Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 17:16
Behavioral task
behavioral1
Sample
20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe
Resource
win7-20240705-en
General
-
Target
20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe
-
Size
5.9MB
-
MD5
082582edd44053bbf44279b2640b7bc1
-
SHA1
53b5c9f93c0bd15335e61d38d32d39db941a19c4
-
SHA256
1006bf08fa76711dcfc5d651d31e90af2cfdb9b0fc38939995d9530c7e7bf98f
-
SHA512
d303eb8a6c4f431a97b0db556f1046b003d3003a8372156d030ab2f4ad783d8a3c89ed0acd0f684e7b6ec1cef65cbfdffae7d1299a76fdc322cacff986fc93f2
-
SSDEEP
49152:oezaTF8FcNkNdfE0pZ9ozt4wIlr6GjvzW+UBA3Gd7po52xWKQY2v2V6liK1uOCeq:oemTLkNdfE0pZr9/mQ32lU+
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral1/files/0x0004000000005c50-3.dat cobalt_reflective_dll behavioral1/files/0x0008000000016eb4-11.dat cobalt_reflective_dll behavioral1/files/0x0007000000016ed2-17.dat cobalt_reflective_dll behavioral1/files/0x00070000000173e4-25.dat cobalt_reflective_dll behavioral1/files/0x0007000000017400-28.dat cobalt_reflective_dll behavioral1/files/0x0009000000017409-33.dat cobalt_reflective_dll behavioral1/files/0x00070000000190d2-36.dat cobalt_reflective_dll behavioral1/files/0x00060000000190e5-46.dat cobalt_reflective_dll behavioral1/files/0x0005000000019207-56.dat cobalt_reflective_dll behavioral1/files/0x0005000000019248-66.dat cobalt_reflective_dll behavioral1/files/0x000500000001925a-71.dat cobalt_reflective_dll behavioral1/files/0x0005000000019267-81.dat cobalt_reflective_dll behavioral1/files/0x000500000001926a-86.dat cobalt_reflective_dll behavioral1/files/0x000500000001928e-91.dat cobalt_reflective_dll behavioral1/files/0x0005000000019358-102.dat cobalt_reflective_dll behavioral1/files/0x000500000001935b-105.dat cobalt_reflective_dll behavioral1/files/0x0005000000019297-96.dat cobalt_reflective_dll behavioral1/files/0x000500000001925d-76.dat cobalt_reflective_dll behavioral1/files/0x0005000000019230-61.dat cobalt_reflective_dll behavioral1/files/0x00050000000191da-51.dat cobalt_reflective_dll behavioral1/files/0x0007000000017073-21.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 51 IoCs
resource yara_rule behavioral1/memory/2220-0-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/files/0x0004000000005c50-3.dat xmrig behavioral1/files/0x0008000000016eb4-11.dat xmrig behavioral1/files/0x0007000000016ed2-17.dat xmrig behavioral1/files/0x00070000000173e4-25.dat xmrig behavioral1/files/0x0007000000017400-28.dat xmrig behavioral1/files/0x0009000000017409-33.dat xmrig behavioral1/files/0x00070000000190d2-36.dat xmrig behavioral1/files/0x00060000000190e5-46.dat xmrig behavioral1/files/0x0005000000019207-56.dat xmrig behavioral1/files/0x0005000000019248-66.dat xmrig behavioral1/files/0x000500000001925a-71.dat xmrig behavioral1/files/0x0005000000019267-81.dat xmrig behavioral1/files/0x000500000001926a-86.dat xmrig behavioral1/files/0x000500000001928e-91.dat xmrig behavioral1/files/0x0005000000019358-102.dat xmrig behavioral1/memory/2860-109-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/memory/640-116-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/memory/2732-115-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/memory/2632-117-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/memory/2168-118-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/memory/2668-114-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/memory/2796-113-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/memory/2684-112-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/memory/2980-110-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/memory/2764-108-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/files/0x000500000001935b-105.dat xmrig behavioral1/files/0x0005000000019297-96.dat xmrig behavioral1/files/0x000500000001925d-76.dat xmrig behavioral1/files/0x0005000000019230-61.dat xmrig behavioral1/files/0x00050000000191da-51.dat xmrig behavioral1/memory/2828-120-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/memory/1736-121-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/memory/1552-122-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/memory/2088-119-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/files/0x0007000000017073-21.dat