Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2024 10:47
Behavioral task
behavioral1
Sample
2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240903-en
General
-
Target
2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
e56c6344c76776f5be11c60dd9534b4d
-
SHA1
0cd039f31cf64a320f1ebb4291a507ab71e16d18
-
SHA256
90a862ca1de5c8b99c984f5da7fcdc154838e27539a3bfdb70ee23bce4d49fba
-
SHA512
8195b2d2660f024a92c912cd3205cc6833ecae5535150acd7bdb0e7cc488f58dcffd78abf5666145a43d38ca16d996f6f2de5fc4e0a49b18878716f575ebc9f3
-
SSDEEP
98304:oemTLkNdfE0pZrt56utgpPFotBER/mQ32lU5:T+856utgpPF8u/75
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral2/files/0x000800000002346f-6.dat cobalt_reflective_dll behavioral2/files/0x0007000000023473-12.dat cobalt_reflective_dll behavioral2/files/0x0007000000023474-17.dat cobalt_reflective_dll behavioral2/files/0x0007000000023475-23.dat cobalt_reflective_dll behavioral2/files/0x0007000000023476-29.dat cobalt_reflective_dll behavioral2/files/0x0007000000023477-35.dat cobalt_reflective_dll behavioral2/files/0x0007000000023478-41.dat cobalt_reflective_dll behavioral2/files/0x0007000000023479-48.dat cobalt_reflective_dll behavioral2/files/0x000700000002347b-54.dat cobalt_reflective_dll behavioral2/files/0x0008000000023470-60.dat cobalt_reflective_dll behavioral2/files/0x000700000002347c-66.dat cobalt_reflective_dll behavioral2/files/0x000700000002347d-76.dat cobalt_reflective_dll behavioral2/files/0x000700000002347f-83.dat cobalt_reflective_dll behavioral2/files/0x000700000002347e-88.dat cobalt_reflective_dll behavioral2/files/0x0007000000023480-87.dat cobalt_reflective_dll behavioral2/files/0x0007000000023481-100.dat cobalt_reflective_dll behavioral2/files/0x0007000000023482-107.dat cobalt_reflective_dll behavioral2/files/0x0007000000023483-114.dat cobalt_reflective_dll behavioral2/files/0x0007000000023485-120.dat cobalt_reflective_dll behavioral2/files/0x0007000000023486-127.dat cobalt_reflective_dll behavioral2/files/0x0007000000023487-132.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 64 IoCs
resource yara_rule behavioral2/memory/2312-0-0x00007FF736880000-0x00007FF736BD4000-memory.dmp xmrig behavioral2/memory/4600-7-0x00007FF7E8060000-0x00007FF7E83B4000-memory.dmp xmrig behavioral2/files/0x000800000002346f-6.dat xmrig behavioral2/files/0x0007000000023473-12.dat xmrig behavioral2/memory/3220-13-0x00007FF7403F0000-0x00007FF740744000-memory.dmp xmrig behavioral2/files/0x0007000000023474-17.dat xmrig behavioral2/memory/1596-19-0x00007FF6F25B0000-0x00007FF6F2904000-memory.dmp xmrig behavioral2/files/0x0007000000023475-23.dat xmrig behavioral2/memory/2676-26-0x00007FF65A560000-0x00007FF65A8B4000-memory.dmp xmrig behavioral2/files/0x0007000000023476-29.dat xmrig behavioral2/files/0x0007000000023477-35.dat xmrig behavioral2/files/0x0007000000023478-41.dat xmrig behavioral2/memory/2092-42-0x00007FF7A94F0000-0x00007FF7A9844000-memory.dmp xmrig behavioral2/memory/2768-36-0x00007FF689920000-0x00007FF689C74000-memory.dmp xmrig behavioral2/memory/3296-33-0x00007FF7577B0000-0x00007FF757B04000-memory.dmp xmrig behavioral2/files/0x0007000000023479-48.dat xmrig behavioral2/memory/3484-50-0x00007FF6017B0000-0x00007FF601B04000-memory.dmp xmrig behavioral2/files/0x000700000002347b-54.dat xmrig behavioral2/memory/4732-55-0x00007FF653900000-0x00007FF653C54000-memory.dmp xmrig behavioral2/memory/2312-61-0x00007FF736880000-0x00007FF736BD4000-memory.dmp xmrig behavioral2/files/0x0008000000023470-60.dat xmrig behavioral2/files/0x000700000002347c-66.dat xmrig behavioral2/memory/4324-65-0x00007FF773940000-0x00007FF773C94000-memory.dmp xmrig behavioral2/files/0x000700000002347d-76.dat xmrig behavioral2/memory/1268-75-0x00007FF752240000-0x00007FF752594000-memory.dmp xmrig behavioral2/memory/3220-74-0x00007FF7403F0000-0x00007FF740744000-memory.dmp