Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-04-2024 02:12
Behavioral task
behavioral1
Sample
2024-04-25_ee522e31edab93ffe567aee988b90e86_cobalt-strike_cobaltstrike.exe
Resource
win7-20231129-en
General
-
Target
2024-04-25_ee522e31edab93ffe567aee988b90e86_cobalt-strike_cobaltstrike.exe
-
Size
6.0MB
-
MD5
ee522e31edab93ffe567aee988b90e86
-
SHA1
bf81913b4c9a0947c030214a05cdd6715d6d4e29
-
SHA256
ced7da8e2735bfad357afdc80f1650e4642aeb57919d03dc3d828ba1cbe506b2
-
SHA512
72a66d570d2de77cd4cef66950ca1dd13ebb32c0e8c2e518288bed7a8b3e057fb30ab5c06f5ee675767647633b3e5f2d742ea899b77af032eba78f8eda6457fe
-
SSDEEP
98304:EniLf9FdfE0pZB156utgpPFotBER/mQ32lU7:eOl56utgpPF8u/77
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 15 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule C:\Windows\system\dZmrdZA.exe cobalt_reflective_dll \Windows\system\UJFoTEG.exe cobalt_reflective_dll C:\Windows\system\vXxoYXX.exe cobalt_reflective_dll \Windows\system\LsxRdds.exe cobalt_reflective_dll \Windows\system\zmrbldV.exe cobalt_reflective_dll C:\Windows\system\TRhcQhQ.exe cobalt_reflective_dll C:\Windows\system\EdlaZSC.exe cobalt_reflective_dll \Windows\system\QETWqsJ.exe cobalt_reflective_dll C:\Windows\system\sSvBkGD.exe cobalt_reflective_dll \Windows\system\drhSpES.exe cobalt_reflective_dll C:\Windows\system\dxnkExD.exe cobalt_reflective_dll \Windows\system\uXFNbLI.exe cobalt_reflective_dll C:\Windows\system\gJCLKun.exe cobalt_reflective_dll \Windows\system\meTEMJh.exe cobalt_reflective_dll C:\Windows\system\wwlbUBF.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 15 IoCs
Processes:
resource yara_rule C:\Windows\system\dZmrdZA.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\UJFoTEG.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\vXxoYXX.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\LsxRdds.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\zmrbldV.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\TRhcQhQ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\EdlaZSC.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\QETWqsJ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\sSvBkGD.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\drhSpES.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\dxnkExD.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\uXFNbLI.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\gJCLKun.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\meTEMJh.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\wwlbUBF.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 36 IoCs
Processes:
resource yara_rule behavioral1/memory/2188-0-0x000000013FE50000-0x00000001401A4000-memory.dmp UPX C:\Windows\system\dZmrdZA.exe UPX \Windows\system\UJFoTEG.exe UPX C:\Windows\system\vXxoYXX.exe UPX behavioral1/memory/2644-19-0x000000013F570000-0x000000013F8C4000-memory.dmp UPX behavioral1/memory/868-20-0x000000013FE70000-0x00000001401C4000-memory.dmp UPX behavioral1/memory/2080-22-0x000000013F8D0000-0x000000013FC24000-memory.dmp UPX \Windows\system\LsxRdds.exe UPX behavioral1/memory/2572-28-0x000000013F670000-0x000000013F9C4000-memory.dmp UPX \Windows\system\zmrbldV.exe UPX