xmrig behavioral1/memory/2220-123-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/memory/2860-125-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/memory/2764-124-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/memory/2732-127-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/memory/2796-126-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/memory/2684-129-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/memory/640-131-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/memory/2668-130-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/memory/2980-128-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/memory/2632-132-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/memory/2168-133-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/memory/2088-134-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/memory/1736-135-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/memory/1552-137-0x0000000140000000-0x0000000140354000-memory.dmp xmrig behavioral1/memory/2828-136-0x0000000140000000-0x0000000140354000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
pid Process 2764 BBhuOkn.exe 2860 YiobekW.exe 2980 WeEGgAv.exe 2684 MpwGCsW.exe 2796 BYCmNix.exe 2668 hMMDSrG.exe 2732 wJdnBVq.exe 640 TUuyPpF.exe 2632 QdEFMss.exe 2168 plPllvM.exe 2088 rYKYotY.exe 2828 BaffgwL.exe 1736 xaOJyoH.exe 1552 OvVcwtv.exe 1520 jFUfkrx.exe 1300 cwXtDdU.exe 2916 qzvocEY.exe 648 ZOQZfUu.exe 1064 eiigfoz.exe 2836 pvhvegi.exe 2816 NWNZIfy.exe -
Loads dropped DLL 21 IoCs
pid Process 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe -
resource yara_rule behavioral1/memory/2220-0-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/files/0x0004000000005c50-3.dat upx behavioral1/files/0x0008000000016eb4-11.dat upx behavioral1/files/0x0007000000016ed2-17.dat upx behavioral1/files/0x00070000000173e4-25.dat upx behavioral1/files/0x0007000000017400-28.dat upx behavioral1/files/0x0009000000017409-33.dat upx behavioral1/files/0x00070000000190d2-36.dat upx behavioral1/files/0x00060000000190e5-46.dat upx behavioral1/files/0x0005000000019207-56.dat upx behavioral1/files/0x0005000000019248-66.dat upx behavioral1/files/0x000500000001925a-71.dat upx behavioral1/files/0x0005000000019267-81.dat upx behavioral1/files/0x000500000001926a-86.dat upx behavioral1/files/0x000500000001928e-91.dat upx behavioral1/files/0x0005000000019358-102.dat upx behavioral1/memory/2860-109-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/memory/640-116-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/memory/2732-115-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/memory/2632-117-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/memory/2168-118-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/memory/2668-114-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/memory/2796-113-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/memory/2684-112-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/memory/2980-110-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/memory/2764-108-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/files/0x000500000001935b-105.dat upx behavioral1/files/0x0005000000019297-96.dat upx behavioral1/files/0x000500000001925d-76.dat upx behavioral1/files/0x0005000000019230-61.dat upx behavioral1/files/0x00050000000191da-51.dat upx behavioral1/memory/2828-120-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/memory/1736-121-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/memory/1552-122-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/memory/2088-119-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/files/0x0007000000017073-21.dat upx