f5c318a2d3740f78711484139e0cda7909c693eeb2fccf21bf65
SHA5124c77a4c37d990cf293dbf18479b81cd6f8e5e58c2850cd0e8117432dbdd3959efa16a2fa2e2b3911030ac0c414f85fd22ad1e8d01d3cb617bb58442ca4850651
-
\Windows\system\SZxjMdk.exeFilesize
5.2MB
MD50deb59d345ceb6d786921b1bfb5f1ad2
SHA1d1a6a15c647f023d7337396f102c1042d881bde7
SHA25670308024c96fb01c266b6abccdf9475099b3b58d6a61395785ec3600ad6235ad
SHA512c37fb2650cdf6cf16a4878f4ee9253e91c1cbb2793d87eb3515a30dc5f594fa8196514e55a18985fe1abf2edc1a46aed820dca65f064df5358c52af2bab92496
-
\Windows\system\ZTxNGwL.exeFilesize
5.2MB
MD5d7b589c80577f208d9da2896f2ab1e9c
SHA11cd3faf26e98b4f4f3d06facb69a5cdaec5d3aa6
SHA2567754e051dd1933819d5788dee7e7b7583c1f4ecd91ceea65cd9e86f9a999a535
SHA5122ca09d0724f949bfd38e7e3a96d1333b9d699699f1d4be3e29ce4d51712e1e9960f23af3918d280da1b47d3a9fb615912eda3b7e5ab2f4b16b5be06ff249bf3b
-
\Windows\system\aEBeHDB.exeFilesize
5.2MB
MD51c9367695a68fbf47ad2807c144a2eba
SHA123483a32613c2cdf4b24f29ae04899f89ed89bbe
SHA2566187c5dfceda6c405a052202da34983ee0d30afa29e01056764af5fbd9594a23
SHA512ebe4b33de18d3f56306593cd3830956b14cb21ce929c3f5f026114a6cb6df64eeae13218185701feea9622d8671cc699378a6c70bbcb655e95f72fe0394b9902
-
\Windows\system\ihadxiQ.exeFilesize
5.2MB
MD57ae5994f2ed2357ff52c954daa5f30aa
SHA15eeca9a1f3f5d42f4d18a94006ddd2dc9298cd9e
SHA2566ad28a8166a65c8a03bb122b795095d60462801488f53e730ab6a79e54cd9602
SHA512bbba0ffbb49cfc3915a6e910cd2d467b5efa945149ee7df5e5dd6f1598ff8204b4cfdf6998f806b31964b56ad8cd13fa921d61f03f2e2ed90bc22cd487812e6c
-
\Windows\system\kSgvzUx.exeFilesize
5.2MB
MD5dc11cf07c3a7dc75111fc3e9b6639ad9
SHA1541ffb5848ac29137f51b7cf03ce14c35f0d4047
SHA25676ba98735d48736b3ecd585bfb903c55c34206d3870f0f765a0453a3e42cca9a
SHA512ba5679dc7cbab0e6909919e63fea9496d76fdf9dcc1c22dfffef4457dd9be262c91392628941d976ea998455abb0912bb7e457ea7891fb3362505bbf1dc78f5a
-
\Windows\system\wmJOsYS.exeFilesize
5.2MB
MD5e8af7ed82629a3ee6e824a46c736acf7
SHA13bb9b8d3d5882a2f6c9d8acaf06707904953b101
SHA25632d34b8886b0629fd27a5a4618e4fbc2d9de4c43597f6ff87f13e4c39c84c800
SHA5128bb19351a010edb023aa47dcb1628e5758434c1a5aa4f7f6b5a2c7058814350a9b77617dde71c970550e333393f32b3803eb765498facbb192e0b130422b9fd0
-
\Windows\system\xkKUueg.exeFilesize
5.2MB
MD556680f98f6370a8573dd6a385f1de432
SHA19055ab552b58b6d3f9113a3605f920d6bb98df13
SHA256fe862d119a87fa9a1ca8ad22718dc0b830b0a3ba874dd9e77970f6d37b3a5819
SHA5125c3598c862a4feb324f0fdb0953ab9f4d542a0e21705c760cb862323952abe1dd7e36990a4caa66ed67ddd29967ba977f6f1b420b60947cab954f9d0d8fa7800
-
memory/388-163-0x000000013F220000-0x000000013F571000-memory.dmpFilesize
3.3MB
-
memory/388-268-0x000000013F220000-0x000000013F571000-memory.dmpFilesize
3.3MB
-
memory/388-138-0x000000013F220000-0x000000013F571000-memory.dmpFilesize
3.3MB
-
memory/1192-28-0x000000013F3E0000-0x000000013F731000-memory.dmpFilesize
3.3MB