behavioral1/memory/2676-35-0x000000013F2D0000-0x000000013F624000-memory.dmp UPX C:\Windows\system\TRhcQhQ.exe UPX behavioral1/memory/2620-42-0x000000013F460000-0x000000013F7B4000-memory.dmp UPX C:\Windows\system\EdlaZSC.exe UPX behavioral1/memory/2828-49-0x000000013FB50000-0x000000013FEA4000-memory.dmp UPX \Windows\system\QETWqsJ.exe UPX behavioral1/memory/2188-55-0x000000013FE50000-0x00000001401A4000-memory.dmp UPX behavioral1/memory/1888-56-0x000000013F6B0000-0x000000013FA04000-memory.dmp UPX C:\Windows\system\sSvBkGD.exe UPX behavioral1/memory/2468-62-0x000000013FC10000-0x000000013FF64000-memory.dmp UPX \Windows\system\drhSpES.exe UPX C:\Windows\system\dxnkExD.exe UPX \Windows\system\uXFNbLI.exe UPX C:\Windows\system\gJCLKun.exe UPX \Windows\system\meTEMJh.exe UPX behavioral1/memory/2536-190-0x000000013F590000-0x000000013F8E4000-memory.dmp UPX C:\Windows\system\wwlbUBF.exe UPX behavioral1/memory/1500-228-0x000000013FC60000-0x000000013FFB4000-memory.dmp UPX behavioral1/memory/2924-230-0x000000013F830000-0x000000013FB84000-memory.dmp UPX behavioral1/memory/2416-275-0x000000013F180000-0x000000013F4D4000-memory.dmp UPX behavioral1/memory/1240-294-0x000000013F840000-0x000000013FB94000-memory.dmp UPX behavioral1/memory/1896-577-0x000000013F110000-0x000000013F464000-memory.dmp UPX behavioral1/memory/1916-578-0x000000013F5E0000-0x000000013F934000-memory.dmp UPX behavioral1/memory/2348-589-0x000000013F940000-0x000000013FC94000-memory.dmp UPX behavioral1/memory/2640-610-0x000000013FCC0000-0x0000000140014000-memory.dmp UPX behavioral1/memory/2564-636-0x000000013F2B0000-0x000000013F604000-memory.dmp UPX -
XMRig Miner payload 38 IoCs
Processes:
resource yara_rule behavioral1/memory/2188-0-0x000000013FE50000-0x00000001401A4000-memory.dmp xmrig C:\Windows\system\dZmrdZA.exe xmrig \Windows\system\UJFoTEG.exe xmrig C:\Windows\system\vXxoYXX.exe xmrig behavioral1/memory/2644-19-0x000000013F570000-0x000000013F8C4000-memory.dmp xmrig behavioral1/memory/868-20-0x000000013FE70000-0x00000001401C4000-memory.dmp xmrig behavioral1/memory/2188-21-0x00000000022B0000-0x0000000002604000-memory.dmp xmrig behavioral1/memory/2080-22-0x000000013F8D0000-0x000000013FC24000-memory.dmp xmrig \Windows\system\LsxRdds.exe xmrig behavioral1/memory/2572-28-0x000000013F670000-0x000000013F9C4000-memory.dmp xmrig behavioral1/memory/2188-29-0x000000013F670000-0x000000013F9C4000-memory.dmp xmrig \Windows\system\zmrbldV.exe xmrig behavioral1/memory/2676-35-0x000000013F2D0000-0x000000013F624000-memory.dmp xmrig C:\Windows\system\TRhcQhQ.exe xmrig behavioral1/memory/2620-42-0x000000013F460000-0x000000013F7B4000-memory.dmp xmrig C:\Windows\system\EdlaZSC.exe xmrig behavioral1/memory/2828-49-0x000000013FB50000-0x000000013FEA4000-memory.dmp xmrig \Windows\system\QETWqsJ.exe xmrig behavioral1/memory/2188-55-0x000000013FE50000-0x00000001401A4000-memory.dmp xmrig behavioral1/memory/1888-56-0x000000013F6B0000-0x000000013FA04000-memory.dmp xmrig C:\Windows\system\sSvBkGD.exe xmrig behavioral1/memory/2468-62-0x000000013FC10000-0x000000013FF64000-memory.dmp xmrig \Windows\system\drhSpES.exe xmrig C:\Windows\system\dxnkExD.exe xmrig \Windows\system\uXFNbLI.exe xmrig C:\Windows\system\gJCLKun.exe xmrig \Windows\system\meTEMJh.exe