behavioral1/memory/2220-123-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/memory/2860-125-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/memory/2764-124-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/memory/2732-127-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/memory/2796-126-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/memory/2684-129-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/memory/640-131-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/memory/2668-130-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/memory/2980-128-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/memory/2632-132-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/memory/2168-133-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/memory/2088-134-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/memory/1736-135-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/memory/1552-137-0x0000000140000000-0x0000000140354000-memory.dmp upx behavioral1/memory/2828-136-0x0000000140000000-0x0000000140354000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\System\hMMDSrG.exe 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\TUuyPpF.exe 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\xaOJyoH.exe 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\BBhuOkn.exe 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\WeEGgAv.exe 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\plPllvM.exe 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\jFUfkrx.exe 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\NWNZIfy.exe 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\eiigfoz.exe 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\YiobekW.exe 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\BYCmNix.exe 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\wJdnBVq.exe 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\QdEFMss.exe 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\BaffgwL.exe 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\ZOQZfUu.exe 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\MpwGCsW.exe 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\rYKYotY.exe 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\OvVcwtv.exe 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\cwXtDdU.exe 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\qzvocEY.exe 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\pvhvegi.exe 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe Token: SeLockMemoryPrivilege 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2764 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 31 PID 2220 wrote to memory of 2764 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 31 PID 2220 wrote to memory of 2764 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 31 PID 2220 wrote to memory of 2860 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 32 PID 2220 wrote to memory of 2860 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 32 PID 2220 wrote to memory of 2860 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 32 PID 2220 wrote to memory of 2980 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 33 PID 2220 wrote to memory of 2980 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 33 PID 2220 wrote to memory of 2980 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 33 PID 2220 wrote to memory of 2684 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 34 PID 2220 wrote to memory of 2684 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 34 PID 2220 wrote to memory of 2684 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 34 PID 2220 wrote to memory of 2796 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 35 PID 2220 wrote to memory of 2796 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 35 PID 2220 wrote to memory of 2796 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 35 PID 2220 wrote to memory of 2668 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 36 PID 2220 wrote to memory of 2668 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 36 PID 2220 wrote to memory of 2668 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 36 PID 2220 wrote to memory of 2732 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 37 PID 2220 wrote to memory of 2732 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 37 PID 2220 wrote to memory of 2732 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 37 PID 2220 wrote