Analysis
-
max time kernel
20s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2024 04:06
Behavioral task
behavioral1
Sample
2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat.exe
-
Size
58.1MB
-
MD5
a36ccf5fb6bc5c1342371a21b33a6f0c
-
SHA1
2daefc8e9d7a3f7d461a9cc7a2a69e9c87667c83
-
SHA256
f2c9caab1000afabc5efa9e2b1d25ddfdbebe5d9166b6bff130a501ff27df2c1
-
SHA512
80f3c9e56cd1f9ba596c93a0742e5f56e7a44fdc678d9c3a19f0e90db9a81ed1ce09e159f61c57c566e47c428986f96bc29b7e1f71941c86961e3f43ab4dcc78
-
SSDEEP
1572864:TLOrJXzVj0mz3uu2etPQiWmoh8rb28CQG2Y:TLqJXBj0kuu3IDmnrb5Y
Malware Config
Extracted
raccoon
2ca5558c9ec8037d24a611513d7bd076
https://192.153.57.177:80
-
user_agent
MrBidenNeverKnow
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
webmaster - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Cobalt Strike reflective loader 1 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral2/files/0x00070000000235a3-2137.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Raccoon Stealer V2 payload 2 IoCs
resource yara_rule behavioral2/memory/6260-2130-0x0000000000400000-0x0000000000416000-memory.dmp family_raccoon_v2 behavioral2/memory/6260-2131-0x0000000000400000-0x0000000000416000-memory.dmp family_raccoon_v2 -
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/6876-2125-0x0000000000400000-0x0000000000451000-memory.dmp modiloader_stage2 behavioral2/memory/6876-2260-0x0000000000400000-0x0000000000451000-memory.dmp modiloader_stage2 -
XMRig Miner payload 30 IoCs
resource yara_rule behavioral2/memory/3688-2193-0x00007FF66C250000-0x00007FF66C5A1000-memory.dmp xmrig behavioral2/memory/6600-2215-0x00007FF7522E0000-0x00007FF752631000-memory.dmp xmrig behavioral2/memory/3372-2210-0x00007FF7E9280000-0x00007FF7E95D1000-memory.dmp xmrig behavioral2/memory/6820-2219-0x00007FF6F1E50000-0x00007FF6F21A1000-memory.dmp xmrig behavioral2/memory/5856-2218-0x00007FF7293C0000-0x00007FF729711000-memory.dmp xmrig behavioral2/memory/3892-2220-0x00007FF6A88A0000-0x00007FF6A8BF1000-memory.dmp xmrig behavioral2/memory/5360-2228-0x00007FF7CFD20000-0x00007FF7D0071000-memory.dmp xmrig behavioral2/memory/6580-2229-0x00007FF674E90000-0x00007FF6751E1000-memory.dmp xmrig behavioral2/memory/6664-2232-0x00007FF6D1730000-0x00007FF6D1A81000-memory.dmp xmrig behavioral2/memory/6576-2233-0x00007FF6CAD40000-0x00007FF6CB091000-memory.dmp xmrig behavioral2/memory/3504-2237-0x00007FF678050000-0x00007FF6783A1000-memory.dmp xmrig behavioral2/memory/6624-2239-0x00007FF74CA70000-0x00007FF74CDC1000-memory.dmp xmrig behavioral2/memory/5220-2238-0x00007FF6812D0000-0x00007FF681621000-memory.dmp xmrig behavioral2/memory/5200-2240-0x00007FF6143A0000-0x00007FF6146F1000-memory.dmp xmrig behavioral2/memory/5680-2236-0x00007FF6672A0000-0x00007FF6675F1000-memory.dmp xmrig behavioral2/memory/6776-2235-0x00007FF668830000-0x00007FF668B81000-memory.dmp xmrig behavioral2/memory/6040-2231-0x00007FF7C2560000-0x00007FF7C28B1000-memory.dmp xmrig behavioral2/memory/5620-2226-0x00007FF6C2100000-0x00007FF6C2451000-memory.dmp xmrig behavioral2/memory/5580-2224-0x00007FF60A040000-0x00007FF60A391000-memory.dmp xmrig behavioral2/memory/6808-2245-0x00007FF7FA640000-0x00007FF7FA991000-memory.dmp xmrig behavioral2/memory/7060-2266-0x00007FF7EDE80000-0x00007FF7EE1D1000-memory.dmp xmrig behavioral2/memory/6452-2270-0x00007FF6BE850000-0x00007FF6BEBA1000-memory.dmp xmrig behavioral2/memory/7060-2348-0x00007FF7EDE80000-0x00007FF7EE1D1000-memory.dmp xmrig behavioral2/memory/3688-2350-0x00007FF66C250000-0x00007FF66C5A1000-memory.dmp xmrig behavioral2/memory/5220-2352-0x00007FF6812D0000-0x00007FF681621000-memory.dmp xmrig behavioral2/memory/3372-2354-0x00007FF7E9280000-0x00007FF7E95D1000-memory.dmp xmrig behavioral2/memory/6600-2356-0x00007FF7522E0000-0x00007FF752631000-memory.dmp xmrig behavioral2/memory/3892-2361-0x00007FF6A88A0000-0x00007FF6A8BF1000-memory.dmp xmrig behavioral2/memory/6576-2362-0x00007FF6CAD40000-0x00007FF6CB091000-memory.dmp xmrig behavioral2/memory/5856-2358-0x00007FF7293C0000-0x00007FF729711000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3656 powershell.exe 5020 powershell.exe 5168 powershell.exe 2748 powershell.exe 2084 powershell.exe -
Downloads MZ/PE file
-
Manipulates Digital Signatures 1 TTPs 1 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates\D9ED2FBD5F3904D074B1D8C0E404F7FBD889E92F\Blob = 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 msedge.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 5448 attrib.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation avg.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation ajE40A.exe -
Executes dropped EXE 24 IoCs
pid Process 232 anti.exe 2456 butdes.exe 3912 flydes.exe 3128 i.exe 1240 flydes.tmp 4524 butdes.tmp 4312 gx.exe 540 bundle.exe 1592 rckdck.exe 748 is-MO2E2.tmp 2528 avg.exe 4864 telamon.exe 5096 stopwatch.exe 1248 setup.exe 5192 setup.exe 5348 setup.exe 6020 tt-installer-helper.exe 6100 g_.exe 6128 t.exe 5244 g.exe 5416 e.exe 5460 tt-installer-helper.exe 5732 Bootstraper.exe 5708 ajE40A.exe -
Loads dropped DLL 26 IoCs
pid Process 1248 setup.exe 5192 setup.exe 2528 avg.exe 2528 avg.exe 5184 telamon.tmp 5348 setup.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 6128 t.exe 6128 t.exe 6128 t.exe 5244 g.exe 5244 g.exe 6100 g_.exe 6100 g_.exe 5416 e.exe 5416 e.exe 2528 avg.exe 5708 ajE40A.exe 5708 ajE40A.exe 5708 ajE40A.exe 5708 ajE40A.exe 5708 ajE40A.exe 5708 ajE40A.exe 5708 ajE40A.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/6808-2124-0x00007FF7FA640000-0x00007FF7FA991000-memory.dmp upx behavioral2/files/0x00070000000235a3-2137.dat upx behavioral2/memory/6452-2177-0x00007FF6BE850000-0x00007FF6BEBA1000-memory.dmp upx behavioral2/memory/3688-2193-0x00007FF66C250000-0x00007FF66C5A1000-memory.dmp upx behavioral2/memory/6600-2215-0x00007FF7522E0000-0x00007FF752631000-memory.dmp upx behavioral2/memory/3372-2210-0x00007FF7E9280000-0x00007FF7E95D1000-memory.dmp upx behavioral2/memory/7060-2156-0x00007FF7EDE80000-0x00007FF7EE1D1000-memory.dmp upx behavioral2/memory/6820-2219-0x00007FF6F1E50000-0x00007FF6F21A1000-memory.dmp upx behavioral2/memory/5856-2218-0x00007FF7293C0000-0x00007FF729711000-memory.dmp upx behavioral2/memory/3892-2220-0x00007FF6A88A0000-0x00007FF6A8BF1000-memory.dmp upx behavioral2/memory/5360-2228-0x00007FF7CFD20000-0x00007FF7D0071000-memory.dmp upx behavioral2/memory/6580-2229-0x00007FF674E90000-0x00007FF6751E1000-memory.dmp upx behavioral2/memory/6664-2232-0x00007FF6D1730000-0x00007FF6D1A81000-memory.dmp upx behavioral2/memory/6576-2233-0x00007FF6CAD40000-0x00007FF6CB091000-memory.dmp upx behavioral2/memory/3504-2237-0x00007FF678050000-0x00007FF6783A1000-memory.dmp upx behavioral2/memory/6624-2239-0x00007FF74CA70000-0x00007FF74CDC1000-memory.dmp upx behavioral2/memory/5220-2238-0x00007FF6812D0000-0x00007FF681621000-memory.dmp upx behavioral2/memory/5200-2240-0x00007FF6143A0000-0x00007FF6146F1000-memory.dmp upx behavioral2/memory/5680-2236-0x00007FF6672A0000-0x00007FF6675F1000-memory.dmp upx behavioral2/memory/6776-2235-0x00007FF668830000-0x00007FF668B81000-memory.dmp upx behavioral2/memory/6040-2231-0x00007FF7C2560000-0x00007FF7C28B1000-memory.dmp upx behavioral2/memory/5620-2226-0x00007FF6C2100000-0x00007FF6C2451000-memory.dmp upx behavioral2/memory/5580-2224-0x00007FF60A040000-0x00007FF60A391000-memory.dmp upx behavioral2/memory/6808-2245-0x00007FF7FA640000-0x00007FF7FA991000-memory.dmp upx behavioral2/memory/7060-2266-0x00007FF7EDE80000-0x00007FF7EE1D1000-memory.dmp upx behavioral2/memory/6452-2270-0x00007FF6BE850000-0x00007FF6BEBA1000-memory.dmp upx behavioral2/memory/7060-2348-0x00007FF7EDE80000-0x00007FF7EE1D1000-memory.dmp upx behavioral2/memory/3688-2350-0x00007FF66C250000-0x00007FF66C5A1000-memory.dmp upx behavioral2/memory/5220-2352-0x00007FF6812D0000-0x00007FF681621000-memory.dmp upx behavioral2/memory/3372-2354-0x00007FF7E9280000-0x00007FF7E95D1000-memory.dmp upx behavioral2/memory/6600-2356-0x00007FF7522E0000-0x00007FF752631000-memory.dmp upx behavioral2/memory/3892-2361-0x00007FF6A88A0000-0x00007FF6A8BF1000-memory.dmp upx behavioral2/memory/6576-2362-0x00007FF6CAD40000-0x00007FF6CB091000-memory.dmp upx behavioral2/memory/5856-2358-0x00007FF7293C0000-0x00007FF729711000-memory.dmp upx -