xmrig behavioral1/memory/2536-190-0x000000013F590000-0x000000013F8E4000-memory.dmp xmrig C:\Windows\system\wwlbUBF.exe xmrig behavioral1/memory/1500-228-0x000000013FC60000-0x000000013FFB4000-memory.dmp xmrig behavioral1/memory/2924-230-0x000000013F830000-0x000000013FB84000-memory.dmp xmrig behavioral1/memory/2416-275-0x000000013F180000-0x000000013F4D4000-memory.dmp xmrig behavioral1/memory/1240-294-0x000000013F840000-0x000000013FB94000-memory.dmp xmrig behavioral1/memory/1896-577-0x000000013F110000-0x000000013F464000-memory.dmp xmrig behavioral1/memory/1916-578-0x000000013F5E0000-0x000000013F934000-memory.dmp xmrig behavioral1/memory/2348-589-0x000000013F940000-0x000000013FC94000-memory.dmp xmrig behavioral1/memory/2640-610-0x000000013FCC0000-0x0000000140014000-memory.dmp xmrig behavioral1/memory/2564-636-0x000000013F2B0000-0x000000013F604000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral1/memory/2188-0-0x000000013FE50000-0x00000001401A4000-memory.dmp upx C:\Windows\system\dZmrdZA.exe upx \Windows\system\UJFoTEG.exe upx C:\Windows\system\vXxoYXX.exe upx behavioral1/memory/2644-19-0x000000013F570000-0x000000013F8C4000-memory.dmp upx behavioral1/memory/868-20-0x000000013FE70000-0x00000001401C4000-memory.dmp upx behavioral1/memory/2080-22-0x000000013F8D0000-0x000000013FC24000-memory.dmp upx \Windows\system\LsxRdds.exe upx behavioral1/memory/2572-28-0x000000013F670000-0x000000013F9C4000-memory.dmp upx \Windows\system\zmrbldV.exe upx behavioral1/memory/2676-35-0x000000013F2D0000-0x000000013F624000-memory.dmp upx C:\Windows\system\TRhcQhQ.exe upx behavioral1/memory/2620-42-0x000000013F460000-0x000000013F7B4000-memory.dmp upx C:\Windows\system\EdlaZSC.exe upx behavioral1/memory/2828-49-0x000000013FB50000-0x000000013FEA4000-memory.dmp upx \Windows\system\QETWqsJ.exe upx behavioral1/memory/2188-55-0x000000013FE50000-0x00000001401A4000-memory.dmp upx behavioral1/memory/1888-56-0x000000013F6B0000-0x000000013FA04000-memory.dmp upx C:\Windows\system\sSvBkGD.exe upx behavioral1/memory/2468-62-0x000000013FC10000-0x000000013FF64000-memory.dmp upx \Windows\system\drhSpES.exe upx C:\Windows\system\dxnkExD.exe upx \Windows\system\uXFNbLI.exe upx C:\Windows\system\gJCLKun.exe upx \Windows\system\meTEMJh.exe upx behavioral1/memory/2536-190-0x000000013F590000-0x000000013F8E4000-memory.dmp upx C:\Windows\system\wwlbUBF.exe upx behavioral1/memory/1500-228-0x000000013FC60000-0x000000013FFB4000-memory.dmp upx behavioral1/memory/2924-230-0x000000013F830000-0x000000013FB84000-memory.dmp upx behavioral1/memory/2416-275-0x000000013F180000-0x000000013F4D4000-memory.dmp upx behavioral1/memory/1240-294-0x000000013F840000-0x000000013FB94000-memory.dmp upx behavioral1/memory/1896-577-0x000000013F110000-0x000000013F464000-memory.dmp upx behavioral1/memory/1916-578-0x000000013F5E0000-0x000000013F934000-memory.dmp upx behavioral1/memory/2348-589-0x000000013F940000-0x000000013FC94000-memory.dmp upx behavioral1/memory/2640-610-0x000000013FCC0000-0x0000000140014000-memory.dmp upx behavioral1/memory/2564-636-0x000000013F2B0000-0x000000013F604000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
Processes:
2024-04-25_ee522e31edab93ffe567aee988b90e86_cobalt-strike_cobaltstrike.exedescription ioc process File created C:\Windows\System\dZmrdZA.exe 2024-04-25_ee522e31edab93ffe567aee988b90e86_cobalt-strike_cobaltstrike.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_ee522e31edab93ffe567aee988b90e86_cobalt-strike_cobaltstrike.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-25_ee522e31edab93ffe567aee988b90e86_cobalt-strike_cobaltstrike.exe"1⤵
- Drops file in Windows directory
-
C:\Windows\System\dZmrdZA.exeC:\Windows\System\dZmrdZA.exe2⤵
-
C:\Windows\System\vXxoYXX.exeC:\Windows\System\vXxoYXX.exe2⤵
-
C:\Windows\System\UJFoTEG.exeC:\Windows\System\UJFoTEG.exe2⤵
-
C:\Windows\System\LsxRdds.exeC:\Windows\System\LsxRdds.exe2⤵
-
C:\Windows\System\zmrbldV.exeC:\Windows\System\zmrbldV.exe2⤵
-
C:\Windows\System\TRhcQhQ.exeC:\Windows\System\TRhcQhQ.exe2⤵
-
C:\Windows\System\EdlaZSC.exeC:\Windows\System\EdlaZSC.exe2⤵
-
C:\Windows\System\QETWqsJ.exeC:\Windows\System\QETWqsJ.exe2⤵
-
C:\Windows\System\udEDBlS.exeC:\Windows\System\udEDBlS.exe2⤵
-
C:\Windows\System\rfobyZv.exeC:\Windows\System\rfobyZv.exe2⤵
-
C:\Windows\System\mTHqBXu.exeC:\Windows\System\mTHqBXu.exe2⤵
-
C:\Windows\System\zGPBdnu.exeC:\Windows\System\zGPBdnu.exe2⤵
-
C:\Windows\System\hrZvHcf.exeC:\Windows\System\hrZvHcf.exe2⤵
-
C:\Windows\System\JSFJNGP.exeC:\Windows\System\JSFJNGP.exe2⤵
-
C:\Windows\System\ggAdXMb.exeC:\Windows\System\ggAdXMb.exe2⤵
-
C:\Windows\System\qyjhoLQ.exeC:\Windows\System\qyjhoLQ.exe2⤵
-
C:\Windows\System\NeChKgO.exeC:\Windows\System\NeChKgO.exe2⤵
-
C:\Windows\System\kzYEDpO.exeC:\Windows\System\kzYEDpO.exe2⤵
-
C:\Windows\System\LkvFLba.exeC:\Windows\System\LkvFLba.exe2⤵
-
C:\Windows\System\OWAIzsG.exeC:\Windows\System\OWAIzsG.exe2⤵
-
C:\Windows\System\OAaqpve.exeC:\Windows\System\OAaqpve.exe2⤵
-
C:\Windows\System\iSxYter.exeC:\Windows\System\iSxYter.exe2⤵
-
C:\Windows\System\arYFCuV.exeC:\Windows\System\arYFCuV.exe2⤵
-
C:\Windows\System\WOjvFCl.exeC:\Windows\System\WOjvFCl.exe2⤵
-
C:\Windows\System\QgjxzEi.exeC:\Windows\System\QgjxzEi.exe2⤵
-
C:\Windows\System\MWXbITH.exeC:\Windows\System\MWXbITH.exe2⤵
-
C:\Windows\System\XIoJaTA.exeC:\Windows\System\XIoJaTA.exe2⤵
-
C:\Windows\System\tSVRCGS.exeC:\Windows\System\tSVRCGS.exe2⤵
-
C:\Windows\System\EHNoNsA.exeC:\Windows\System\EHNoNsA.exe2⤵
-
C:\Windows\System\wqMKVMJ.exeC:\Windows\System\wqMKVMJ.exe2⤵
-
C:\Windows\System\Zklvfkb.exeC:\Windows\System\Zklvfkb.exe2⤵
-
C:\Windows\System\iPgjpzb.exeC:\Windows\System\iPgjpzb.exe2⤵
-
C:\Windows\System\FpFBrnR.exeC:\Windows\System\FpFBrnR.exe2⤵
-
C:\Windows\System\vWaMhRw.exeC:\Windows\System\vWaMhRw.exe2⤵
-
C:\Windows\System\jAbVqXy.exeC:\Windows\System\jAbVqXy.exe2⤵
-
C:\Windows\System\icmpGxi.exeC:\Windows\System\icmpGxi.exe2⤵
-
C:\Windows\System\AciVSjt.exeC:\Windows\System\AciVSjt.exe2⤵
-
C:\Windows\System\EmFAPlv.exeC:\Windows\System\EmFAPlv.exe2⤵
-
C:\Windows\System\sYouQLf.exeC:\Windows\System\sYouQLf.exe2⤵
-
C:\Windows\System\lUENGGl.exeC:\Windows\System\lUENGGl.exe2⤵
-
C:\Windows\System\SJQDuKG.exeC:\Windows\System\SJQDuKG.exe2⤵
-
C:\Windows\System\JNtdacz.exeC:\Windows\System\JNtdacz.exe2⤵
-
C:\Windows\System\musqnqF.exeC:\Windows\System\musqnqF.exe2⤵
-
C:\Windows\System\dhHWSbU.exeC:\Windows\System\dhHWSbU.exe2⤵
