Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 15:03
Behavioral task
behavioral1
Sample
2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe
Resource
win7-20240903-en
General
-
Target
2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe
-
Size
5.2MB
-
MD5
89a539d79afb60e67b195391dad2f449
-
SHA1
cda572ed4656f13e5cef204b562c2503c4bb5792
-
SHA256
1b39cb98557dfd97977da0b756f9ba672df999e827c05b9c9133c7f5ec96dfc5
-
SHA512
dfde9ad1a8c51da4b3871e13e65376e0d7ade92d1004979d84139d3095f043403e7c344dd61e869c60b6524e334daea30194db8cfb14d80f07102ee2f0cbe2bf
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lG:RWWBibf56utgpPFotBER/mQ32lUK
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral1/files/0x00090000000120ce-3.dat cobalt_reflective_dll behavioral1/files/0x0008000000016d36-11.dat cobalt_reflective_dll behavioral1/files/0x0008000000016d3f-15.dat cobalt_reflective_dll behavioral1/files/0x0007000000016d63-32.dat cobalt_reflective_dll behavioral1/files/0x0005000000019279-105.dat cobalt_reflective_dll behavioral1/files/0x000500000001925e-101.dat cobalt_reflective_dll behavioral1/files/0x0005000000019227-100.dat cobalt_reflective_dll behavioral1/files/0x0005000000019261-97.dat cobalt_reflective_dll behavioral1/files/0x000500000001922c-90.dat cobalt_reflective_dll behavioral1/files/0x0006000000018bf3-83.dat cobalt_reflective_dll behavioral1/files/0x0005000000018742-74.dat cobalt_reflective_dll behavioral1/files/0x0005000000018781-71.dat cobalt_reflective_dll behavioral1/files/0x0005000000018731-65.dat cobalt_reflective_dll behavioral1/files/0x0005000000019284-115.dat cobalt_reflective_dll behavioral1/files/0x000500000001926a-114.dat cobalt_reflective_dll behavioral1/files/0x000500000001878c-80.dat cobalt_reflective_dll behavioral1/files/0x00050000000186f8-62.dat cobalt_reflective_dll behavioral1/files/0x0009000000016dd9-52.dat cobalt_reflective_dll behavioral1/files/0x0007000000016d6d-47.dat cobalt_reflective_dll behavioral1/files/0x0007000000016d69-38.dat cobalt_reflective_dll behavioral1/files/0x0008000000016d47-27.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 38 IoCs
resource yara_rule behavioral1/memory/2124-18-0x000000013FB00000-0x000000013FE51000-memory.dmp xmrig behavioral1/memory/1264-21-0x000000013F090000-0x000000013F3E1000-memory.dmp xmrig behavioral1/memory/2616-109-0x000000013FB60000-0x000000013FEB1000-memory.dmp xmrig behavioral1/memory/2720-130-0x000000013F5B0000-0x000000013F901000-memory.dmp xmrig behavioral1/memory/2740-129-0x000000013F1D0000-0x000000013F521000-memory.dmp xmrig behavioral1/memory/2124-56-0x000000013FB00000-0x000000013FE51000-memory.dmp xmrig behavioral1/memory/2360-55-0x000000013F280000-0x000000013F5D1000-memory.dmp xmrig behavioral1/memory/1164-120-0x000000013F790000-0x000000013FAE1000-memory.dmp xmrig behavioral1/memory/2896-131-0x000000013FA20000-0x000000013FD71000-memory.dmp xmrig behavioral1/memory/2360-79-0x000000013FF80000-0x00000001402D1000-memory.dmp xmrig behavioral1/memory/2652-77-0x000000013FD40000-0x0000000140091000-memory.dmp xmrig behavioral1/memory/3012-132-0x000000013F0B0000-0x000000013F401000-memory.dmp xmrig behavioral1/memory/2876-43-0x000000013F790000-0x000000013FAE1000-memory.dmp xmrig