Checks for any installed AV software in registry 1 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\AVAST Software\Avast avg.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast ajE40A.exe Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\AVAST Software\Avast ajE40A.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast avg.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\D: setup.exe File opened (read-only) \??\F: setup.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\J: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 201 raw.githubusercontent.com 202 raw.githubusercontent.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 241 api.ipify.org 242 api.ipify.org -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 ajE40A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cipher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flydes.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bundle.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rckdck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language telamon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstraper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language is-MO2E2.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tt-installer-helper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flydes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language anti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cipher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language butdes.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language butdes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stopwatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language telamon.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks SCSI registry key(s) 3 TTPs 2 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ajE40A.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ajE40A.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2476 timeout.exe 6504 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 64 IoCs
pid Process 3116 taskkill.exe 6924 taskkill.exe 6300 taskkill.exe 3636 taskkill.exe 1692 taskkill.exe 4080 taskkill.exe 680 taskkill.exe 5628 taskkill.exe 5392 taskkill.exe 1936 taskkill.exe 6408 taskkill.exe 1648 taskkill.exe 6744 taskkill.exe 680 taskkill.exe 2704 taskkill.exe 2736 taskkill.exe 3332 taskkill.exe 1652 taskkill.exe 3924 taskkill.exe 6872 taskkill.exe 2940 taskkill.exe 1900 taskkill.exe 6668 taskkill.exe 216 taskkill.exe 1188 taskkill.exe 2136 taskkill.exe 3116 taskkill.exe 6536 taskkill.exe 2864 taskkill.exe 4736 taskkill.exe 5544 taskkill.exe 7100 taskkill.exe 7056 taskkill.exe 3744 taskkill.exe 2428 taskkill.exe 3660 taskkill.exe 3688 taskkill.exe 6120 taskkill.exe 6428 taskkill.exe 6308 taskkill.exe 6280 taskkill.exe 5348 taskkill.exe 1340 taskkill.exe 6276 taskkill.exe 1028 taskkill.exe 5568 taskkill.exe 6808 taskkill.exe 6640 taskkill.exe 5452 taskkill.exe 6080 taskkill.exe 6488 taskkill.exe 912 taskkill.exe 4808 taskkill.exe 4264 taskkill.exe 2192 taskkill.exe 6548 taskkill.exe 4108 taskkill.exe 6580 taskkill.exe 6852 taskkill.exe 4728 taskkill.exe 5384 taskkill.exe 3720 taskkill.exe 636 taskkill.exe 6080 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings cmd.exe -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 3444 notepad.exe 116 NOTEPAD.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6316 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 404 msedge.exe 404 msedge.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 5708 ajE40A.exe 5708 ajE40A.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 5708 ajE40A.exe 5708 ajE40A.exe 5708 ajE40A.exe 5708 ajE40A.exe 5708 ajE40A.exe 5708 ajE40A.exe 5708 ajE40A.exe 5708 ajE40A.exe 5708 ajE40A.exe 5708 ajE40A.exe 5708 ajE40A.exe 5708 ajE40A.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 2528 avg.exe 5168 powershell.exe 5168 powershell.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 216 taskkill.exe Token: SeDebugPrivilege 4544 taskkill.exe Token: SeDebugPrivilege 2428 taskkill.exe Token: SeDebugPrivilege 4640 taskkill.exe Token: SeDebugPrivilege 1692 taskkill.exe Token: SeDebugPrivilege 4080 taskkill.exe Token: SeDebugPrivilege 2704 taskkill.exe Token: SeDebugPrivilege 3660 taskkill.exe Token: SeDebugPrivilege 3652 taskkill.exe Token: SeDebugPrivilege 1188 taskkill.exe Token: SeDebugPrivilege 640 taskkill.exe Token: SeDebugPrivilege 4960 taskkill.exe Token: SeDebugPrivilege 2736 taskkill.exe Token: SeDebugPrivilege 1340 taskkill.exe Token: SeDebugPrivilege 2864 taskkill.exe Token: SeDebugPrivilege 3588 taskkill.exe Token: SeDebugPrivilege 912 taskkill.exe Token: SeDebugPrivilege 680 taskkill.exe Token: SeDebugPrivilege 2136 taskkill.exe Token: SeDebugPrivilege 3116 taskkill.exe Token: SeDebugPrivilege 4808 taskkill.exe Token: SeDebugPrivilege 4728 taskkill.exe Token: SeDebugPrivilege 3332 taskkill.exe Token: SeDebugPrivilege 4264 taskkill.exe Token: SeDebugPrivilege 1652 taskkill.exe Token: SeDebugPrivilege 3924 taskkill.exe Token: SeDebugPrivilege 2940 taskkill.exe Token: SeDebugPrivilege 2192 taskkill.exe Token: 33 4004 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4004 AUDIODG.EXE Token: SeDebugPrivilege 2316 taskkill.exe Token: SeDebugPrivilege 3116 taskkill.exe Token: SeDebugPrivilege 3688 taskkill.exe Token: SeDebugPrivilege 1900 taskkill.exe Token: SeShutdownPrivilege 5464 msiexec.exe Token: SeIncreaseQuotaPrivilege 5464 msiexec.exe Token: SeSecurityPrivilege 5596 msiexec.exe Token: SeDebugPrivilege 5628 taskkill.exe Token: SeCreateTokenPrivilege 5464 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 5464 msiexec.exe Token: SeLockMemoryPrivilege 5464 msiexec.exe Token: SeIncreaseQuotaPrivilege 5464 msiexec.exe Token: SeMachineAccountPrivilege 5464 msiexec.exe Token: SeTcbPrivilege 5464 msiexec.exe Token: SeSecurityPrivilege 5464 msiexec.exe Token: SeTakeOwnershipPrivilege 5464 msiexec.exe Token: SeLoadDriverPrivilege 5464 msiexec.exe Token: SeSystemProfilePrivilege 5464 msiexec.exe Token: SeSystemtimePrivilege 5464 msiexec.exe Token: SeProfSingleProcessPrivilege 5464 msiexec.exe Token: SeIncBasePriorityPrivilege 5464 msiexec.exe Token: SeCreatePagefilePrivilege 5464 msiexec.exe Token: SeCreatePermanentPrivilege 5464 msiexec.exe Token: SeBackupPrivilege 5464 msiexec.exe Token: SeRestorePrivilege 5464 msiexec.exe Token: SeShutdownPrivilege 5464 msiexec.exe Token: SeDebugPrivilege 5464 msiexec.exe Token: SeAuditPrivilege 5464 msiexec.exe Token: SeSystemEnvironmentPrivilege 5464 msiexec.exe Token: SeChangeNotifyPrivilege 5464 msiexec.exe Token: SeRemoteShutdownPrivilege 5464 msiexec.exe Token: SeUndockPrivilege 5464 msiexec.exe Token: SeSyncAgentPrivilege 5464 msiexec.exe Token: SeEnableDelegationPrivilege 5464 msiexec.