xmrig behavioral2/memory/3244-73-0x00007FF75EA40000-0x00007FF75ED94000-memory.dmp xmrig behavioral2/memory/4600-69-0x00007FF7E8060000-0x00007FF7E83B4000-memory.dmp xmrig behavioral2/files/0x000700000002347f-83.dat xmrig behavioral2/memory/5048-91-0x00007FF7CD4E0000-0x00007FF7CD834000-memory.dmp xmrig behavioral2/memory/3192-93-0x00007FF74F250000-0x00007FF74F5A4000-memory.dmp xmrig behavioral2/memory/2676-92-0x00007FF65A560000-0x00007FF65A8B4000-memory.dmp xmrig behavioral2/memory/3004-90-0x00007FF706D90000-0x00007FF7070E4000-memory.dmp xmrig behavioral2/files/0x000700000002347e-88.dat xmrig behavioral2/files/0x0007000000023480-87.dat xmrig behavioral2/memory/1596-86-0x00007FF6F25B0000-0x00007FF6F2904000-memory.dmp xmrig behavioral2/files/0x0007000000023481-100.dat xmrig behavioral2/memory/3732-104-0x00007FF688150000-0x00007FF6884A4000-memory.dmp xmrig behavioral2/memory/2768-101-0x00007FF689920000-0x00007FF689C74000-memory.dmp xmrig behavioral2/files/0x0007000000023482-107.dat xmrig behavioral2/memory/3900-111-0x00007FF7DAE30000-0x00007FF7DB184000-memory.dmp xmrig behavioral2/memory/2092-110-0x00007FF7A94F0000-0x00007FF7A9844000-memory.dmp xmrig behavioral2/files/0x0007000000023483-114.dat xmrig behavioral2/files/0x0007000000023485-120.dat xmrig behavioral2/memory/1356-122-0x00007FF7EA130000-0x00007FF7EA484000-memory.dmp xmrig behavioral2/memory/4732-121-0x00007FF653900000-0x00007FF653C54000-memory.dmp xmrig behavioral2/memory/2864-117-0x00007FF6E1AC0000-0x00007FF6E1E14000-memory.dmp xmrig behavioral2/files/0x0007000000023486-127.dat xmrig behavioral2/files/0x0007000000023487-132.dat xmrig behavioral2/memory/4324-134-0x00007FF773940000-0x00007FF773C94000-memory.dmp xmrig behavioral2/memory/4944-135-0x00007FF7F7D20000-0x00007FF7F8074000-memory.dmp xmrig behavioral2/memory/4272-136-0x00007FF7071B0000-0x00007FF707504000-memory.dmp xmrig behavioral2/memory/1268-137-0x00007FF752240000-0x00007FF752594000-memory.dmp xmrig behavioral2/memory/3004-138-0x00007FF706D90000-0x00007FF7070E4000-memory.dmp xmrig behavioral2/memory/5048-139-0x00007FF7CD4E0000-0x00007FF7CD834000-memory.dmp xmrig behavioral2/memory/3192-140-0x00007FF74F250000-0x00007FF74F5A4000-memory.dmp xmrig behavioral2/memory/3732-141-0x00007FF688150000-0x00007FF6884A4000-memory.dmp xmrig behavioral2/memory/1356-142-0x00007FF7EA130000-0x00007FF7EA484000-memory.dmp xmrig behavioral2/memory/4600-143-0x00007FF7E8060000-0x00007FF7E83B4000-memory.dmp xmrig behavioral2/memory/3220-144-0x00007FF7403F0000-0x00007FF740744000-memory.dmp xmrig behavioral2/memory/1596-145-0x00007FF6F25B0000-0x00007FF6F2904000-memory.dmp xmrig behavioral2/memory/2676-146-0x00007FF65A560000-0x00007FF65A8B4000-memory.dmp xmrig behavioral2/memory/3296-147-0x00007FF7577B0000-0x00007FF757B04000-memory.dmp xmrig behavioral2/memory/2768-148-0x00007FF689920000-0x00007FF689C74000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
pid Process 4600 tESNhAV.exe 3220 YwqNuPv.exe 1596 yzsNZmX.exe 2676 wnxbccC.exe 3296 WDtEaLn.exe 2768 rJcBcNk.exe 2092 eHxdHVN.exe 3484 fCkpHpM.exe 4732 bxNKDRZ.exe 4324 McjVyWR.exe 3244 OwNTeOp.exe 1268 IpEBYmJ.exe 3004 exHwfJF.exe 5048 HcRmmKo.exe 3192 ACEsjYG.exe 3732 jFoyMsQ.exe 3900 edaoEDe.exe 2864 pkWhxke.exe 1356 JmAwpDn.exe 4944 VEiZQvl.exe 4272 rMcPSPG.exe -