to memory of 640 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 38 PID 2220 wrote to memory of 640 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 38 PID 2220 wrote to memory of 640 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 38 PID 2220 wrote to memory of 2632 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 39 PID 2220 wrote to memory of 2632 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 39 PID 2220 wrote to memory of 2632 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 39 PID 2220 wrote to memory of 2168 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 40 PID 2220 wrote to memory of 2168 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 40 PID 2220 wrote to memory of 2168 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 40 PID 2220 wrote to memory of 2088 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 41 PID 2220 wrote to memory of 2088 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 41 PID 2220 wrote to memory of 2088 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 41 PID 2220 wrote to memory of 2828 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 42 PID 2220 wrote to memory of 2828 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 42 PID 2220 wrote to memory of 2828 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 42 PID 2220 wrote to memory of 1736 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 43 PID 2220 wrote to memory of 1736 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 43 PID 2220 wrote to memory of 1736 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 43 PID 2220 wrote to memory of 1552 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 44 PID 2220 wrote to memory of 1552 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 44 PID 2220 wrote to memory of 1552 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 44 PID 2220 wrote to memory of 1520 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 45 PID 2220 wrote to memory of 1520 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 45 PID 2220 wrote to memory of 1520 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 45 PID 2220 wrote to memory of 1300 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 46 PID 2220 wrote to memory of 1300 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 46 PID 2220 wrote to memory of 1300 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 46 PID 2220 wrote to memory of 2916 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 47 PID 2220 wrote to memory of 2916 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 47 PID 2220 wrote to memory of 2916 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 47 PID 2220 wrote to memory of 648 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 48 PID 2220 wrote to memory of 648 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 48 PID 2220 wrote to memory of 648 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 48 PID 2220 wrote to memory of 1064 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 49 PID 2220 wrote to memory of 1064 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 49 PID 2220 wrote to memory of 1064 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 49 PID 2220 wrote to memory of 2836 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 50 PID 2220 wrote to memory of 2836 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 50 PID 2220 wrote to memory of 2836 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 50 PID 2220 wrote to memory of 2816 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 51 PID 2220 wrote to memory of 2816 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 51 PID 2220 wrote to memory of 2816 2220 20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe"C:\Users\Admin\AppData\Local\Temp\20240901082582edd44053bbf44279b2640b7bc1cobaltstrikecobaltstrikepoetrat.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\System\BBhuOkn.exeC:\Windows\System\BBhuOkn.exe2⤵
- Executes dropped EXE
PID:2764
-
-
C:\Windows\System\YiobekW.exeC:\Windows\System\YiobekW.exe2⤵
- Executes dropped EXE
PID:2860
-
-