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 868 efsui.exe 868 efsui.exe 868 efsui.exe 232 anti.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 5096 stopwatch.exe 5464 msiexec.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 868 efsui.exe 868 efsui.exe 868 efsui.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1248 setup.exe 2528 avg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1004 wrote to memory of 4744 1004 2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat.exe 82 PID 1004 wrote to memory of 4744 1004 2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat.exe 82 PID 1004 wrote to memory of 4744 1004 2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat.exe 82 PID 4744 wrote to memory of 232 4744 cmd.exe 84 PID 4744 wrote to memory of 232 4744 cmd.exe 84 PID 4744 wrote to memory of 232 4744 cmd.exe 84 PID 4744 wrote to memory of 4288 4744 cmd.exe 85 PID 4744 wrote to memory of 4288 4744 cmd.exe 85 PID 4744 wrote to memory of 4288 4744 cmd.exe 85 PID 4744 wrote to memory of 1496 4744 cmd.exe 87 PID 4744 wrote to memory of 1496 4744 cmd.exe 87 PID 4744 wrote to memory of 1496 4744 cmd.exe 87 PID 4288 wrote to memory of 216 4288 cmd.exe 88 PID 4288 wrote to memory of 216 4288 cmd.exe 88 PID 4288 wrote to memory of 216 4288 cmd.exe 88 PID 4744 wrote to memory of 3960 4744 cmd.exe 90 PID 4744 wrote to memory of 3960 4744 cmd.exe 90 PID 4744 wrote to memory of 3960 4744 cmd.exe 90 PID 4288 wrote to memory of 4544 4288 cmd.exe 92 PID 4288 wrote to memory of 4544 4288 cmd.exe 92 PID 4288 wrote to memory of 4544 4288 cmd.exe 92 PID 4288 wrote to memory of 2428 4288 cmd.exe 93 PID 4288 wrote to memory of 2428 4288 cmd.exe 93 PID 4288 wrote to memory of 2428 4288 cmd.exe 93 PID 4288 wrote to memory of 4640 4288 cmd.exe 94 PID 4288 wrote to memory of 4640 4288 cmd.exe 94 PID 4288 wrote to memory of 4640 4288 cmd.exe 94 PID 4288 wrote to memory of 1692 4288 cmd.exe 95 PID 4288 wrote to memory of 1692 4288 cmd.exe 95 PID 4288 wrote to memory of 1692 4288 cmd.exe 95 PID 4288 wrote to memory of 4080 4288 cmd.exe 96 PID 4288 wrote to memory of 4080 4288 cmd.exe 96 PID 4288 wrote to memory of 4080 4288 cmd.exe 96 PID 4288 wrote to memory of 2704 4288 cmd.exe 97 PID 4288 wrote to memory of 2704 4288 cmd.exe 97 PID 4288 wrote to memory of 2704 4288 cmd.exe 97 PID 4288 wrote to memory of 3660 4288 cmd.exe 98 PID 4288 wrote to memory of 3660 4288 cmd.exe 98 PID 4288 wrote to memory of 3660 4288 cmd.exe 98 PID 4288 wrote to memory of 3652 4288 cmd.exe 99 PID 4288 wrote to memory of 3652 4288 cmd.exe 99 PID 4288 wrote to memory of 3652 4288 cmd.exe 99 PID 4288 wrote to memory of 1188 4288 cmd.exe 100 PID 4288 wrote to memory of 1188 4288 cmd.exe 100 PID 4288 wrote to memory of 1188 4288 cmd.exe 100 PID 4288 wrote to memory of 640 4288 cmd.exe 101 PID 4288 wrote to memory of 640 4288 cmd.exe 101 PID 4288 wrote to memory of 640 4288 cmd.exe 101 PID 4288 wrote to memory of 4960 4288 cmd.exe 102 PID 4288 wrote to memory of 4960 4288 cmd.exe 102 PID 4288 wrote to memory of 4960 4288 cmd.exe 102 PID 4288 wrote to memory of 2736 4288 cmd.exe 103 PID 4288 wrote to memory of 2736 4288 cmd.exe 103 PID 4288 wrote to memory of 2736 4288 cmd.exe 103 PID 4288 wrote to memory of 1340 4288 cmd.exe 104 PID 4288 wrote to memory of 1340 4288 cmd.exe 104 PID 4288 wrote to memory of 1340 4288 cmd.exe 104 PID 4288 wrote to memory of 2864 4288 cmd.exe 105 PID 4288 wrote to memory of 2864 4288 cmd.exe 105 PID 4288 wrote to memory of 2864 4288 cmd.exe 105 PID 4288 wrote to memory of 3588 4288 cmd.exe 106 PID 4288 wrote to memory of 3588 4288 cmd.exe 106 PID 4288 wrote to memory of 3588 4288 cmd.exe 106 PID 4288 wrote to memory of 912 4288 cmd.exe 107 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5448 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\!m.bat" "2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\anti.exeanti.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:232
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K fence.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4544
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4640
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4080
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3652
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1188
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:640
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3588
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3116
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4728
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3332
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3924
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3116
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5628
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:6080
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:5568
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:6120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:5392
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:6732
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:5384
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:6668
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:6428
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:7052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:6276
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3840
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:4736
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:5544
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:7100
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6744
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:6308
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:6664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6624
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2400
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:1028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:6656
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:1648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2276
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:6728
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:6808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:6872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:6940
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:6924
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:6548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:4108
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:3720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:6640
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:1936
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:6408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:6280