-
memory/1192-217-0x000000013F3E0000-0x000000013F731000-memory.dmpFilesize
3.3MB
-
memory/1464-144-0x000000013FAF0000-0x000000013FE41000-memory.dmpFilesize
3.3MB
-
memory/1464-167-0x000000013FAF0000-0x000000013FE41000-memory.dmpFilesize
3.3MB
-
memory/1464-270-0x000000013FAF0000-0x000000013FE41000-memory.dmpFilesize
3.3MB
-
memory/1672-125-0x000000013FDA0000-0x00000001400F1000-memory.dmpFilesize
3.3MB
-
memory/1672-259-0x000000013FDA0000-0x00000001400F1000-memory.dmpFilesize
3.3MB
-
memory/1904-256-0x000000013F8C0000-0x000000013FC11000-memory.dmpFilesize
3.3MB
-
memory/1904-132-0x000000013F8C0000-0x000000013FC11000-memory.dmpFilesize
3.3MB
-
memory/1928-126-0x000000013FB90000-0x000000013FEE1000-memory.dmpFilesize
3.3MB
-
memory/1928-264-0x000000013FB90000-0x000000013FEE1000-memory.dmpFilesize
3.3MB
-
memory/2036-139-0x000000013FFA0000-0x00000001402F1000-memory.dmpFilesize
3.3MB
-
memory/2036-266-0x000000013FFA0000-0x00000001402F1000-memory.dmpFilesize
3.3MB
-
memory/2276-133-0x000000013F0F0000-0x000000013F441000-memory.dmpFilesize
3.3MB
-
memory/2276-257-0x000000013F0F0000-0x000000013F441000-memory.dmpFilesize
3.3MB
-
memory/2312-219-0x000000013F200000-0x000000013F551000-memory.dmpFilesize
3.3MB
-
memory/2312-26-0x000000013F200000-0x000000013F551000-memory.dmpFilesize
3.3MB
-
memory/2416-91-0x000000013FDE0000-0x0000000140131000-memory.dmpFilesize
3.3MB
-
memory/2416-247-0x000000013FDE0000-0x0000000140131000-memory.dmpFilesize
3.3MB
-
memory/2416-157-0x000000013FDE0000-0x0000000140131000-memory.dmpFilesize
3.3MB
-
memory/2440-61-0x000000013FF30000-0x0000000140281000-memory.dmpFilesize
3.3MB
-
memory/2440-154-0x000000013FF30000-0x0000000140281000-memory.dmpFilesize
3.3MB
-
memory/2440-237-0x000000013FF30000-0x0000000140281000-memory.dmpFilesize
3.3MB
-
memory/2480-239-0x000000013F670000-0x000000013F9C1000-memory.dmpFilesize
3.3MB
-
memory/2480-70-0x000000013F670000-0x000000013F9C1000-memory.dmpFilesize
3.3MB
-
memory/2516-134-0x00000000023A0000-0x00000000026F1000-memory.dmpFilesize
3.3MB
-
memory/2516-146-0x000000013F5F0000-0x000000013F941000-memory.dmpFilesize
3.3MB
-
memory/2516-1-0x000000013F5F0000-0x000000013F941000-memory.dmpFilesize
3.3MB
-
memory/2516-137-0x000000013FB90000-0x000000013FEE1000-memory.dmpFilesize
3.3MB
-
memory/2516-191-0x000000013F260000-0x000000013F5B1000-memory.dmpFilesize
3.3MB
-
memory/2516-72-0x000000013F5F0000-0x000000013F941000-memory.dmpFilesize
3.3MB
-
memory/2516-85-0x000000013FDE0000-0x0000000140131000-memory.dmpFilesize
3.3MB
-
memory/2516-143-0x000000013FAF0000-0x000000013FE41000-memory.dmpFilesize
3.3MB
-
memory/2516-16-0x000000013F200000-0x000000013F551000-memory.dmpFilesize
3.3MB
-
memory/2516-127-0x000000013F220000-0x000000013F571000-memory.dmpFilesize
3.3MB
-
memory/2516-130-0x000000013F0F0000-0x000000013F441000-memory.dmpFilesize