resource yara_rule behavioral2/memory/2312-0-0x00007FF736880000-0x00007FF736BD4000-memory.dmp upx behavioral2/memory/4600-7-0x00007FF7E8060000-0x00007FF7E83B4000-memory.dmp upx behavioral2/files/0x000800000002346f-6.dat upx behavioral2/files/0x0007000000023473-12.dat upx behavioral2/memory/3220-13-0x00007FF7403F0000-0x00007FF740744000-memory.dmp upx behavioral2/files/0x0007000000023474-17.dat upx behavioral2/memory/1596-19-0x00007FF6F25B0000-0x00007FF6F2904000-memory.dmp upx behavioral2/files/0x0007000000023475-23.dat upx behavioral2/memory/2676-26-0x00007FF65A560000-0x00007FF65A8B4000-memory.dmp upx behavioral2/files/0x0007000000023476-29.dat upx behavioral2/files/0x0007000000023477-35.dat upx behavioral2/files/0x0007000000023478-41.dat upx behavioral2/memory/2092-42-0x00007FF7A94F0000-0x00007FF7A9844000-memory.dmp upx behavioral2/memory/2768-36-0x00007FF689920000-0x00007FF689C74000-memory.dmp upx behavioral2/memory/3296-33-0x00007FF7577B0000-0x00007FF757B04000-memory.dmp upx behavioral2/files/0x0007000000023479-48.dat upx behavioral2/memory/3484-50-0x00007FF6017B0000-0x00007FF601B04000-memory.dmp upx behavioral2/files/0x000700000002347b-54.dat upx behavioral2/memory/4732-55-0x00007FF653900000-0x00007FF653C54000-memory.dmp upx behavioral2/memory/2312-61-0x00007FF736880000-0x00007FF736BD4000-memory.dmp upx behavioral2/files/0x0008000000023470-60.dat upx behavioral2/files/0x000700000002347c-66.dat upx behavioral2/memory/4324-65-0x00007FF773940000-0x00007FF773C94000-memory.dmp upx behavioral2/files/0x000700000002347d-76.dat upx behavioral2/memory/1268-75-0x00007FF752240000-0x00007FF752594000-memory.dmp upx behavioral2/memory/3220-74-0x00007FF7403F0000-0x00007FF740744000-memory.dmp upx behavioral2/memory/3244-73-0x00007FF75EA40000-0x00007FF75ED94000-memory.dmp upx behavioral2/memory/4600-69-0x00007FF7E8060000-0x00007FF7E83B4000-memory.dmp upx behavioral2/files/0x000700000002347f-83.dat upx behavioral2/memory/5048-91-0x00007FF7CD4E0000-0x00007FF7CD834000-memory.dmp upx behavioral2/memory/3192-93-0x00007FF74F250000-0x00007FF74F5A4000-memory.dmp upx behavioral2/memory/2676-92-0x00007FF65A560000-0x00007FF65A8B4000-memory.dmp upx behavioral2/memory/3004-90-0x00007FF706D90000-0x00007FF7070E4000-memory.dmp upx behavioral2/files/0x000700000002347e-88.dat upx behavioral2/files/0x0007000000023480-87.dat upx behavioral2/memory/1596-86-0x00007FF6F25B0000-0x00007FF6F2904000-memory.dmp upx behavioral2/files/0x0007000000023481-100.dat upx behavioral2/memory/3732-104-0x00007FF688150000-0x00007FF6884A4000-memory.dmp upx behavioral2/memory/2768-101-0x00007FF689920000-0x00007FF689C74000-memory.dmp upx behavioral2/files/0x0007000000023482-107.dat upx behavioral2/memory/3900-111-0x00007FF7DAE30000-0x00007FF7DB184000-memory.dmp upx behavioral2/memory/2092-110-0x00007FF7A94F0000-0x00007FF7A9844000-memory.dmp upx behavioral2/files/0x0007000000023483-114.dat upx behavioral2/files/0x0007000000023485-120.dat upx behavioral2/memory/1356-122-0x00007FF7EA130000-0x00007FF7EA484000-memory.dmp upx behavioral2/memory/4732-121-0x00007FF653900000-0x00007FF653C54000-memory.dmp upx behavioral2/memory/2864-117-0x00007FF6E1AC0000-0x00007FF6E1E14000-memory.dmp upx behavioral2/files/0x0007000000023486-127.dat upx behavioral2/files/0x0007000000023487-132.dat upx behavioral2/memory/4324-134-0x00007FF773940000-0x00007FF773C94000-memory.dmp upx behavioral2/memory/4944-135-0x00007FF7F7D20000-0x00007FF7F8074000-memory.dmp upx behavioral2/memory/4272-136-0x00007FF7071B0000-0x00007FF707504000-memory.dmp upx behavioral2/memory/1268-137-0x00007FF752240000-0x00007FF752594000-memory.dmp upx behavioral2/memory/3004-138-0x00007FF706D90000-0x00007FF7070E4000-memory.dmp upx behavioral2/memory/5048-139-0x00007FF7CD4E0000-0x00007FF7CD834000-memory.dmp upx behavioral2/memory/3192-140-0x00007FF74F250000-0x00007FF74F5A4000-memory.dmp upx behavioral2/memory/3732-141-0x00007FF688150000-0x00007FF6884A4000-memory.dmp upx behavioral2/memory/1356-142-0x00007FF7EA130000-0x00007FF7EA484000-memory.dmp upx behavioral2/memory/4600-143-0x00007FF7E8060000-0x00007FF7E83B4000-memory.dmp upx behavioral2/memory/3220-144-0x00007FF7403F0000-0x00007FF740744000-memory.dmp upx behavioral2/memory/1596-145-0x00007FF6F25B0000-0x00007FF6F2904000-memory.dmp upx