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3788
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:6744
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:7056
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:3744
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:3636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:6580
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5356
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:6080
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:5452
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:6300
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:5348
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:6488
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:6536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:6852
-
-
-
C:\Windows\SysWOW64\cipher.execipher /k /h /e C:\Users\Admin\Desktop\*3⤵
- System Location Discovery: System Language Discovery
PID:1496
-
-
C:\Windows\SysWOW64\cipher.execipher C:\Users\Admin\Desktop\*3⤵
- System Location Discovery: System Language Discovery
PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\doc.html3⤵
- Manipulates Digital Signatures
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:404 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ffe4d7546f8,0x7ffe4d754708,0x7ffe4d7547184⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,7454884180649843373,4645933724423965759,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:24⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,7454884180649843373,4645933724423965759,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,7454884180649843373,4645933724423965759,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1508 /prefetch:84⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,7454884180649843373,4645933724423965759,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:14⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,7454884180649843373,4645933724423965759,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:14⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,7454884180649843373,4645933724423965759,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:14⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,7454884180649843373,4645933724423965759,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:14⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,7454884180649843373,4645933724423965759,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:14⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,7454884180649843373,4645933724423965759,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:14⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,7454884180649843373,4645933724423965759,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:14⤵PID:5800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,7454884180649843373,4645933724423965759,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:14⤵PID:5808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,7454884180649843373,4645933724423965759,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6936 /prefetch:14⤵PID:5496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,7454884180649843373,4645933724423965759,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6948 /prefetch:14⤵PID:5448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,7454884180649843373,4645933724423965759,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7080 /prefetch:14⤵PID:5536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,7454884180649843373,4645933724423965759,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6576 /prefetch:84⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,7454884180649843373,4645933724423965759,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6576 /prefetch:84⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,7454884180649843373,4645933724423965759,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6352 /prefetch:24⤵PID:6340
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\butdes.exebutdes.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\is-A83RS.tmp\butdes.tmp"C:\Users\Admin\AppData\Local\Temp\is-A83RS.tmp\butdes.tmp" /SL5="$20160,2719719,54272,C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\butdes.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4524
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\flydes.exeflydes.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\is-R1RO2.tmp\flydes.tmp"C:\Users\Admin\AppData\Local\Temp\is-R1RO2.tmp\flydes.tmp" /SL5="$20164,595662,54272,C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\flydes.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1240
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\i.exei.exe3⤵
- Executes dropped EXE
PID:3128
-
-
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2476
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\gx.exegx.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\7zS8D067C87\setup.exeC:\Users\Admin\AppData\Local\Temp\7zS8D067C87\setup.exe --server-tracking-blob=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4⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\7zS8D067C87\setup.exeC:\Users\Admin\AppData\Local\Temp\7zS8D067C87\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktopGX --annotation=ver=112.0.5197.115 --initial-client-data=0x320,0x324,0x328,0x2fc,0x32c,0x6ed71b54,0x6ed71b60,0x6ed71b6c5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5192
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\setup.exe" --version5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5348
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202409170406431\assistant\Opera_GX_assistant_73.0.3856.382_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202409170406431\assistant\Opera_GX_assistant_73.0.3856.382_Setup.exe_sfx.exe"5⤵PID:3972
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202409170406431\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202409170406431\assistant\assistant_installer.exe" --version5⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202409170406431\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202409170406431\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktopGX --annotation=ver=73.0.3856.382 --initial-client-data=0x26c,0x270,0x274,0x248,0x278,0x204f48,0x204f58,0x204f646⤵PID:5848
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\bundle.exebundle.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:540
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\rckdck.exerckdck.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\is-9SQ4C.tmp\is-MO2E2.tmp"C:\Users\Admin\AppData\Local\Temp\is-9SQ4C.tmp\is-MO2E2.tmp" /SL4 $40112 "C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\rckdck.exe" 6123423 527364⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:748
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\avg.exeavg.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\ajE40A.exe"C:\Users\Admin\AppData\Local\Temp\ajE40A.exe" /relaunch=8 /was_elevated=1 /tagdata4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:5708