3.3MB
-
memory/2516-69-0x000000013FF30000-0x0000000140281000-memory.dmpFilesize
3.3MB
-
memory/2516-24-0x00000000023A0000-0x00000000026F1000-memory.dmpFilesize
3.3MB
-
memory/2516-36-0x000000013FAA0000-0x000000013FDF1000-memory.dmpFilesize
3.3MB
-
memory/2516-27-0x000000013FBE0000-0x000000013FF31000-memory.dmpFilesize
3.3MB
-
memory/2516-135-0x00000000023A0000-0x00000000026F1000-memory.dmpFilesize
3.3MB
-
memory/2516-189-0x000000013FDE0000-0x0000000140131000-memory.dmpFilesize
3.3MB
-
memory/2516-128-0x00000000023A0000-0x00000000026F1000-memory.dmpFilesize
3.3MB
-
memory/2516-121-0x000000013FDA0000-0x00000001400F1000-memory.dmpFilesize
3.3MB
-
memory/2516-129-0x000000013FFA0000-0x00000001402F1000-memory.dmpFilesize
3.3MB
-
memory/2516-0-0x00000000000F0000-0x0000000000100000-memory.dmpFilesize
64KB
-
memory/2516-168-0x000000013F5F0000-0x000000013F941000-memory.dmpFilesize
3.3MB
-
memory/2516-208-0x000000013FAF0000-0x000000013FE41000-memory.dmpFilesize
3.3MB
-
memory/2516-7-0x00000000023A0000-0x00000000026F1000-memory.dmpFilesize
3.3MB
-
memory/2516-119-0x000000013F260000-0x000000013F5B1000-memory.dmpFilesize
3.3MB
-
memory/2604-235-0x000000013FAD0000-0x000000013FE21000-memory.dmpFilesize
3.3MB
-
memory/2604-47-0x000000013FAD0000-0x000000013FE21000-memory.dmpFilesize
3.3MB
-
memory/2604-153-0x000000013FAD0000-0x000000013FE21000-memory.dmpFilesize
3.3MB
-
memory/2628-29-0x000000013F600000-0x000000013F951000-memory.dmpFilesize
3.3MB
-
memory/2628-223-0x000000013F600000-0x000000013F951000-memory.dmpFilesize
3.3MB
-
memory/2692-151-0x000000013F580000-0x000000013F8D1000-memory.dmpFilesize
3.3MB
-
memory/2692-230-0x000000013F580000-0x000000013F8D1000-memory.dmpFilesize
3.3MB
-
memory/2692-42-0x000000013F580000-0x000000013F8D1000-memory.dmpFilesize
3.3MB
-
memory/2712-136-0x000000013F580000-0x000000013F8D1000-memory.dmpFilesize
3.3MB
-
memory/2712-253-0x000000013F580000-0x000000013F8D1000-memory.dmpFilesize
3.3MB
-
memory/2724-97-0x000000013F4D0000-0x000000013F821000-memory.dmpFilesize
3.3MB
-
memory/2724-249-0x000000013F4D0000-0x000000013F821000-memory.dmpFilesize
3.3MB
-
memory/2740-123-0x000000013F260000-0x000000013F5B1000-memory.dmpFilesize
3.3MB
-
memory/2740-251-0x000000013F260000-0x000000013F5B1000-memory.dmpFilesize
3.3MB
-
memory/2800-30-0x000000013FBE0000-0x000000013FF31000-memory.dmpFilesize
3.3MB
-
memory/2800-221-0x000000013FBE0000-0x000000013FF31000-memory.dmpFilesize
3.3MB
-
memory/2868-232-0x000000013FAA0000-0x000000013FDF1000-memory.dmpFilesize
3.3MB
-
memory/2868-38-0x000000013FAA0000-0x000000013FDF1000-memory.dmpFilesize
3.3MB
-
memory/2868-152-0x000000013FAA0000-0x000000013FDF1000-memory.dmpFilesize
3.3MB
-
memory/2888-71-0x000000013F120000-0x000000013F471000-memory.dmpFilesize
3.3MB
-
memory/2888-240-0x000000013F120000-0x000000013F471000-memory.dmpFilesize
3.3MB