-
C:\Windows\System\Miukydt.exeC:\Windows\System\Miukydt.exe2⤵
-
C:\Windows\System\OuLxuUk.exeC:\Windows\System\OuLxuUk.exe2⤵
-
C:\Windows\System\GVXuLuK.exeC:\Windows\System\GVXuLuK.exe2⤵
-
C:\Windows\System\TGkZJBj.exeC:\Windows\System\TGkZJBj.exe2⤵
-
C:\Windows\System\lgwkniK.exeC:\Windows\System\lgwkniK.exe2⤵
-
C:\Windows\System\RBCRjmV.exeC:\Windows\System\RBCRjmV.exe2⤵
-
C:\Windows\System\iETUCGa.exeC:\Windows\System\iETUCGa.exe2⤵
-
C:\Windows\System\uXiEOFU.exeC:\Windows\System\uXiEOFU.exe2⤵
-
C:\Windows\System\ZYYbNPB.exeC:\Windows\System\ZYYbNPB.exe2⤵
-
C:\Windows\System\EawoQQA.exeC:\Windows\System\EawoQQA.exe2⤵
-
C:\Windows\System\IGuPGoq.exeC:\Windows\System\IGuPGoq.exe2⤵
-
C:\Windows\System\kNyESYS.exeC:\Windows\System\kNyESYS.exe2⤵
-
C:\Windows\System\zmEwvIu.exeC:\Windows\System\zmEwvIu.exe2⤵
-
C:\Windows\System\ilwwYsJ.exeC:\Windows\System\ilwwYsJ.exe2⤵
-
C:\Windows\System\NlqJcKh.exeC:\Windows\System\NlqJcKh.exe2⤵
-
C:\Windows\System\GIKDmDR.exeC:\Windows\System\GIKDmDR.exe2⤵
-
C:\Windows\System\hruLfzF.exeC:\Windows\System\hruLfzF.exe2⤵
-
C:\Windows\System\PyWDoGJ.exeC:\Windows\System\PyWDoGJ.exe2⤵
-
C:\Windows\System\LGbPsvh.exeC:\Windows\System\LGbPsvh.exe2⤵
-
C:\Windows\System\BNpQmZv.exeC:\Windows\System\BNpQmZv.exe2⤵
-
C:\Windows\System\oZDeDAK.exeC:\Windows\System\oZDeDAK.exe2⤵
-
C:\Windows\System\CzUKDVo.exeC:\Windows\System\CzUKDVo.exe2⤵
-
C:\Windows\System\FelEfKO.exeC:\Windows\System\FelEfKO.exe2⤵
-
C:\Windows\System\pGmDYKr.exeC:\Windows\System\pGmDYKr.exe2⤵
-
C:\Windows\System\zHicnzX.exeC:\Windows\System\zHicnzX.exe2⤵
-
C:\Windows\System\sPZVGiL.exeC:\Windows\System\sPZVGiL.exe2⤵
-
C:\Windows\System\fAWTVLr.exeC:\Windows\System\fAWTVLr.exe2⤵
-
C:\Windows\System\hPpfuwD.exeC:\Windows\System\hPpfuwD.exe2⤵
-
C:\Windows\System\SSfkPJG.exeC:\Windows\System\SSfkPJG.exe2⤵
-
C:\Windows\System\JVHYXqA.exeC:\Windows\System\JVHYXqA.exe2⤵
-
C:\Windows\System\uVEIvft.exeC:\Windows\System\uVEIvft.exe2⤵
-
C:\Windows\System\NBEBRQA.exeC:\Windows\System\NBEBRQA.exe2⤵
-
C:\Windows\System\HKzltdU.exeC:\Windows\System\HKzltdU.exe2⤵
-
C:\Windows\System\mDVrvIJ.exeC:\Windows\System\mDVrvIJ.exe2⤵
-
C:\Windows\System\idGWXew.exeC:\Windows\System\idGWXew.exe2⤵
-
C:\Windows\System\MZMAuOC.exeC:\Windows\System\MZMAuOC.exe2⤵
-
C:\Windows\System\ycQWejV.exeC:\Windows\System\ycQWejV.exe2⤵
-
C:\Windows\System\iijljdV.exeC:\Windows\System\iijljdV.exe2⤵
-
C:\Windows\System\vvXYIZO.exeC:\Windows\System\vvXYIZO.exe2⤵
-
C:\Windows\System\aliMjxc.exeC:\Windows\System\aliMjxc.exe2⤵
-
C:\Windows\System\DYkZPVQ.exeC:\Windows\System\DYkZPVQ.exe2⤵
-
C:\Windows\System\MamPxaI.exeC:\Windows\System\MamPxaI.exe2⤵
-
C:\Windows\System\KrJPCPk.exeC:\Windows\System\KrJPCPk.exe2⤵
-
C:\Windows\System\EAXmbOS.exeC:\Windows\System\EAXmbOS.exe2⤵
-
C:\Windows\System\Fvbjdba.exeC:\Windows\System\Fvbjdba.exe2⤵
-
C:\Windows\System\SMadrUU.exeC:\Windows\System\SMadrUU.exe2⤵
-
C:\Windows\System\jUUcHdr.exeC:\Windows\System\jUUcHdr.exe2⤵
-
C:\Windows\System\xSUYlcz.exeC:\Windows\System\xSUYlcz.exe2⤵
-
C:\Windows\System\XjWdWMv.exeC:\Windows\System\XjWdWMv.exe2⤵
-
C:\Windows\System\yCDIyeq.exeC:\Windows\System\yCDIyeq.exe2⤵
-
C:\Windows\System\FfArzlH.exeC:\Windows\System\FfArzlH.exe2⤵