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\telamon.exetelamon.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\is-24S2R.tmp\telamon.tmp"C:\Users\Admin\AppData\Local\Temp\is-24S2R.tmp\telamon.tmp" /SL5="$200D6,1520969,918016,C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\telamon.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5184 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "C:\Windows\system32\cmd.exe" /S /C ""C:\Users\Admin\AppData\Local\Temp\is-7QK2U.tmp\tt-installer-helper.exe" --getuid > "C:\Users\Admin\AppData\Local\Temp\is-7QK2U.tmp\~execwithresult.txt""5⤵
- System Location Discovery: System Language Discovery
PID:5508 -
C:\Users\Admin\AppData\Local\Temp\is-7QK2U.tmp\tt-installer-helper.exe"C:\Users\Admin\AppData\Local\Temp\is-7QK2U.tmp\tt-installer-helper.exe" --getuid6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6020
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "C:\Windows\system32\cmd.exe" /S /C ""C:\Users\Admin\AppData\Local\Temp\is-7QK2U.tmp\tt-installer-helper.exe" --saveinstallpath --filename=C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\telamon.exe > "C:\Users\Admin\AppData\Local\Temp\is-7QK2U.tmp\~execwithresult.txt""5⤵
- System Location Discovery: System Language Discovery
PID:5300 -
C:\Users\Admin\AppData\Local\Temp\is-7QK2U.tmp\tt-installer-helper.exe"C:\Users\Admin\AppData\Local\Temp\is-7QK2U.tmp\tt-installer-helper.exe" --saveinstallpath --filename=C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\telamon.exe6⤵
- Executes dropped EXE
PID:5460
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\stopwatch.exestopwatch.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:5096
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\gadget.msi"3⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5464
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\g_.exeg_.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6100
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\t.exet.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6128
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\g.exeg.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5244
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\e.exee.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5416
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\GAB3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5448
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\Bootstraper.exeBootstraper.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5732 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\SalaNses'"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5168
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\Desktop'"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:5020
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users'"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:3656
-
-
C:\SalaNses\soles.exe"C:\SalaNses\soles.exe"4⤵PID:6372
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\dng.html3⤵PID:4332
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe4d7546f8,0x7ffe4d754708,0x7ffe4d7547184⤵PID:6052
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 103⤵
- Delays execution with timeout.exe
PID:6504
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K proxy.bat3⤵PID:6716
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe4⤵PID:6976
-
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" "C:\GAB\23890.CompositeFont"3⤵
- Opens file in notepad (likely ransom note)
PID:3444
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\GAB\23890.ini3⤵
- Opens file in notepad (likely ransom note)
PID:116
-
-
C:\Windows\SysWOW64\fontview.exe"C:\Windows\System32\fontview.exe" C:\GAB\23890.ttc3⤵PID:6740
-
-
C:\Windows\SysWOW64\fontview.exe"C:\Windows\System32\fontview.exe" C:\GAB\23890.TTF3⤵PID:6828
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\cobstrk.execobstrk.exe3⤵PID:6808
-
C:\Windows\System\wyPIpXd.exeC:\Windows\System\wyPIpXd.exe4⤵PID:7060
-
-
C:\Windows\System\mRNihfJ.exeC:\Windows\System\mRNihfJ.exe4⤵PID:6452
-
-
C:\Windows\System\kCFpeji.exeC:\Windows\System\kCFpeji.exe4⤵PID:3688
-
-
C:\Windows\System\ZJwDcYI.exeC:\Windows\System\ZJwDcYI.exe4⤵PID:3372
-
-
C:\Windows\System\dAPaGMO.exeC:\Windows\System\dAPaGMO.exe4⤵PID:3504
-
-
C:\Windows\System\JVqnGnx.exeC:\Windows\System\JVqnGnx.exe4⤵PID:6600
-
-
C:\Windows\System\PnIMphy.exeC:\Windows\System\PnIMphy.exe4⤵PID:5220
-
-
C:\Windows\System\iuECFhQ.exeC:\Windows\System\iuECFhQ.exe4⤵PID:5856
-
-
C:\Windows\System\YDKOCiC.exeC:\Windows\System\YDKOCiC.exe4⤵PID:6820
-
-
C:\Windows\System\bFhwYsI.exeC:\Windows\System\bFhwYsI.exe4⤵PID:3892
-
-
C:\Windows\System\DZwZQfz.exeC:\Windows\System\DZwZQfz.exe4⤵PID:6664
-
-
C:\Windows\System\dTRvwXk.exeC:\Windows\System\dTRvwXk.exe4⤵PID:5580
-
-
C:\Windows\System\rPCgBoJ.exeC:\Windows\System\rPCgBoJ.exe4⤵PID:5620
-
-
C:\Windows\System\mbGqJHg.exeC:\Windows\System\mbGqJHg.exe4⤵PID:5360
-
-
C:\Windows\System\rOdkbmA.exeC:\Windows\System\rOdkbmA.exe4⤵PID:6580
-
-
C:\Windows\System\lrcXntX.exeC:\Windows\System\lrcXntX.exe4⤵PID:6776
-
-
C:\Windows\System\xQdSzwn.exeC:\Windows\System\xQdSzwn.exe4⤵PID:6624
-
-
C:\Windows\System\FjoxOXa.exeC:\Windows\System\FjoxOXa.exe4⤵PID:6040
-
-
C:\Windows\System\OILsBPf.exeC:\Windows\System\OILsBPf.exe4⤵PID:6576
-
-
C:\Windows\System\WTHAPvX.exeC:\Windows\System\WTHAPvX.exe4⤵PID:5200
-
-
C:\Windows\System\ibjhKDU.exeC:\Windows\System\ibjhKDU.exe4⤵PID:5680
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\jaf.exejaf.exe3⤵PID:6876
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K des.bat3⤵PID:3708
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\file.exefile.exe3⤵PID:6980
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:6260
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\PurchaseOrder.exePurchaseOrder.exe3⤵PID:6792
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\PurchaseOrder.exe"4⤵
- Command and Scripting Interpreter: PowerShell
PID:2748
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\TESAYt.exe"4⤵
- Command and Scripting Interpreter: PowerShell
PID:2084
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TESAYt" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBC75.tmp"4⤵
- Scheduled Task/Job: Scheduled Task
PID:6316
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵PID:4148
-
-
-
-
C:\Windows\system32\efsui.exeefsui.exe /efs /keybackup1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:868
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x308 0x4cc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3608
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3940
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5596
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv vFT40nm+FU6JKjOp+2LR3g.0.21⤵PID:224
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:1524
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD58f64a583b0823bfc2fdf7277e67b5e16
SHA1f8029c828d0aef58f8818b866f1f7f1ec2f095b8
SHA256b637a0f9031088d08147f397836fe1c16b15c70db696db4ddea05ec5b95b4f91
SHA512e8c7941c8a42f6408b0071c7f0ea06a226757d3a07e3943738296c5dd5e5e60d682424182f0d788f42a5758f1c76ef1ec89901acc43799833234f09f3b4278a2
-
Filesize
576KB
MD5827269f80df8d46c42ed03cbd4762562
SHA13487a26dbbb819e83fcf1de8f5a73fee8ae8fec8
SHA256cc2cbfe8d858822373aa3a0715f2d3af30598df815623c2a7ec34c1093393f18
SHA5127af7d249dad25496c511d679af6ed22473b82a9304b776157d08958f9b4ebcbc1a1c20b74c29cab0cc4f5a4443fc845e4c748cbd506c32ee055f63c0da6f982e