behavioral1/memory/2552-19-0x000000013FBA0000-0x000000013FEF1000-memory.dmp xmrig behavioral1/memory/2360-139-0x000000013FF80000-0x00000001402D1000-memory.dmp xmrig behavioral1/memory/2360-141-0x000000013F280000-0x000000013F5D1000-memory.dmp xmrig behavioral1/memory/2004-156-0x000000013F200000-0x000000013F551000-memory.dmp xmrig behavioral1/memory/608-162-0x000000013F8E0000-0x000000013FC31000-memory.dmp xmrig behavioral1/memory/1984-161-0x000000013F4F0000-0x000000013F841000-memory.dmp xmrig behavioral1/memory/1648-159-0x000000013F510000-0x000000013F861000-memory.dmp xmrig behavioral1/memory/1560-158-0x000000013FA20000-0x000000013FD71000-memory.dmp xmrig behavioral1/memory/1680-157-0x000000013FED0000-0x0000000140221000-memory.dmp xmrig behavioral1/memory/2476-155-0x000000013FE00000-0x0000000140151000-memory.dmp xmrig behavioral1/memory/2644-153-0x000000013FA60000-0x000000013FDB1000-memory.dmp xmrig behavioral1/memory/2724-151-0x000000013FF80000-0x00000001402D1000-memory.dmp xmrig behavioral1/memory/2948-160-0x000000013F050000-0x000000013F3A1000-memory.dmp xmrig behavioral1/memory/2360-164-0x000000013F280000-0x000000013F5D1000-memory.dmp xmrig behavioral1/memory/2124-231-0x000000013FB00000-0x000000013FE51000-memory.dmp xmrig behavioral1/memory/1264-233-0x000000013F090000-0x000000013F3E1000-memory.dmp xmrig behavioral1/memory/2552-235-0x000000013FBA0000-0x000000013FEF1000-memory.dmp xmrig behavioral1/memory/2740-237-0x000000013F1D0000-0x000000013F521000-memory.dmp xmrig behavioral1/memory/2720-239-0x000000013F5B0000-0x000000013F901000-memory.dmp xmrig behavioral1/memory/2876-241-0x000000013F790000-0x000000013FAE1000-memory.dmp xmrig behavioral1/memory/3012-243-0x000000013F0B0000-0x000000013F401000-memory.dmp xmrig behavioral1/memory/2896-245-0x000000013FA20000-0x000000013FD71000-memory.dmp xmrig behavioral1/memory/2652-247-0x000000013FD40000-0x0000000140091000-memory.dmp xmrig behavioral1/memory/2616-249-0x000000013FB60000-0x000000013FEB1000-memory.dmp xmrig behavioral1/memory/1164-251-0x000000013F790000-0x000000013FAE1000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
pid Process 2124 PPJIaUc.exe 2552 jsKcdFH.exe 1264 CHIclsb.exe 2740 ulGpocU.exe 2720 TCvlMBD.exe 2876 mftKjHJ.exe 2896 KFhllks.exe 3012 YDZQNAn.exe 2652 vEaiGVS.exe 2616 YeZpPjo.exe 1164 YAGqCIF.exe 2004 SygCqkN.exe 1560 dYYUVBF.exe 2948 DMJRCuW.exe 608 sZuUNPH.exe 2724 ouAxClJ.exe 2644 rAjGSlg.exe 2476 rSuHJjL.exe 1680 zpYtFeB.exe 1648 nZGzcPN.exe 1984 EYUcBFO.exe -
Loads dropped DLL 21 IoCs
pid Process 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe -
resource yara_rule behavioral1/memory/2360-0-0x000000013F280000-0x000000013F5D1000-memory.dmp upx behavioral1/files/0x00090000000120ce-3.dat upx behavioral1/files/0x0008000000016d36-11.dat upx behavioral1/files/0x0008000000016d3f-15.dat upx behavioral1/memory/2124-18-0x000000013FB00000-0x000000013FE51000-memory.dmp upx behavioral1/memory/1264-21-0x000000013F090000-0x000000013F3E1000-memory.dmp upx behavioral1/files/0x0007000000016d63-32.dat upx behavioral1/memory/2740-28-0x000000013F1D0000-0x000000013F521000-memory.dmp upx behavioral1/memory/2896-49-0x000000013FA20000-0x000000013FD71000-memory.dmp upx behavioral1/memory/2616-109-0x000000013FB60000-0x000000013FEB1000-memory.dmp upx