C:\Windows\System\WeEGgAv.exeC:\Windows\System\WeEGgAv.exe2⤵
- Executes dropped EXE
PID:2980
-
-
C:\Windows\System\MpwGCsW.exeC:\Windows\System\MpwGCsW.exe2⤵
- Executes dropped EXE
PID:2684
-
-
C:\Windows\System\BYCmNix.exeC:\Windows\System\BYCmNix.exe2⤵
- Executes dropped EXE
PID:2796
-
-
C:\Windows\System\hMMDSrG.exeC:\Windows\System\hMMDSrG.exe2⤵
- Executes dropped EXE
PID:2668
-
-
C:\Windows\System\wJdnBVq.exeC:\Windows\System\wJdnBVq.exe2⤵
- Executes dropped EXE
PID:2732
-
-
C:\Windows\System\TUuyPpF.exeC:\Windows\System\TUuyPpF.exe2⤵
- Executes dropped EXE
PID:640
-
-
C:\Windows\System\QdEFMss.exeC:\Windows\System\QdEFMss.exe2⤵
- Executes dropped EXE
PID:2632
-
-
C:\Windows\System\plPllvM.exeC:\Windows\System\plPllvM.exe2⤵
- Executes dropped EXE
PID:2168
-
-
C:\Windows\System\rYKYotY.exeC:\Windows\System\rYKYotY.exe2⤵
- Executes dropped EXE
PID:2088
-
-
C:\Windows\System\BaffgwL.exeC:\Windows\System\BaffgwL.exe2⤵
- Executes dropped EXE
PID:2828
-
-
C:\Windows\System\xaOJyoH.exeC:\Windows\System\xaOJyoH.exe2⤵
- Executes dropped EXE
PID:1736
-
-
C:\Windows\System\OvVcwtv.exeC:\Windows\System\OvVcwtv.exe2⤵
- Executes dropped EXE
PID:1552
-
-
C:\Windows\System\jFUfkrx.exeC:\Windows\System\jFUfkrx.exe2⤵
- Executes dropped EXE
PID:1520
-
-
C:\Windows\System\cwXtDdU.exeC:\Windows\System\cwXtDdU.exe2⤵
- Executes dropped EXE
PID:1300
-
-
C:\Windows\System\qzvocEY.exeC:\Windows\System\qzvocEY.exe2⤵
- Executes dropped EXE
PID:2916
-
-
C:\Windows\System\ZOQZfUu.exeC:\Windows\System\ZOQZfUu.exe2⤵
- Executes dropped EXE
PID:648
-
-
C:\Windows\System\eiigfoz.exeC:\Windows\System\eiigfoz.exe2⤵
- Executes dropped EXE
PID:1064
-
-
C:\Windows\System\pvhvegi.exeC:\Windows\System\pvhvegi.exe2⤵
- Executes dropped EXE
PID:2836
-
-
C:\Windows\System\NWNZIfy.exeC:\Windows\System\NWNZIfy.exe2⤵
- Executes dropped EXE
PID:2816
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.9MB
MD591dc02e1b28304c46a01f0ca0579e1d6
SHA1189b0d4b7b474dee76ae531b9ee6c8d229991488
SHA2565b3dd93089a2225df7f37382295fa3c4c9fb48b62ceb56c467e315cf09ae7cb4
SHA51216aad6785894f06e89e2236aa141c24b8ae6caec2929ea1352a071985ba456f7a395042e22c6ac816c164af400b2fdd5ce85d1cd0d9614beb407a4fe335328d5
-
Filesize
5.9MB
MD58f81d6aad264e4f98e6c6d9ee103a818
SHA1be55d6988e6ab47c11132ae02b1321f9c9a5b80c
SHA256da21eaba8c084dc20b427d87abb7bd1a35475011599c580756d73932ea61c8f5
SHA512a585e4ed028f6636c4afeb1ce21b0cbcd7e57eed30f86901093527d4661e308e78cd267f5a77ba902c51ea1906886bca348a709ae3b132404c35bc68694e75e2
-
Filesize
5.9MB
MD5c65ceb441de3012791c19061c46fde20
SHA1ebbc28409eb474c04429880a79e3461569d39d7c
SHA25670a77d2ccf3e2d11fcfd02137b0c2887fdd7ce5043f82d7b0815b809641e6d99
SHA512379b091177058a1178ae7eeee6baa084e6e96079b4d65629cf203fcc42b9675fb9136456cc5544ac621f52e0058a60974396ecda1d6424de96415d07a5169776
-
Filesize
5.9MB
MD5874cb2f8d4763ded1bc6decf940b328d
SHA12a87490228485af879829bddb1acb911649c40ed
SHA25617c1420f81435d129c1194bd64c92803cc446d5cba3a6072ae796fbbca56b9a0
SHA512f8f248babc160299cb41173dd13912074cec204c9f38f0c2d13cebd673c854a7ae1bb9f9423408fa14fce4617ddee488d895e188b118bb8161b51debba5e9825
-
Filesize
5.9MB
MD5cea142bf6ad971344bf7fc53c6745e8a
SHA148401b7ae37e29420263214720f116e3d11b01fd
SHA25612c6da01e902ffa437cbc995e876078a8ba22b80746ea88cef8b1c97113b21bd
SHA512bb1aeb99ffb3ce19e3170cf5484770af523b6d67d121d2d71322643d1d47f408556cc81880654a2a73cbf072384707ee764f3f60f9569410dbed6969ff7125eb
-
Filesize
5.9MB
MD5ef2656c40655427a471d8955a0644451
SHA102e554df2d70638d2e806c1c3709dfe6aa227b14
SHA2560b446b8f6908989e4032ea8cab5ebfd8c5be9fee4e67093332046e5689b5c5e7
SHA5124fb521240e5b6cfab65523b5a5a544ff715b9f5632bf8b020d0071cb2dfcf4d4fcb8dfaa1b030fa95daa2027bbe193ce80fa1e72bf379f868c6acf55d16f29c1
-
Filesize
5.9MB
MD5e6f11102fb5f1643c1e03f175531ff7d
SHA14cad5aa3f8ace05b978a9e822e8fe7fe1efba4f3
SHA256cc30b809d1ccb66e59b6f8f657f100b36a526319df0f5b65a7ab3e6abe26864a
SHA512bd745211a026941483e6a2bf57c4e81179c3bb781730fbef425c325ab3fe6b9e2807960b4827e271005dc72418f61e624f2c0be267d8760d0bfa7402075f38ef
-
Filesize
5.9MB
MD59e018baec7073405b9d125a111c7fb1e
SHA1e657a3b8a52957be83feee81980b8405048b6b56