-
Filesize
320KB
MD5c0e588f964f1b1ba66a0a09eb2427446
SHA143e212a58dc93c7f1fd28642b08181ac70cb6c31
SHA2569f75d2d34cb0eba1ffd132c302a86e0d237fe1a8938b962a55c719a068806d7e
SHA512906d931b06b2b5566c80342acca59a66be76338057b61b41508cf64598a196d9b47d8f4714bd995591bb90d311fc6d7cfed733b6a07b3e2851a401f2d6d6341c
-
Filesize
256KB
MD5619ae16e89205048cb74df283b1ed4ef
SHA16f0b4f2cbd44260574c69f60d7bfcf2b9a6a9af7
SHA256a8f12b9d498bc8d9fae2af142cff6f1a919e05f646c58f5842c7ed25fdd09a4a
SHA512d8c90260c3ffa2bfe328e2fbd5f478af2ed2d4d6a837789fa7a9704236d62661cc4cfc3193c95a673bed4ce1408c627ea681e267f09c92f0f6d7ad6fd7ad0648
-
Filesize
192KB
MD515e547d15f7d512a56b7fe72f0727c03
SHA1e5cadd12c9d3bcc9439c61794e3043bb38a13428
SHA256edcc492e43ab3b09824efb51c09635221adc4338bd3ad5a8eeac21765d5fbea3
SHA5128355635554f760e565b4f8053fcb5e813d3accfbc7ef702339d77cf0a00696321602e65cd5dbe40df1a99f818ed5cc03343f1a69a9c6bb8869d312ed696627ef
-
Filesize
5.4MB
MD56b5f7fa6170505943e457161f3890d3d
SHA1c8f0ba2157d1034dd37899372d21a4ab08ec79dc
SHA256f7969912f294d1de64efb4400df0b241b710ec06131304fa16a9d4c3c306fc67
SHA5121147d93974aaf089859eceeea8ca73cf6520e692c9066bf01c1669d09b7a9f8080c45dd49048a912839a1bc199d5b2d4645c38af6a949801b673d2fd5da6df56
-
Filesize
320KB
MD556fcc9adc0a509558071c685209c160b
SHA1baeeac4dda8e6f4ef8c29f3633128d9cc2b8816e
SHA256d1719222e45f0a0ab738c1b44ab7d474a13b1f7c501bf521c26aeccfef281414
SHA512fa3454e8ea0abcfc41fe021a8fa2613cb250878f78651777a60ac25186fbc0bf5e769c98bbe32aecd00824d8f6ebbbe69ab4b47f5d71dcbbd6a98ddc3aa7df47
-
Filesize
224KB
MD58924123111f4a88ec9a4541aa713db53
SHA1342cd5a4ce1d036d72ead842478d3ac2514760f9
SHA256d71f81c83ec63eaa32d36d5df7be1d9e71d3ea9150f47cebda2924923cbbf18a
SHA512c02ee1f193fb9f5bf1adee4bf6fea02db1f718ec74c6900419cccdc52e4d1ad6e5c540716c717655153f69b0a4daa6b3832ec9222f803efb181ac8954a032c8f
-
Filesize
34KB
MD59e2ee65661bee40438d514fe592bfcf8
SHA1140a77e69329638a5c53dc01fbcfe0ce9ab93423
SHA256ac9ee085920a3d8b076d5e0c61dc9df42c4bac28d1fc968344f9ceddb3972f69
SHA5123b3c7ff00d8f12cea48008a2e95c194f7fc64ee96425a3cfefb8b65a9f7dad66fa16104ec1cf96ac6892426e5e8ab59dab91e3d56d76f58753b80f8ac48f2612
-
Filesize
8KB
MD5b0ac2d09abc0efc32b28b7e364659a15
SHA133738efa553c7dcb30a94055b24fd1a16616bc27
SHA256a0e5dbe96d1cae29501b481cd98a1eac5f0f662aa367aa9712a419c3c32f4284
SHA51225853b53eb7c6115546cf59c276142f5aa2e54718f18f98402fa7267cd685601280b2e9f903a4c4e16c74e531bf591f0355fee29b0c702e0c15ba6e00899329f
-
Filesize
12KB
MD5dcfe71d27bf49ba16fde0d1945bfb4a2
SHA186b3d8696b5da354ef42c8ab4a9d21cdaaf0dda1
SHA256eacbfca9a5ef05a108ef5337c773d82a43398bb8ea177e5ebeef62934dd75811
SHA5124da8efcfd4a77e230c61a527eb96b5193b9f5ddc0d476dfca8ce6ba7143ac5c8a1fd8b673cc2c7b554dae42ec01364a178f64532b6de17d44dce07b3089869c3
-
Filesize
58KB
MD52b715a1f340a4704fe4c6f48bdf2aa26
SHA1927d2e65a46200c75348a24f78ee4561474a1abf
SHA2563aed0f6ec1e924e669df63b57619656c45814ae8f7bfa481066ccb291c3f8f5c
SHA5126eb2975cb4a3de4eab7d3808e38a9821de5994490302767ad531fd31144116264878d709f131e3e99d26c41208fc0ebee3bd6779766bc92e8c9aa10d4f19a672
-
Filesize
82KB
MD55972eeea7971170eb72cab2fc85c2b17
SHA1d327d96bd78c5e851e065d053829abbb370c0c09
SHA2569677467feb714a89de457e262ff6647708b7de66127671b77f7e1e92aa0c2f41
SHA512c55c5217271f29bd3a7a130daa5e5711eff65630127f90112a26bb4ba3dbf416059f9424606bc1998ff4eec874c18767a395e20c3dc516a00079b2c5a7221ed3
-
Filesize
12KB
MD540f8022c3fe4e1cc97bb794e1b519b3f
SHA17ff107451b67b2d432db4706c697a9391c13a6f4
SHA2566b16818c057024f588f4f423cb1f50d24e092fca3c9b5c8c1943cf5b3ea70759
SHA51208a85d0203a0534067538ba0c1f40273409f61f212269cb3095df1defc114ff007efcb4c3c4897a345cda17db16c98b88ae61100b9e4636862d26edb8a402ba3
-
Filesize
7KB
MD56e78ea1629ed74deed4190d87aecbbea
SHA1c1e6e0eea7d9e7b7e693530ed43cc271567e5bf1
SHA2569ae1c525224824cbb209b46c64d19cfac121f1bee266a9924ec5319f7ea45295
SHA51260be03a64880316b9d8c1dac2e9884dd1bf764ceba0be2c47a114cec20c285f6a925dcfd4f1f855f863775e6896ad8e9239ed45523ac317c4388449dd93509d6
-
Filesize
6KB
MD58a5dbabcb9b11e3e0c527b93e69d5e4d
SHA1c47add614ece5ed16ca456bac08b1f2cbaccfec9
SHA256824ea3f5eabd9c3b8e0041e78935feb65545f58760ce0c47a0d938ad75f8e241
SHA512ddcb3520d68321e6372630cb34473c7b310ffed1263cde8e1059837e63e42e7a7e644537044dee774e9ea3e912e485f2630bc106233e039ea925355ec29921c0
-
Filesize
11KB
MD5f450c5ca28b425ffa6710530ee9a1e9e
SHA14e922b3f0c318a9a13b81f094a4beb478400674d
SHA25635b071f3eca3ce103268adf701117138087cd194605110563655635ce7f0a6f3
SHA51203d9bce643aeda7e39202ffd4ec75127b33015a7abbe976bb01d22ec40433235f700cae5206b4f1832b3f35ddaabc44c65f066fea26d054073e00c8b8f2737a6
-
Filesize
4KB
MD59d2bf033acde5a212f6f5404d490e169
SHA1a0e28adf40a9d06710d20071dcaba2569b91b1dd
SHA25693e7c6c123d9b53a2d933f63093b4b85302023517f56abf057f9ef8a94d83b8b
SHA5128dcb0dd9dc72c2de61e26932b72d5923a43b0f512e8d2df5334f478a78ee80f492bb8cb193dd3a314a6a19dd95e4899b40e7b76c3b1f767f5e8b46d1b1b3c00d
-
Filesize
9KB
MD546ef27810a6f255f6b4cd012324c904f
SHA1b4d83b70456eede709abc2539b842107ee93f4e5
SHA2560c71013d47cad93acf49bed71a1ba589ac42027ca5ac4b3d06e682ca5f3419ff
SHA512e04c9d1873a9fb92f1ac42e9f46f25e90e25b653d25e608478fe9ba1cf2efe1336f196d9eac5472bb3fbfcb61c2fdb599db9ac30c6f4c15b2da37bc359ac3d6e
-
Filesize
9KB
MD5e7629d2374443b7e604c831de1fee8f1
SHA16aee8b0dc09f9e2e07bfa9ee4e609988efa8e2ac
SHA256c95c0ab1d348a4c4a8b009b348e688fc9b97b967104f750afcff20a981fe4ca1
SHA512c81d1ada7d26b1d0f3fa137af8cfbe30a9d24402ed15ef3d0bda3b81593a3ec2ce201b8fc98c3eec3a99d5e403c20d5aa7fb9afc0047d009c7d09003b1d5ace9
-
Filesize
5.8MB
MD5f617df59ad479872b7f65bb81fd59350
SHA1cc61df1b84bbe024691d1c5f6b59dfe74643d7f5
SHA256ef4fa2fc9548b4aa84c8340f3cc167f7ac5522a90f6d62b3e56818515d9ee7e1
SHA51240c0e5aa2b3beb6c2c4633ec02e16b42d4bccb00673ae39e6c373f5ae2f68d10b12ba08277847f6123902b22318399060b77f8c76b812cd0a154493755737e24
-
Filesize
13.0MB
MD5e868c731ec770c425dbc74881b3ca936
SHA1a8dc99a2e0bc3360f8441243aab13fe7279a759a
SHA2561e5a4b342c6417bb9352e8c29cb839413987a06438e7b48fd0320925827f289c
SHA51251bbdbcd06bc41c1ef6a589ca2b6300f1f9350d11b8bfa60605c7a68a0d6a714998bec6060cbc3b27dd2d1485d57f344890b0278d7313dbdb5593334ceea3b49
-
Filesize
1.2MB
MD5acebc69ae67997867002990dae3f699d
SHA18483b45b2faaa21ad548e72fb49ae3a08143334e
SHA256f545fbcf52e694eaed07f7869ee67d1dffea29a3769e2482f5eccb3c21148442
SHA5126c9f88407ffbf228f44270c28d0eeba804a8f3198454becebdd5f2d13eda5c1f0407f1e98569bbcd490225a10ba6e1917c1af1971bd1f636a71250b602dcbf28
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5312f5b3c9cb52e82d768657b3d05250b
SHA109a1045d28c05c307f939fe57a5166437c42a914
SHA256624d35479a49e43dd5981bf67495b4fe82e44e5a42f2f546def404874397632a
SHA512ace0f99ecc8bda33f6eb9698d33c48622f1ed5d85eaa7c3c0750a9ded0fd5b3ca4db1e6aa2a978ee8bb02ff2034d05dc5dad3cc68ff19c7b77161378087726cb
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5c481b7883a4b8d7454900f708991f0f9
SHA1cd28238c2837b5e4c221818f99f0a7364881322f
SHA256ba949d0c956d071eee4d6ea69d3c9cea6a76085a9fd564391e8c2eb261fbbaed
SHA512b8bc1d774b4ab52590c41db2ba73fb68020c87581188e7a1b56b369df8278df3fe4a5360365d1e8c3b3605c69371482990648a2b29ef8ee4131890797900d733
-
Filesize
3KB
MD58f607ecf72846f6ec09d8e65672b2379
SHA1c9f878e50c9d7bb34f8e39b6100d374fb759a71d
SHA256b0fb170d3295011187dd97616a8b877a5c84015cc832b097dfec58e68eda1e64