behavioral1/files/0x0005000000019279-105.dat upx behavioral1/files/0x000500000001925e-101.dat upx behavioral1/files/0x0005000000019227-100.dat upx behavioral1/files/0x0005000000019261-97.dat upx behavioral1/files/0x000500000001922c-90.dat upx behavioral1/files/0x0006000000018bf3-83.dat upx behavioral1/memory/2720-130-0x000000013F5B0000-0x000000013F901000-memory.dmp upx behavioral1/memory/2740-129-0x000000013F1D0000-0x000000013F521000-memory.dmp upx behavioral1/files/0x0005000000018742-74.dat upx behavioral1/files/0x0005000000018781-71.dat upx behavioral1/files/0x0005000000018731-65.dat upx behavioral1/memory/2124-56-0x000000013FB00000-0x000000013FE51000-memory.dmp upx behavioral1/memory/2360-55-0x000000013F280000-0x000000013F5D1000-memory.dmp upx behavioral1/memory/1164-120-0x000000013F790000-0x000000013FAE1000-memory.dmp upx behavioral1/memory/3012-54-0x000000013F0B0000-0x000000013F401000-memory.dmp upx behavioral1/files/0x0005000000019284-115.dat upx behavioral1/files/0x000500000001926a-114.dat upx behavioral1/files/0x000500000001878c-80.dat upx behavioral1/memory/2896-131-0x000000013FA20000-0x000000013FD71000-memory.dmp upx behavioral1/memory/2652-77-0x000000013FD40000-0x0000000140091000-memory.dmp upx behavioral1/files/0x00050000000186f8-62.dat upx behavioral1/files/0x0009000000016dd9-52.dat upx behavioral1/memory/3012-132-0x000000013F0B0000-0x000000013F401000-memory.dmp upx behavioral1/files/0x0007000000016d6d-47.dat upx behavioral1/memory/2876-43-0x000000013F790000-0x000000013FAE1000-memory.dmp upx behavioral1/memory/2720-40-0x000000013F5B0000-0x000000013F901000-memory.dmp upx behavioral1/files/0x0007000000016d69-38.dat upx behavioral1/files/0x0008000000016d47-27.dat upx behavioral1/memory/2552-19-0x000000013FBA0000-0x000000013FEF1000-memory.dmp upx behavioral1/memory/2360-141-0x000000013F280000-0x000000013F5D1000-memory.dmp upx behavioral1/memory/2004-156-0x000000013F200000-0x000000013F551000-memory.dmp upx behavioral1/memory/608-162-0x000000013F8E0000-0x000000013FC31000-memory.dmp upx behavioral1/memory/1984-161-0x000000013F4F0000-0x000000013F841000-memory.dmp upx behavioral1/memory/1648-159-0x000000013F510000-0x000000013F861000-memory.dmp upx behavioral1/memory/1560-158-0x000000013FA20000-0x000000013FD71000-memory.dmp upx behavioral1/memory/1680-157-0x000000013FED0000-0x0000000140221000-memory.dmp upx behavioral1/memory/2476-155-0x000000013FE00000-0x0000000140151000-memory.dmp upx behavioral1/memory/2644-153-0x000000013FA60000-0x000000013FDB1000-memory.dmp upx behavioral1/memory/2724-151-0x000000013FF80000-0x00000001402D1000-memory.dmp upx behavioral1/memory/2948-160-0x000000013F050000-0x000000013F3A1000-memory.dmp upx behavioral1/memory/2360-164-0x000000013F280000-0x000000013F5D1000-memory.dmp upx behavioral1/memory/2124-231-0x000000013FB00000-0x000000013FE51000-memory.dmp upx behavioral1/memory/1264-233-0x000000013F090000-0x000000013F3E1000-memory.dmp upx behavioral1/memory/2552-235-0x000000013FBA0000-0x000000013FEF1000-memory.dmp upx behavioral1/memory/2740-237-0x000000013F1D0000-0x000000013F521000-memory.dmp upx behavioral1/memory/2720-239-0x000000013F5B0000-0x000000013F901000-memory.dmp upx behavioral1/memory/2876-241-0x000000013F790000-0x000000013FAE1000-memory.dmp upx