-
C:\Windows\System\AbdvmNw.exeC:\Windows\System\AbdvmNw.exe2⤵
-
C:\Windows\System\FvcyIni.exeC:\Windows\System\FvcyIni.exe2⤵
-
C:\Windows\System\dIsqVEm.exeC:\Windows\System\dIsqVEm.exe2⤵
-
C:\Windows\System\QnNoNXk.exeC:\Windows\System\QnNoNXk.exe2⤵
-
C:\Windows\System\GGAbruQ.exeC:\Windows\System\GGAbruQ.exe2⤵
-
C:\Windows\System\RSAvsxK.exeC:\Windows\System\RSAvsxK.exe2⤵
-
C:\Windows\System\TRqtnSZ.exeC:\Windows\System\TRqtnSZ.exe2⤵
-
C:\Windows\System\ACpuhkj.exeC:\Windows\System\ACpuhkj.exe2⤵
-
C:\Windows\System\oAxUmQW.exeC:\Windows\System\oAxUmQW.exe2⤵
-
C:\Windows\System\gZfKNhY.exeC:\Windows\System\gZfKNhY.exe2⤵
-
C:\Windows\System\AIyGBej.exeC:\Windows\System\AIyGBej.exe2⤵
-
C:\Windows\System\JtwdKjV.exeC:\Windows\System\JtwdKjV.exe2⤵
-
C:\Windows\System\IKkCtiP.exeC:\Windows\System\IKkCtiP.exe2⤵
-
C:\Windows\System\WNaMARE.exeC:\Windows\System\WNaMARE.exe2⤵
-
C:\Windows\System\TLUvAij.exeC:\Windows\System\TLUvAij.exe2⤵
-
C:\Windows\System\HASiIuQ.exeC:\Windows\System\HASiIuQ.exe2⤵
-
C:\Windows\System\MWRhzrG.exeC:\Windows\System\MWRhzrG.exe2⤵
-
C:\Windows\System\ZcQNFQd.exeC:\Windows\System\ZcQNFQd.exe2⤵
-
C:\Windows\System\RVNLwGk.exeC:\Windows\System\RVNLwGk.exe2⤵
-
C:\Windows\System\QDzUqSH.exeC:\Windows\System\QDzUqSH.exe2⤵
-
C:\Windows\System\OmfdiMC.exeC:\Windows\System\OmfdiMC.exe2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\EdlaZSC.exeFilesize
6.0MB
MD5a25428ff1bf6f08a83a971eab60428b7
SHA18de97b9e34ea31254e48f8923d3e450ee45da70d
SHA25699b8f44e2789295e206e7f33183fdee869afdb60ded75072fad915a39969086a
SHA512e88748b55c3b63f79d6c2479a09ea4fd3ef23201e151eccedf61aad4803eeca5e24347985070e53e3744240de3f67402d1fb4392cff93798d0f68df40237efe9
-
C:\Windows\system\TRhcQhQ.exeFilesize
6.0MB
MD51e26365b6f11a2cf32188db2a140385f
SHA1805aa72bd6c1140e7e06b948a2f1667341f1b5e5
SHA2569e76e2df15ec97eb9ad7a0a3c95088a3947753f2075f34a7f3e14468328d16d2
SHA51212a9e720fdee3243a8e9ce9d0670a0e1ed0676d2777207f004c11eab5b751f9cdc52e2d0a2074f535fa62bf058b2b543c2de9a4f937dca846f7ad02cd5d294ba
-
C:\Windows\system\dZmrdZA.exeFilesize
6.0MB
MD565c5818c13418759d89ea7bde1a1c90e
SHA12057e1993f1a4b8bf6d2ce73d4d6c7518355f573
SHA2564e6b73ddbce968f733632ad8c01bf18a5862d818d3ec6e618d1fda8079e48c99
SHA51285582903691742d95f5e84f4ec4c201cd4b90cafa0fa574484a04bf0fe127cfc765189aaf66904880d33621f35b2e9c0973368e7bc767eadff60c85e84c00d11
-
C:\Windows\system\dxnkExD.exeFilesize
6.0MB
MD50f9668ab29f2a08f62d312fb2baf697d
SHA19184c6d185f833a96a7df93ba02e1a302417136b
SHA256a14aaf5d40157fceea19d3cfa8118ad1ccf4bead705d2db150777201a527b537
SHA512d8bd81c9a5d62c55da7e03a93d21246f785244617a2e0d4420f1de4caf0be1c9f64cbc05bdc27de4316c93c621cb112ac4615783e687b424a654a2d63d25c4cb
-
C:\Windows\system\gJCLKun.exeFilesize
6.0MB
MD5f21c1fdf988cd8f67a51cc30489c5f9c
SHA1cbe542c0d86f11816e88adbec5a0e5846ab76fe6
SHA2564467e8aa409eae4197a6f157c338aabf5bac86960807270bde9894cb0ecdaa06
SHA512512e48fa97e20edb312f11a141263f67581d95203471cec45bbfbc53cf74bac5ff14f2b9efd23d046ee027c5846cefc29cd7d2af663b8844f5abcce71048fa4e
-
C:\Windows\system\sSvBkGD.exeFilesize
6.0MB
MD51431a6df28fe34db39b8f3c7b5ecbd28
SHA1478be905f1ef8cc0e634950089bfe4b1eaaec7bd