SHA5129f9eeff4ae1efc8fe246a4138322c69471ca56b92415f1b5665c6f5cd8298f4664b3381cfa62aca8f03e6ba630c552a067f906df2d4160c7561a007c799a0cc2
-
Filesize
5KB
MD59750fe635cce803bd28ac010f4fa2108
SHA11db1074f00523631821fb1a709d6a2a0ae3c7b06
SHA256757ba3adf25ff258c8152e36544eb81bf64ddc5707b33f04c780be0bb7ce1cf7
SHA512059cde7e3f2d4e801b7d9f0692b12ffb0ee8364e631d26095d35aa256383b661f2855d3b047f82a0b9eaad981c451a57c6e838e16e9b5c930f8f72a56a4ae93b
-
Filesize
6KB
MD54d370855574e8f553ec71761d5efb43f
SHA13625c7868da896ec27f4a13adf77935f3e52f352
SHA25644f97e6dd6d0e6f0b2fdb10f82726e46aca93c6f1534fb622aa5161c0a24e6a5
SHA51259a80c71e9e20ca5daab7f040c347b5b5c41c283a8221280c5d11d95563f928c10748544fea8be80e9203fda4028037a7db91ef14280b06749ebda2823c31751
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b04a427f1d025835cc8eed9d69037a31
SHA10870d3e9c20ec28ae324029fd18b857202ef33ad
SHA256c7c711261015afbc5567b8317864f1423d713c97bc8d793ec76d7268916e71fd
SHA5122181b5f0f4d6fe43230623c97a3d822fe3987d4eafe1c05db12ce9bc4031e9e527b6d915d80e4d6b135137f62759f33cee89110d98b72e72649aebc74a5bfa70
-
Filesize
10KB
MD5c0c360be86b660b0a6bfc801ca041435
SHA108be06d0eb896efc79473eedef96ffcee1ecd90a
SHA25609b0af622cb8c107f93d39739a5338bffb73cddfee3f4f10afa14d709c8070ca
SHA51257de3d1aeeede5fbe113b01370f80a68446d4e06c55d541d412eb61b5c6f0bc8db8d2236e0a0bb7c1e231bc632c507a5846a1d2d18d67f5acb495f0f76d843f8
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202409170406431\additional_file0.tmp
Filesize1.4MB
MD5e9a2209b61f4be34f25069a6e54affea
SHA16368b0a81608c701b06b97aeff194ce88fd0e3c0
SHA256e950f17f4181009eeafa9f5306e8a9dfd26d88ca63b1838f44ff0efc738e7d1f
SHA51259e46277ca79a43ed8b0a25b24eff013e251a75f90587e013b9c12851e5dd7283b6172f7d48583982f6a32069457778ee440025c1c754bf7bb6ce8ae1d2c3fc5
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\!m.bat
Filesize1KB
MD5d295fd5b892b165427abecd1b5aac987
SHA1ec1bb8ab7bb5ffd6d1c971fde332dab00f78cf5b
SHA256855a00d99d2cb67512ca1fb49a9954bc085ed9ada3a2d2226757bb347e2cad58
SHA512800d97dfdb1ef9923c82bf31a77b4cad49bf886aa055d5ee7f4396bc6bcd597a9e638ccdd1cd4878de7d8d273d60228604f97ee6e5b07668002fb08e9636f289
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\anti.exe
Filesize1.9MB
MD5cb02c0438f3f4ddabce36f8a26b0b961
SHA148c4fcb17e93b74030415996c0ec5c57b830ea53
SHA25664677f7767d6e791341b2eac7b43df90d39d9bdf26d21358578d2d38037e2c32
SHA512373f91981832cd9a1ff0b8744b43c7574b72971b5b6b19ea1f4665b6c878f7a1c7834ac08b92e0eca299eb4b590bf10f48a0485350a77a5f85fc3d2dd6913db3
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\avg.exe
Filesize5.8MB
MD50dc93e1f58cbb736598ce7fa7ecefa33
SHA16e539aab5faf7d4ce044c2905a9c27d4393bae30
SHA2564ec941f22985fee21d2f9d2ae590d5dafebed9a4cf55272b688afe472d454d36
SHA51273617da787e51609ee779a12fb75fb9eac6ed6e99fd1f4c5c02ff18109747de91a791b1a389434edfe8b96e5b40340f986b8f7b88eac3a330b683dec565a7eff
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\bundle.exe
Filesize429KB
MD5ae4581af98a5b38bce860f76223cb7c9
SHA16aa1e2cce517e5914a47816ef8ca79620e50e432
SHA2567c4b329a4018dc7e927a7d1078c846706efae6e6577f6809defaa51b636e7267
SHA51211ad90a030999bbb727dbfde7943d27f2442c247633cde5f9696e89796b0f750f85a9be96f01fa3fd1ec97653a334b1376d6bb76d9e43424cabe3a03893ecf04
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\butdes.exe
Filesize2.8MB
MD51535aa21451192109b86be9bcc7c4345
SHA11af211c686c4d4bf0239ed6620358a19691cf88c
SHA2564641af6a0071e11e13ad3b1cd950e01300542c2b9efb6ae92ffecedde974a4a6
SHA5121762b29f7b26911a7e6d244454eac7268235e2e0c27cd2ca639b8acdde2528c9ddf202ed59ca3155ee1d6ad3deba559a6eaf4ed74624c68688761e3e404e54da
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\code.js
Filesize4KB
MD5016bf2cf2bad527f1f1ea557408cb036
SHA123ab649b9fb99da8db407304ce9ca04f2b50c7b4
SHA25617bb814cfaa135628fd77aa8a017e4b0dcd3c266b8cdca99e4d7de5d215643c0
SHA512ac2d4f51b0b1da3c544f08b7d0618b50514509841f81bc9dad03329d5c1a90e205795a51ca59522d3aa660fb60faae19803eceeeea57f141217a6701a70510e7
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\doc.html
Filesize15KB
MD55622e7755e5f6585a965396b0d528475
SHA1b059dc59658822334e39323b37082374e8eeaac4
SHA256080cb8ef0cbf5a5de9163b365eec8b29538e579f14a9caa45c0f11bc173c4147
SHA51262f5abda3473ca043bf126eed9d0bcc0f775b5ac5f85b4fe52d1d656f476f62188d22cf79b229059a5d05e9258980c787cb755f08ca86e24e5f48655b5447f8e
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\download.jpg
Filesize8KB
MD501a5131931ef35acecbe557ba13f3954
SHA1c7afc7590d469432704d963ffcee31ad8bcfc175
SHA256d364872ddde28d81d23bb3b08f9e86f921b542f3a35fcaf12549cf5666462bd0
SHA512ce32352484d676bd0f47c24808707c603fe9f09e41afd63d90f07599f13a5e32c73b0970a9964632f76f5843dda87a033340ee12fadd87b9f219329d0c69b02e
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\fence.bat
Filesize167B
MD56465a5431e01a80bf71aca9e9698e5b0
SHA1d56ed108f13a6c49d57f05e2bf698778fd0b98dc
SHA2561c5f05fecfc1f4fd508f1d3bbb93a47e8b8196b9eded5de7152a6fa57ca7580f
SHA512db7f64b8af595d0bf6fd142471868df6d29ec7cfbb49a7e0da63d9bc8ca8f319e4c41f2c7baeafe17a3679861163400ccb36c18617982b244aaf482e9c264e55
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\flydes.exe
Filesize833KB
MD5b401505e8008994bf2a14fdf0deac874
SHA1e4f7f375b1e88dd71a0274a997ed5d9491bde068
SHA2566bcf6b84d71737787e3cc8d9d0eed9720f388cc2d0337832a7e8ca3c6f455a41
SHA5121bca98547ecf5a98d42b1d77cff50ca79ee560c893b2470aeb86887fef6e40a5ccdb72956f04a1d2a862827eebd3b7746e3043f3e6209597dcde9385ed55cc11
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\fries.jpg
Filesize12KB
MD5c4d9d3cd21ef4de91abc95f99c4bc7dc
SHA1b2cf457237c44c824068727b8440fe6a352a360c
SHA2566fd1c3bde9a6a478e39d1cf2121e980c0bcf59454fe1673d707aa70170953bc9
SHA512d10fbb0bdfb30160484950aa58bd2f97c38cf2d0914550b4041c9acd273e8013920ef1ee74216f92437a44ab81111a4c70ed3dc2df680ee4d187c22557900ee7
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\g_.exe
Filesize69KB
MD53cb72c753dd5e198792d1e0be81f7e2b
SHA18a55b72a998bf8362a12f68ee8c4801a5a24754c
SHA256be9d8772b360ca8054929e5f057413b69932ca8e521e6c696e0fb6b371e8cb97
SHA512008ed2e26fb4f41e9bb245130cc8f285744ccf737adeffc4c78cb11c03261f906cfd50b5b9e78f2c17dc2b8a01d83554e93f4960370064af87e84322cc78ee70
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\gadget.msi
Filesize23.4MB
MD5906ad3937f0abd2e5383dc162340496b
SHA1d63fe621af79e1468ee0cf52e119ffd21775ca8a
SHA256821e33cf757bd01bec6703796c01726e6674b8de3bc1e7ea834318039e46909e
SHA512624d76f7905f57679b647cfc676aa8c55cac72d6baa60db7d5ae45662de5da55f856f64adca382b315810088e757903f6c051685fcc83fe330016a8a95754d79
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\gx.exe
Filesize3.1MB
MD580bf3bf3b76c80235d24f7c698239089
SHA17f6071b502df985580e7c469c6d092472e355765
SHA2562b95e56af10406fbd3ecee38dab9e9c4a9b990d087f2ad2d7b1981c087829da2
SHA512076b8b6a80ea15738ce682cc715792546582d7a74f971f94f6b5b9cf8164f01280322baec7f72894ac4b8d63b9f2f6074e8fc5e47880ef6c0b57a47beef3581a
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\i.exe
Filesize12KB
MD5cea5426da515d43c88132a133f83ce68
SHA10c224d0bb777f1e3b186fdf58cc82860d96805cc
SHA2562be7a0865ded1c0bd1f92d5e09bb7b37a9e36a40487a687e0359c93878611a78
SHA5124c1f25147222c84dff513bebf00e828719454ad634ef9380cfc7835f0457a718b4b437ecb60c1fa72a7f83fbb67e1ddfcd225194eedda77034c72f8c752c642c
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\images.jpg
Filesize13KB