behavioral1/memory/3012-243-0x000000013F0B0000-0x000000013F401000-memory.dmp upx behavioral1/memory/2896-245-0x000000013FA20000-0x000000013FD71000-memory.dmp upx behavioral1/memory/2652-247-0x000000013FD40000-0x0000000140091000-memory.dmp upx behavioral1/memory/2616-249-0x000000013FB60000-0x000000013FEB1000-memory.dmp upx behavioral1/memory/1164-251-0x000000013F790000-0x000000013FAE1000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\System\TCvlMBD.exe 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\YDZQNAn.exe 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\SygCqkN.exe 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\dYYUVBF.exe 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\DMJRCuW.exe 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\EYUcBFO.exe 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\mftKjHJ.exe 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\vEaiGVS.exe 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\ouAxClJ.exe 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\YeZpPjo.exe 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\rSuHJjL.exe 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\nZGzcPN.exe 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\CHIclsb.exe 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\ulGpocU.exe 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\KFhllks.exe 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\YAGqCIF.exe 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\sZuUNPH.exe 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\PPJIaUc.exe 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\jsKcdFH.exe 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\rAjGSlg.exe 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe File created C:\Windows\System\zpYtFeB.exe 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe Token: SeLockMemoryPrivilege 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2124 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 31 PID 2360 wrote to memory of 2124 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 31 PID 2360 wrote to memory of 2124 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 31 PID 2360 wrote to memory of 2552 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 32 PID 2360 wrote to memory of 2552 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 32 PID 2360 wrote to memory of 2552 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 32 PID 2360 wrote to memory of 1264 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 33 PID 2360 wrote to memory of 1264 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 33 PID 2360 wrote to memory of 1264 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 33 PID 2360 wrote to memory of 2740 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 34 PID 2360 wrote to memory of 2740 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 34 PID 2360 wrote to memory of 2740 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 34 PID 2360 wrote to memory of 2720 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 35 PID 2360 wrote to memory of 2720 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 35 PID 2360 wrote to memory of 2720 