SHA25673b830acff33b08b23d2e335744f96e132c9b909f6485ae1ea9001c93820fbdf
SHA5129ef877c9f0b94c875c2fc8386ad07aa6fe03ec69cd0a3d667d88322eded815340fbb00e543dd6cb64dfcbcb4613329c7543cbf0e4dc417f569b69e75bddc88c8
-
C:\Windows\system\vXxoYXX.exeFilesize
6.0MB
MD57ebed2fea475229a58410349bbf580b1
SHA1873b14894c9b2edf5fecaf199820d45662c485c5
SHA25631c046905c813b67671a045f1edc5e6e6b46bdb294bf1c820373406f09d0013d
SHA512b5c957fb9632cb70cdf3ab2e68d9b60ed2e0b8410215a81cb7b33626df6392ff230eb3002394511886e1c8ba24b8cafe924c7d3d66820382164d6bd46a64978c
-
C:\Windows\system\wwlbUBF.exeFilesize
6.0MB
MD5523968c2df96f72de1e24d3e86c7fef7
SHA10119c5880beb9c8fce37b1e35284504bf0fba835
SHA256029c942d434051a9d501685f0ccf06700eb88780aef86426823727e426dd33fd
SHA5120e241ba7f47ede7faeaf1294bef9daf607d7ec1f3507d6d39f0adfeb83e2b8d4296df49cb11d6e4ea7bd9ac4ba62fb9bd0a0cf0568f43eeb0815ec2e7fffc454
-
\Windows\system\LsxRdds.exeFilesize
6.0MB
MD5d76d22c82943f58ed8c9de0b6899d0e9
SHA1881d37b904001bb1909ec6ab8958128d0b262b0f
SHA25688c6090727ff96003217329c61aadcbc2ddbe058c7154c27e86a1dacb3580793
SHA5125ab4904dacb63ae6535a182e3a7187fdd1fac3116b7f007e26a55e2f268a1a855bf2e59c4cf559ef9e7ed70e00d415b3811986899b8d1d383f76afa6a9df86ea
-
\Windows\system\QETWqsJ.exeFilesize
6.0MB
MD526002c4ce8182d614e6dea4efc5a74ac
SHA19afd6c0180a69a20f7fa72b0cbfa07e9a65856a5
SHA25651ed675ecba4289f42ac614a6dd1a60572483d1ae10e0d2c2f21acbf0798778d
SHA512f31c572638a9527347bd2653bb094caceba6355aaf43b3e598899c847f9aec52b122b8ef0a6b798795a80bf944e0875846d85f9f528080abd03e5526523b6a7c
-
\Windows\system\UJFoTEG.exeFilesize
6.0MB
MD51efa2b73f24be5d10077f22aecb8c372
SHA19ca2ecc165ae6189bba23feb267d184521bc0947
SHA256c202f45ae0cea0882e0b447268de83227744a57950b7a7e89d88418ef54d7d1d
SHA5126f702bccefb0dc13935f747e03aafefb82b4d59fae2c55262bbe59c3a612e2b26c265dc5838932743a8b441a6d15a5d53439c7a1b749ae8eb237bb9ea7f9662f
-
\Windows\system\drhSpES.exeFilesize
6.0MB
MD5ea7f32e969cd92748c5885a8846a6add
SHA1f9da68adfbddf9fdfd5ae912cb4e654dd613c13b
SHA256e12d514995c7a5c1fcf00a3564cb159d72cd19299f6a6b5f1eb9c85652feca8c
SHA512199db97c9082f40556bff898d08ae5e3141ed7223ec20be3293962c97104df3e27b337a10b816ee87bfc2f96a36060c8a2e0ee25f2eb1eddde8cac51e3a2d58c
-
\Windows\system\meTEMJh.exeFilesize
6.0MB
MD59652fcb4a78f89b3f6b467f7579cef0b
SHA13abc41317e1e846002b709125fd16c9ec5641344
SHA256796b35b57998cef8363fc1a77adf69c1bb435e767cb3a52b80aefc701beea271
SHA512911a924f52d5d2f69c088fa93f969c98d981a062077787708d1094f3d6e74a4daea6fc294fbf65ffcfa487f7ec18aa6f4d233002e1957d9639ca98b2b69e6804
-
\Windows\system\uXFNbLI.exeFilesize
6.0MB
MD59d5b6f476b214c67cea6d414569d7a69
SHA1302ec17e2db00422a81408f18951744e1889d327
SHA256f53b64f9f6a0d7558ddc097abab0a45720f2b0ecfa8e3a23175c9e4088771985
SHA512cb77ae7c1a0f060c06f30638da99faaec6cdccb6cd11dace43203a2c8f4ba8fe7c01b1c2af7296c127f6ff9bf0b3ac9531f9a4ff79430aea4a64b59486589aa1
-
\Windows\system\zmrbldV.exeFilesize
6.0MB
MD5ed907bed5e4f79886fb9cb951e675cc7
SHA1e80c9ab9086f72ccdc007d95c445b2f5384e9ae1
SHA256312820a8eb43661ee01c1774c667cfd0308ae4932c24ed6151b4efb1eee89a54
SHA51288476f522aab3a1c1e9400168e58dc774cfef35989d50892451ad2bcc514c2627e27c87747c7d8a3fcdb073d453c3d8255c9fb93568f68d72a9a47f7795cbf80
-