MD549f4fe0c8646909c7cf87adf68d896fd
SHA19193264c38e5ed9fa0f5be1d79f802cf946a74cf
SHA2569292dfcddc9e88e5dbc095ceeb83ce23400a3405a4d47fffc80656941c87d5ec
SHA5129df4db8c958110cea66f627170919346ed673d3c13aa55292484fc74ebac2864b0292cd4d66d35957b4b2740b2fe30ddfb9d9e04115d655fb58bf39e100d285e
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\nuggets.webp
Filesize32KB
MD5e40209599b592630dcac551daeb6b849
SHA1851150b573f94f07e459c320d72505e52c3e74f0
SHA2563c9aefa00fb2073763e807a7eccac687dcc26598f68564e9f9cf9ffdcd90a2be
SHA5126da5895f2833a18ddb58ba4a9e78dd0b3047475cae248e974dc45d839f02c62772a6ba6dfe51dd9a37f29b7ec9780e799f60f0e476655006dec693164e17eec2
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\rckdck.exe
Filesize6.2MB
MD5a79fb1a90fb3d92cf815f2c08d3ade6d
SHA125e5e553af5e2d21b5cfc70ba41afb65202f6fd5
SHA25643759b0c441fd4f71fe5eeb69f548cd2eb40ac0abfa02ea3afc44fbddf28dc16
SHA51282aa45337987c4f344361037c6ca8cf4fbf0fc1e5079ac03f54f3184354792965f6f3b28bd2ab7b511d21f29859e2832fc6b6122a49ddecde12afc7e26fd62dd
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\stopwatch.exe
Filesize68KB
MD5338a4b68d3292aa22049a22e9292e2a2
SHA19595e6f6d5e18a3e71d623ac4012e7633b020b29
SHA256490d833205f9dfe4f1950d40c845489aa2d2039a77ab10473384986f8442ea6f
SHA51206bc6463b65508d050c945d5bf08078eecd6982c74c7bab2a6722b99523189d24f530c10c05577e0dbd5b46e896d472112d036023ef5e576e2a8f9401b8668a5
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\t.exe
Filesize62KB
MD59e0c60453cdea093fa4c6762f9b1fda9
SHA102dfa74e42739c4e8a9a0534273f6a89b51f1dd3
SHA256269c6da90935306778f4f76005d1f00b49703f8819b60e2764cc14a5abc9a781
SHA512fc499cb6b98529c7a856c9ec7198f2a6d00d0c0d6b16e826913ab8dca2602f6700e3956749d3316484b94e6867f54cf99aa77f23375ea6c5ea75daa88c91aa96
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_a36ccf5fb6bc5c1342371a21b33a6f0c_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_2d713c1f-35f0-4d2e-a8a8-83e649b3fe8e\telamon.exe
Filesize2.3MB
MD56a80889e81911157ca27df5bc5ac2e09
SHA102ac28dd7124317e294fac847a05b69411c9cdb2
SHA2560b74c13914f712fce5bb41c25a443c4214a97792bdbb6fea05b98350901405ff
SHA512329ec105834f4531386090074994e5c4ddbdaf4cc4801956b675e258e9167f9e70cf31b8d636d119b59b57af0912decdc259d12999842008cec807a967c89aef
-
Filesize
6.4MB
MD5defd30ea336650cc29c0c79fad6fa6b5
SHA1935d871ed86456c6dd3c83136dc2d1bda5988ff3
SHA256015a13bd912728e463df6807019b1914dffc3e6735830472e3287150a02e13f4
SHA5128c6ebbf398fb44ff2254db5a7a2ffbc8803120fa93fa6b72c356c6e8eca45935ab973fe3c90d52d5a7691365caf5b41fe2702b6c76a61a0726faccc392c40e54
-
Filesize
5.9MB
MD5640ed3115c855d32ee1731c54702eab7
SHA11ac749b52794cbadfec8d9219530e9a79fc9427c
SHA25629b4cabc7a0e9dffbc2395b976749be0aad88357dd3b1d7e0cfc9b0c645421a3
SHA512bebe55fdbb363b78c4a6371304f65b89e03a03cee5a8ebceee1681261d8df64a0de36888ed763c3a607ae2732ab54e2e41edb624f37a7fdf8755c40e6bb96f53
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
232KB
MD555c310c0319260d798757557ab3bf636
SHA10892eb7ed31d8bb20a56c6835990749011a2d8de
SHA25654e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed
SHA512e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57
-
Filesize
404KB
MD55b4c8e63be988b83b09e13e9d1d74bb9
SHA1bcb242f54ee83f232df6b871aebc0f3d44e434c6
SHA2568ae877bd5f45975d827280bee2e19021c3401b5ba069df0e556f6911798adb4d
SHA512a31f9e24a4a27847516808b24f312d4df6b865eb421f84d8d4fc022bdb309e08e5648c52c13772a48456c578f3771d232539c7d30132a82a08e8ebbabcbffa0b
-
Filesize
659KB
MD55aa68bb2bf3b994bda93834ad34e7963
SHA10156732d5dd48feacfab3aa07764061d73b9116c
SHA256a90bfd9874c3e60650dba4c286b97ccdb375a456b95556feb38f3cba214770aa
SHA512e52fecbba96aa911552ef0e11d5d044ec44caf6e0947f64c9a17b04d846a3e86d19e4dfa5ac981fc98d44f941fda3a697c1d23ac6e8ef162f4bcdde9142f22f7
-
Filesize
688KB
MD5c765336f0dcf4efdcc2101eed67cd30c
SHA1fa0279f59738c5aa3b6b20106e109ccd77f895a7
SHA256c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28
SHA51206a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
124KB
MD56cc1665df819088de81854feb0ccc5e8
SHA1cbce30eecb9132b2a0e230e386b0fc9b073a339f
SHA256e22c3437de9707c1e3014b7485825c7c511d4fb7817da31a69da64d08351842c
SHA51201d98138f02c40e616839a80c99a9d090552b8f5ffe626b460f47aa921695e8ace6b6607c2ca67d43bee6dd8ce848bddc94cd12f1d0eef512991d28e65b6960b
-
Filesize
5.0MB
MD51e82b3787b23061611482cee72145da7
SHA183c11287d68a6f1e5cbb9b39755a85686257fd22
SHA256e86af9a8d23096ac222c9d8416698c962074a9d367abb96680a1bf6c27b619ba
SHA512729268b632b1ce38eb48bea4bd781e886ce04adda5e6ac2608de7023e1ab9e06e7fc304627f9b26e344c42fff603f49713758406002b600e7f844a0541659748
-
Filesize
126KB
MD52597a829e06eb9616af49fcd8052b8bd
SHA1871801aba3a75f95b10701f31303de705cb0bc5a
SHA2567359ca1befdb83d480fc1149ac0e8e90354b5224db7420b14b2d96d87cd20a87
SHA5128e5552b2f6e1c531aaa9fd507aa53c6e3d2f1dd63fe19e6350c5b6fbb009c99d353bb064a9eba4c31af6a020b31c0cd519326d32db4c8b651b83952e265ffb35
-
Filesize
93KB
MD57b4bd3b8ad6e913952f8ed1ceef40cd4
SHA1b15c0b90247a5066bd06d094fa41a73f0f931cb8
SHA256a49d3e455d7aeca2032c30fc099bfad1b1424a2f55ec7bb0f6acbbf636214754
SHA512d7168f9504dd6bbac7ee566c3591bfd7ad4e55bcac463cecb70540197dfe0cd969af96d113c6709d6c8ce6e91f2f5f6542a95c1a149caa78ba4bcb971e0c12a2
-
Filesize
2.1MB
MD5d21ae3f86fc69c1580175b7177484fa7
SHA12ed2c1f5c92ff6daa5ea785a44a6085a105ae822
SHA256a6241f168cacb431bfcd4345dd77f87b378dd861b5d440ae8d3ffd17b9ceb450
SHA512eda08b6ebdb3f0a3b6b43ef755fc275396a8459b8fc8a41eff55473562c394d015e5fe573b3b134eeed72edff2b0f21a3b9ee69a4541fd9738e880b71730303f
-
Filesize
195KB
MD534939c7b38bffedbf9b9ed444d689bc9
SHA181d844048f7b11cafd7561b7242af56e92825697
SHA256b127f3e04429d9f841a03bfd9344a0450594004c770d397fb32a76f6b0eabed0
SHA512bc1b347986a5d2107ad03b65e4b9438530033975fb8cc0a63d8ef7d88c1a96f70191c727c902eb7c3e64aa5de9ce6bb04f829ceb627eda278f44ca3dd343a953
-
Filesize
127KB
MD52027121c3cdeb1a1f8a5f539d1fe2e28
SHA1bcf79f49f8fc4c6049f33748ded21ec3471002c2
SHA2561dae8b6de29f2cfc0745d9f2a245b9ecb77f2b272a5b43de1ba5971c43bf73a1
SHA5125b0d9966ecc08bcc2c127b2bd916617b8de2dcbdc28aff7b4b8449a244983bfbe33c56f5c4a53b7cf21faf1dbab4bb845a5894492e7e10f3f517071f7a59727c
-
Filesize
36KB
MD5f840a9ddd319ee8c3da5190257abde5b
SHA13e868939239a5c6ef9acae10e1af721e4f99f24b
SHA256ddb6c9f8de72ddd589f009e732040250b2124bca6195aa147aa7aac43fc2c73a
SHA5128e12391027af928e4f7dad1ec4ab83e8359b19a7eb0be0372d051dfd2dd643dc0dfa086bd345760a496e5630c17f53db22f6008ae665033b766cbfcdd930881a
-
Filesize
5.7MB
MD5f36f05628b515262db197b15c7065b40
SHA174a8005379f26dd0de952acab4e3fc5459cde243
SHA25667abd9e211b354fa222e7926c2876c4b3a7aca239c0af47c756ee1b6db6e6d31
SHA512280390b1cf1b6b1e75eaa157adaf89135963d366b48686d48921a654527f9c1505c195ca1fc16dc85b8f13b2994841ca7877a63af708883418a1d588afa3dbe8
-
Filesize
934KB
MD5f7f32729079353000cd97b90aa314cc1
SHA121dbddeea2b634263c8fbf0d6178a9751d2467b8
SHA2568e29aa00863b1746ba25132f7ecb7bcb869d3a7e647dc8d6d3255491c5ac5212
SHA5122c40c12b81e7c377ddf0a6691ebeedc895dcf02c9211a1563b840de735fab77968565b1d3d0c40cc0b2b583fd4bfa1c69f995fca758ea85f548bf5797b5bf847
-
Filesize
5.2MB
MD501f1300576b992743edf66d03422b1cf
SHA1436c8cf2b30098a0fff303f9536064b8b399777d
SHA256d21449a13489d1d091e24c1591997b3f131c6f692a6a3088fe77780c671678d9
SHA5123904340aa6186f454d7e538ac4554b802c35e2ffba723a08fba59ea285ec81f431e8395abce1b5e3f42abeca9aa24d763a284b4d3493e821657ab8d5759268da