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 35 PID 2360 wrote to memory of 2876 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 36 PID 2360 wrote to memory of 2876 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 36 PID 2360 wrote to memory of 2876 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 36 PID 2360 wrote to memory of 2896 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 37 PID 2360 wrote to memory of 2896 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 37 PID 2360 wrote to memory of 2896 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 37 PID 2360 wrote to memory of 3012 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 38 PID 2360 wrote to memory of 3012 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 38 PID 2360 wrote to memory of 3012 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 38 PID 2360 wrote to memory of 2652 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 39 PID 2360 wrote to memory of 2652 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 39 PID 2360 wrote to memory of 2652 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 39 PID 2360 wrote to memory of 2724 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 40 PID 2360 wrote to memory of 2724 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 40 PID 2360 wrote to memory of 2724 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 40 PID 2360 wrote to memory of 2616 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 41 PID 2360 wrote to memory of 2616 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 41 PID 2360 wrote to memory of 2616 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 41 PID 2360 wrote to memory of 2644 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 42 PID 2360 wrote to memory of 2644 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 42 PID 2360 wrote to memory of 2644 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 42 PID 2360 wrote to memory of 1164 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 43 PID 2360 wrote to memory of 1164 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 43 PID 2360 wrote to memory of 1164 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 43 PID 2360 wrote to memory of 2476 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 44 PID 2360 wrote to memory of 2476 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 44 PID 2360 wrote to memory of 2476 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 44 PID 2360 wrote to memory of 2004 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 45 PID 2360 wrote to memory of 2004 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 45 PID 2360 wrote to memory of 2004 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 45 PID 2360 wrote to memory of 1680 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 46 PID 2360 wrote to memory of 1680 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 46 PID 2360 wrote to memory of 1680 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 46 PID 2360 wrote to memory of 1560 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 47 PID 2360 wrote to memory of 1560 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 47 PID 2360 wrote to memory of 1560 