SHA2568860d38f53ed852ce78aef511c669674fc1555aec8e9e983c96de0315665565e
SHA51271e868dc0e15a9ff8f56c276e68fd43a97cb33776cccfe637750f838a9d858ea5a0d26ea8dea3fb11ef9b223fb27b27f277152b8b4adec8aacefd005d7e16f8d
-
Filesize
5.9MB
MD57559f51a1efac5d04b6b747070d9eaa1
SHA1bfbfd227b2cb1ebec28ddf7a70f37a187e0d4d59
SHA256d20f286b36f9117edd68cc51e753c85090e01ea81a6ffa39423bc0894d40685b
SHA5126b910e047010e1d9a1b576fac7555655351946fda3933436ab13d5dd6122b510c613c3c4bda9baebe121b741299565966c74c6ffe918b8d41beabb866f48737f
-
Filesize
5.9MB
MD57969a6b9ae71659772e056b144c8431b
SHA11782fbf87dfdb1a8f079856463d8f48cb3858732
SHA2564d73a15165b258fe4f424e8a7366f86a1cd15bfed481e77abf493c701fb3ab6a
SHA512e9c1544cb6e2a973edda2ada43b4b27caba997917ffa832cdda3812b87d8602a97a790c220e81f99ccbcd77edf05644ba492613e9f362f32564de6db4f85c17c
-
Filesize
5.9MB
MD5aa6d1920a5cf4faaf21a0d254df4c124
SHA1ef5839e35201193cd4c10a9e487770a8503e5c47
SHA2567a77e18e56cf5edc2e8d344e53d30b9b435286fd5ba0c4493e52867a003422e7
SHA5122b2c8078c6e5be734dbe23ccef3a33d6bea5fa26b45363e9049a65ca2914c32347bb6a819b69a188da50bcd5f2e0facb3ae8236ff074e664b108a7993cf8bfde
-
Filesize
5.9MB
MD52721afa9ec7a6c70d370cfe58c8a4f9b
SHA1fce7b7920a03f97bac9b61b29f208ea4270d3b92
SHA256c7dd0c2e35d2b378c39921a8fa4655afb3e0da459267c00fba5e15230f65a5fe
SHA512c3b52ecb135a3ffb8d1b2026383eccb3f00216b2904d974a6d4a5c8c1aeae2a6b3f9b1f464867ca8674a2398dc0086342529a1c900dd88cdeb37ff53f3addf16
-
Filesize
5.9MB
MD5ef8386244a682c45d5522fdeb39c99aa
SHA1618ec43cb1fc4cf5ef307548ada2bd69195bebda
SHA256139ca54b09de07d0545072fdb6a1f43c686399e194f075e4bc06b2d36a305fbe
SHA512191bd10d169301b08688961beceae3960e036f030920b053f16061cefb8ec502dd94556beb22f23262cb8df1f2d9e7ed6f116fc6b5d2fb4b040422f10f59c8d1
-
Filesize
5.9MB
MD5acdb33bb51706abd7557c35002fe10c8
SHA1030f2b52b25d520a14c16cc0709f5cc4c373b3bc
SHA256724b51ca15fe75ed2574bd7a2282ac44a4d8b447c0218217925c4e18bb451d9a
SHA512b87b53d8b00d05de07096f3be5418a59c04dd0e9a5acec1ecc9c2ca33d464c183b75389db905536a2473667be634d184c5b40fbead3bbbfc1b4e7596c42d4ba4
-
Filesize
5.9MB
MD56d157af85baf473142bc32a52ebf8a74
SHA18bc7cd3315dadf98f188ea6dc0732bb71279d328
SHA2562db1ebfeee6794270b9f563402f490f2923460a12ac92d5154d70154be171772
SHA512b0e33a5d22fcc8c5af81917f3b76fd37c12cff9aabe1900fd75ca0116f128e3eab340d1931fc71681af7a9df1d57a4a826d5debf2141e43171f855b3adb76b15
-
Filesize
5.9MB
MD575a162716dfec3bdec6611d21fa62677
SHA14c5afb527373326a1452b776acce375def4a1857
SHA256a233ee83958b61c5da5923c3922a95ac9a1ca3ba8761c1a23d7c3176be66b165
SHA512f02689a6c9375828a246bce2a7e2743878012e66aa85368472c0e3043265d08313ce6e40716202ceca10c7c3f97c9854e62e687f99eaeb898787aed7eaed82d9
-
Filesize
5.9MB
MD5b651168b0c5a7834dab4bd2ed5a7c23a
SHA1b4c8d18a63bdfe70c30c747373eacdcbe87121d5
SHA25621efc760ca196312dd5842ec8191b05f4b4d17909582db88fc983cd681739360
SHA51250679d7efe6b1d1c2a15946d8226175d803254aa5116695e576d2e77588da43d3e6db5d542d23324b9e913452977d407cec1478c685245b7ec0839ec1d07e7fb
-
Filesize
5.9MB
MD5ab1fe87c9d663478671a5d021400596f
SHA1616f4172add95731ba953067f9b14919de659810
SHA25669805b68105302249ba3336752cda78bed584296bd35c39ddd080c82e439643d
SHA51259dfae611868c54c3d1a4449ae5ba9305f8275d35141dfb17a6a07deee83282e927570035f30ad81b582de1b0809c864df955fa9f4f6bc11e7fc5e1323adb8da
-
Filesize
5.9MB
MD5f4e7a87d333d615a3ce51ca215c54b46
SHA1fb3a0850e446f6f4056c52883d92e86abe03daf6
SHA25662c3454bb2b5847cfb04a0ee0b13b78be5977feccff62fe0e64a045a66beb13e
SHA512864c8e154de72f47ebe8c8765cd60d88a3680b7919d2aed25c3fc62ea27ab1f15d37b919b39740b0493691620d60c5f62498b9e4e7daf6a1f36084c6855ba0cd
-
Filesize
5.9MB
MD5b214f6c74226e389e6f88b68f00ac48b
SHA11a796864d2caac7468bfff1ad4b3fd7459679605
SHA2568aca4e92ad539ac24e0a3d7939b9a179c32fe9870ab0313b6b313fd6dc1eaf07
SHA512b06d12956f25b16fb9275e217a48d9a8ebdc8c5c6eea64b24f23944bb5a43bf461370e664f7fbcdfb8f5443f3930bc39db5a63b0644184253e10b161863612f5
-
Filesize
5.9MB
MD51c6b71db85390f36854fcd44eca7f281
SHA1e3081a8b8cb52c80e503c207b45c80af44dc59a2
SHA256d9fdbe479ffd4d2cc0f280ba9fad670491bc527d0713506bd5f6ef87e24069c3
SHA5120e16f23ba471408b6077f7e8cdf1dce997618419276b1125abbb290ad55badb622f99f790075d4d9eac0fc920483939a639db049c315b48cb6c26554e47316b8