memory/868-20-0x000000013FE70000-0x00000001401C4000-memory.dmpFilesize
3.3MB
-
memory/1240-294-0x000000013F840000-0x000000013FB94000-memory.dmpFilesize
3.3MB
-
memory/1500-228-0x000000013FC60000-0x000000013FFB4000-memory.dmpFilesize
3.3MB
-
memory/1888-56-0x000000013F6B0000-0x000000013FA04000-memory.dmpFilesize
3.3MB
-
memory/1896-577-0x000000013F110000-0x000000013F464000-memory.dmpFilesize
3.3MB
-
memory/1916-578-0x000000013F5E0000-0x000000013F934000-memory.dmpFilesize
3.3MB
-
memory/2080-22-0x000000013F8D0000-0x000000013FC24000-memory.dmpFilesize
3.3MB
-
memory/2188-8-0x000000013F570000-0x000000013F8C4000-memory.dmpFilesize
3.3MB
-
memory/2188-471-0x000000013F6B0000-0x000000013FA04000-memory.dmpFilesize
3.3MB
-
memory/2188-1-0x0000000000080000-0x0000000000090000-memory.dmpFilesize
64KB
-
memory/2188-567-0x000000013F1E0000-0x000000013F534000-memory.dmpFilesize
3.3MB
-
memory/2188-48-0x00000000022B0000-0x0000000002604000-memory.dmpFilesize
3.3MB
-
memory/2188-484-0x000000013F9E0000-0x000000013FD34000-memory.dmpFilesize
3.3MB
-
memory/2188-39-0x000000013F460000-0x000000013F7B4000-memory.dmpFilesize
3.3MB
-
memory/2188-0-0x000000013FE50000-0x00000001401A4000-memory.dmpFilesize
3.3MB
-
memory/2188-55-0x000000013FE50000-0x00000001401A4000-memory.dmpFilesize
3.3MB
-
memory/2188-469-0x000000013F840000-0x000000013FB94000-memory.dmpFilesize
3.3MB
-
memory/2188-29-0x000000013F670000-0x000000013F9C4000-memory.dmpFilesize
3.3MB
-
memory/2188-468-0x000000013F6D0000-0x000000013FA24000-memory.dmpFilesize
3.3MB
-
memory/2188-460-0x000000013F5B0000-0x000000013F904000-memory.dmpFilesize
3.3MB
-
memory/2188-233-0x000000013F840000-0x000000013FB94000-memory.dmpFilesize
3.3MB
-
memory/2188-234-0x000000013F5E0000-0x000000013F934000-memory.dmpFilesize
3.3MB
-
memory/2188-237-0x00000000022B0000-0x0000000002604000-memory.dmpFilesize
3.3MB
-
memory/2188-424-0x000000013F2B0000-0x000000013F604000-memory.dmpFilesize
3.3MB
-
memory/2188-21-0x00000000022B0000-0x0000000002604000-memory.dmpFilesize
3.3MB
-
memory/2188-383-0x000000013F940000-0x000000013FC94000-memory.dmpFilesize
3.3MB
-
memory/2188-410-0x00000000022B0000-0x0000000002604000-memory.dmpFilesize
3.3MB
-
memory/2188-415-0x000000013F630000-0x000000013F984000-memory.dmpFilesize
3.3MB
-
memory/2348-589-0x000000013F940000-0x000000013FC94000-memory.dmpFilesize
3.3MB
-
memory/2416-275-0x000000013F180000-0x000000013F4D4000-memory.dmpFilesize
3.3MB
-
memory/2468-62-0x000000013FC10000-0x000000013FF64000-memory.dmpFilesize
3.3MB
-
memory/2536-190-0x000000013F590000-0x000000013F8E4000-memory.dmpFilesize
3.3MB
-
memory/2564-636-0x000000013F2B0000-0x000000013F604000-memory.dmpFilesize
3.3MB
-
memory/2572-28-0x000000013F670000-0x000000013F9C4000-memory.dmpFilesize
3.3MB
-
memory/2620-42-0x000000013F460000-0x000000013F7B4000-memory.dmpFilesize
3.3MB
-
memory/2640-610-0x000000013FCC0000-0x0000000140014000-memory.dmpFilesize
3.3MB
-
memory/2644-19-0x000000013F570000-0x000000013F8C4000-memory.dmpFilesize
3.3MB
-
memory/2676-35-0x000000013F2D0000-0x000000013F624000-memory.dmpFilesize
3.3MB
-
memory/2828-49-0x000000013FB50000-0x000000013FEA4000-memory.dmpFilesize
3.3MB
-
memory/2924-230-0x000000013F830000-0x000000013FB84000-memory.dmpFilesize
3.3MB