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 47 PID 2360 wrote to memory of 1648 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 48 PID 2360 wrote to memory of 1648 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 48 PID 2360 wrote to memory of 1648 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 48 PID 2360 wrote to memory of 2948 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 49 PID 2360 wrote to memory of 2948 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 49 PID 2360 wrote to memory of 2948 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 49 PID 2360 wrote to memory of 1984 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 50 PID 2360 wrote to memory of 1984 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 50 PID 2360 wrote to memory of 1984 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 50 PID 2360 wrote to memory of 608 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 51 PID 2360 wrote to memory of 608 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 51 PID 2360 wrote to memory of 608 2360 2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe"C:\Users\Admin\AppData\Local\Temp\2024090689a539d79afb60e67b195391dad2f449cobaltstrikecobaltstrikepoetrat.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\System\PPJIaUc.exeC:\Windows\System\PPJIaUc.exe2⤵
- Executes dropped EXE
PID:2124
-
-
C:\Windows\System\jsKcdFH.exeC:\Windows\System\jsKcdFH.exe2⤵
- Executes dropped EXE
PID:2552
-
-
C:\Windows\System\CHIclsb.exeC:\Windows\System\CHIclsb.exe2⤵
- Executes dropped EXE
PID:1264
-
-
C:\Windows\System\ulGpocU.exeC:\Windows\System\ulGpocU.exe2⤵
- Executes dropped EXE
PID:2740
-
-
C:\Windows\System\TCvlMBD.exeC:\Windows\System\TCvlMBD.exe2⤵
- Executes dropped EXE
PID:2720
-
-
C:\Windows\System\mftKjHJ.exeC:\Windows\System\mftKjHJ.exe2⤵
- Executes dropped EXE
PID:2876
-
-
C:\Windows\System\KFhllks.exeC:\Windows\System\KFhllks.exe2⤵
- Executes dropped EXE
PID:2896
-
-
C:\Windows\System\YDZQNAn.exeC:\Windows\System\YDZQNAn.exe2⤵
- Executes dropped EXE
PID:3012
-
-
C:\Windows\System\vEaiGVS.exeC:\Windows\System\vEaiGVS.exe2⤵
- Executes dropped EXE
PID:2652
-
-
C:\Windows\System\ouAxClJ.exeC:\Windows\System\ouAxClJ.exe2⤵
- Executes dropped EXE
PID:2724
-
-
C:\Windows\System\YeZpPjo.exeC:\Windows\System\YeZpPjo.exe2⤵
- Executes dropped EXE
PID:2616
-
-
C:\Windows\System\rAjGSlg.exeC:\Windows\System\rAjGSlg.exe2⤵
- Executes dropped EXE
PID:2644
-
-
C:\Windows\System\YAGqCIF.exeC:\Windows\System\YAGqCIF.exe2⤵
- Executes dropped EXE
PID:1164
-
-
C:\Windows\System\rSuHJjL.exeC:\Windows\System\rSuHJjL.exe2⤵
- Executes dropped EXE
PID:2476
-
-
C:\Windows\System\SygCqkN.exeC:\Windows\System\SygCqkN.exe2⤵
- Executes dropped EXE
PID:2004
-
-
C:\Windows\System\zpYtFeB.exeC:\Windows\System\zpYtFeB.exe2⤵
- Executes dropped EXE
PID:1680
-
-
C:\Windows\System\dYYUVBF.exeC:\Windows\System\dYYUVBF.exe2⤵
- Executes dropped EXE
PID:1560
-
-
C:\Windows\System\nZGzcPN.exeC:\Windows\System\nZGzcPN.exe2⤵
- Executes dropped EXE
PID:1648
-
-
C:\Windows\System\DMJRCuW.exeC:\Windows\System\DMJRCuW.exe2⤵
- Executes dropped EXE
PID:2948
-
-
C:\Windows\System\EYUcBFO.exeC:\Windows\System\EYUcBFO.exe2⤵
- Executes dropped EXE
PID:1984
-
-
C:\Windows\System\sZuUNPH.exeC:\Windows\System\sZuUNPH.exe2⤵
- Executes dropped EXE
PID:608
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD5def87dd0c47360b78eecb5da0204af1c
SHA1a0bd7e37f529ea46026d6cc8cd15aacfcd8d3ba8
SHA256ba1acdcbfe523081dd627419d9f667bdd9196e858928c6b37fc3b89d06cb5926
SHA51211823cf8e0f898733910be8a107f4e71bdfcd1193f4dd814470667c5e6165dfb9a9409d666e16af790395b3e4706e97d5a0acba238972b5595c14643d3075c65
-
Filesize
5.2MB
MD51892656f1d67b31423e74b1f5cbb2aaa
SHA14f6de61ea1393686456f1e1bdb2ad9c69fe7de3f
SHA2560d772a1b969ca29e74e50be7fc48a7733fc17967bc4e88c72714982dde03654b
SHA5128acfbf1ab24a3febd6b6f795c7c933735352b12fa1918d19d7775599a272d189a22560faca6a2ee5965601da6d81f2eeae8ced82261c751696007761a33167c7
-
Filesize
5.2MB
MD548ff6dc3674e102142d7921033f88c66
SHA126f52f0e3fd08c89056f97003009c64c19716f66
SHA2562242952516e65898f4c38010ac959b763a13b8c3162f48983097498e31a921d3
SHA512bd7391409d5862817d63cea6e65c35f1c30a8770a101d743c61cbd6673722aa33eb9e3ce15d201f8d675753ec1d554a8f8c723fca2fb17e131b39c54324ba749
-
Filesize
5.2MB
MD5d45827b4ee91cc7aceb4c34dc9355db4
SHA1ba5743503a4c0909b79fedeeb0e68c8cc9c8042e
SHA256ddcc6a1a5f00ac470112f404b8bbfb8059317ceaa072e0d58afd88c3b0bb6b98
SHA51201f800d89d883eb05e70da065cf7007740293a843dae3baf92e2879ade88162e809c1aea0d797238bc3a817a46ee720c419edcbea8801969d21927c268902b4b
-
Filesize
5.2MB
MD5391fc66c874d741f8a7a4815274a57af
SHA11774df5990c8f1e00218ee5288094aae5c3cd30e
SHA256da4d6772f8778687d2cf2f11b094a070fc245b0d821d1fd78730667f413f6572
SHA512a168277953b08309bb312d635e961a24f443b1a3163c910fcdda310ff59aedc2ed3a53f1e6d06707f619d67dffd59f3f3fc946555d3204cd5e2b2f4f3ce67c42
-
Filesize
5.2MB
MD56fc18fecc910c99d73f0ceb1ce5dd1da
SHA18ea18ea375755b2062e0fc376be78876101b645b
SHA2560b881d00d626bb36a4f46af84703e855e47d7584df22eb8d456799e8a3c59be8
SHA5120351ae6d2f6b3eaf5270a9413a8e0fc166068695bd5c39239beef2a6f56a9e630970f5736a377010443d0a50a1fa4cf563d9fd5e64b2308d7b1cc748e73168f8
-
Filesize
5.2MB
MD5807eb874281277f11e1e555afe3841a4
SHA147e3037a3d26e233c1855c2f843f066e509cd7ab
SHA2563f2e87fa5f0d3df81bf11205e531d9a66b72c1ddff8c1fa0a98aca5bab6a3e31
SHA512d3794b582abc921415941edcf327dbcfac7ed474ea5c662c788ccfd4a79a2e61e483c40046a79669d879c0e4cd5ac667272dab687d5cfd09afce85038dad9b6a
-
Filesize
5.2MB
MD54f283256af53f066d1d1f7fa97715bd1
SHA16c2c5c350280b38e1e066fe6a2c68b9c7d25b319
SHA2569fab5197f14d19a044650e0008f3d76509c286f7ea32c6183904f773724e14d5
SHA5122a54e99a4ab06cc9254a249ff7d197e13a5c2717c3a41594517d89ec2a49297d4f07178cd544e5718496225bb81899471074cd2c0e1914d6823cb32e65186330
-
Filesize
5.2MB
MD50880c61933f21deff03fed666b959582
SHA178d61491b1ae1a57dc792553ef0c5a840f3ef292
SHA25636e2d6303b71256fcfedfd9480331c8e6f6f49800f360003f0611ab4ae4b2d4b
SHA512b2234022e1c1131c4b11b9cffa748c619c295030d75d74fb483a8dc4608c4ccc86b5575d09671f6131e3569abaebc59a89f221cceade6c01adb44bbe463edeed
-
Filesize
5.2MB
MD5d698d045e0d73086fda2d958cb84389e
SHA1bd919fc79b8050e3cbae9b00cea018103960ac36
SHA2564d69a0192ea34045a35df5c2d3a32aa42282c5d72020eead53f786c180a6cb31
SHA5128fa533a181db615ad3eb6f3f60abab0f42a9f7ceb12decd1304348b6e023d3c91d5ca149170923aee08536f4d101656c90aa80a83b2e83fd388a75de99c02fa2
-
Filesize
5.2MB
MD5ddf07991e42eec22f98be4c68be800dc
SHA1017f22ab065c684fd0e6094251b5e92dcf9b63e8
SHA256b4bc09556c31c37fa435661eaa95d1346bd7bd6fc52af5c2bb396f391c90e664
SHA51212df20e7535f24435ee5b4accb98fa16000f01bd77064a269ee4db4ef105d9c7fa086ea73919cda56950faf86f0c91229d238524b73cfa5c15b16c98bf4f871f
-
Filesize
5.2MB
MD58d59b1656582d5093cb93d9162b55a73
SHA1b99154749115bda2c1602937f0169a09002f64ce
SHA256903a2f70fe4fb21d776c5bf7f008bd938568aeb1eb27d2b61bec427f5c10116c
SHA512c34ef612e78c58556307931f2f1299db3a2e0529cf7db5bbe2c243916da4eacb670d2c7814ee257f33f188a0a037658ab552e0b6b4b43a8ff6391e493c3d63c4
-
Filesize
5.2MB
MD503f6374d65dbdcaa66079d0c430ab204
SHA17dc149e828d458c66929dede92d92072a15dade3
SHA256d7c96eb473e7c67721ae14619045204b850cf862765dc22313fbfb1be5c2855d
SHA51222bc58372b7c78aa2dcdcf44db46e7f054025040e7e13ee228f09bbbf302b337d663724ed0f7fff97b2fc314f2deed0052ba5344ba641037b3aed311d9ad9c33
-
Filesize
5.2MB
MD5e937a093d3256382c6060ee667c974c2
SHA15c74e6b100be2298b063d3a11bb24c17c17a3b0e
SHA256de880cf8a64ac313a40eb54be77db09e06327660d35e9b017fc03144b726e15e
SHA512d68bc4dc0d6f4e7ef8585ad93d614bb359c24ec71255f80af434129992590f1242b14a2dd3d478ffbaca7563e632914f9c83fd34e49380fc28741abc30952143
-
Filesize
5.2MB
MD55b5750acb5e2ab78702229126009b34d
SHA1393f5fb96857469052925ff0a7048dc18e4c1cc5
SHA256b9f59dde7a0ee2e5eb88b95db0c09605e341f5fbeb0e713c818f3f31bfd4d55b
SHA512de989b1b10f83111243eea5a032b8356917cd3e0e3626c4c649215e92a6966cca37e2574ff4f57a98dab6235dc40c8111269a4118b7abcf771f2ef89f56a6776
-
Filesize
5.2MB
MD5da9edf7bccaa1148c1550e7c19af50d6
SHA1edb19888ceb5518a3ae74bb5e6ea8c2a8bfd70b3
SHA256dc07d7e4c0ddfaae728974e1ffaf0e24d9b9ae1df08d33b76666b86cd6faaf4b
SHA5127a6567bb46d6200266e21b41f7d33ca7785f8a8bb0ae809f34b8f83955ba3fbcb5312565641f7bda6b64936c13aed8f484b357de1e83995217753a24ef857b98
-
Filesize
5.2MB
MD57875527abe11dd6cc239811c5ec3ce50
SHA19c7a5768a7a03bea90173faa8929cff59da3fa47
SHA256c1a1231caf395a3d028c5aaee52ffa9c3c7961638f1f38edaf71c2fc70d089f0
SHA512d85a9dfec8192ae123e30994048a50e966aa9d9c96aa5d8478b3c561e027798ae18224cdcbd77cf69266adb09a188c4aaf1a78d06238411c0633f9a9ac393480
-
Filesize
5.2MB
MD508f450bb988726cb1e97dd8a76f82774
SHA1aa70ef3d71f581353c3c1b3404c717557c01b0a6
SHA2562500587984221a072f129e612c3d0288b8bd349f430f3526cd08cd5909c403ff
SHA512cb409488e63fc4f8892af62ef314d9688e11707b19be03a42d37220735468cdaa7f38a2f50d51a9630297b60b8de4b0cecf96a2b3149395314d6a71cd8ad1b2c
-
Filesize
5.2MB
MD5630a1ba37fd1179e4f110212bd5c4ce6
SHA17dc9f25527dd9df06e34e081c0aa1ed1fe5cf968
SHA256d5d906f9f4f816c6f94c146c1ec038344187f1bf934f488729958e446b7537a3
SHA512f99009c604e7138bb7c58007cf107099763c4b24213611e52aee037f558006edb4fdc3533fb829329a0d2d529ab72e458950e2d4ac9f92786eeeb63feb8a847e
-
Filesize
5.2MB
MD5fab08cc76cf1f0179eeb60b02a382765
SHA19e8f9e2c57031e147cbd3fc3f31be8f1e375378c
SHA2565fbde462964e9f6534e6a0c7f0ef80a966e61f0f20b6043a5964abc781728c6d
SHA512ddac8f1c5677fc1d18617e137830b5b5d3b42dd2df342635e5fab113101266f6517512cc1b458ea9f11dbc08887107a4902cc270353278b771933ea1a486fd33
-
Filesize
5.2MB
MD591f3498fa362e1d4fa4760986b1f84c2
SHA13dad9acf7e6e71b471b14256afd3971e7dae8352
SHA256419ddd3519c0adf2f1bcc692d181a6fd8513d618da69130daf70d369cce55f60
SHA512c26913667d062cc415d097ef6f4c460429efdfd21d048b43366fb6c0e1a8c59f5b6970162910ae9b31df3d93931c2109f3c3adbe7222bf8310cd6e4a74da6b5e