behavioral2/memory/2676-146-0x00007FF65A560000-0x00007FF65A8B4000-memory.dmp upx behavioral2/memory/3296-147-0x00007FF7577B0000-0x00007FF757B04000-memory.dmp upx behavioral2/memory/2768-148-0x00007FF689920000-0x00007FF689C74000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\System\YwqNuPv.exe 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\McjVyWR.exe 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\edaoEDe.exe 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\JmAwpDn.exe 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\WDtEaLn.exe 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\rJcBcNk.exe 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\fCkpHpM.exe 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\HcRmmKo.exe 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\pkWhxke.exe 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\tESNhAV.exe 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\IpEBYmJ.exe 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\exHwfJF.exe 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ACEsjYG.exe 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\VEiZQvl.exe 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\rMcPSPG.exe 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\yzsNZmX.exe 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\wnxbccC.exe 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\eHxdHVN.exe 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\bxNKDRZ.exe 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\OwNTeOp.exe 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\jFoyMsQ.exe 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2312 wrote to memory of 4600 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 85 PID 2312 wrote to memory of 4600 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 85 PID 2312 wrote to memory of 3220 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 86 PID 2312 wrote to memory of 3220 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 86 PID 2312 wrote to memory of 1596 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 87 PID 2312 wrote to memory of 1596 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 87 PID 2312 wrote to memory of 2676 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 88 PID 2312 wrote to memory of 2676 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 88 PID 2312 wrote to memory of 3296 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 89 PID 2312 wrote to memory of 3296 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 89 PID 2312 wrote to memory of 2768 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 90 PID 2312 wrote to memory of 2768 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 90 PID 2312 wrote to memory of 2092 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 91 PID 2312 wrote to memory of 2092 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 91 PID 2312 wrote to memory of 3484 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 92 PID 2312 wrote to memory of 3484 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 92 PID 2312 wrote to memory of 4732 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 93 PID 2312 wrote to memory of 4732 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 93 PID 2312 wrote to memory of 4324 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 94 PID 2312 wrote to memory of 4324 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 94 PID 2312 wrote to memory of 3244 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 95 PID 2312 wrote to memory of 3244 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 95 PID 2312 wrote to memory of 1268 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 96 PID 2312 wrote to memory of 1268 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 96 PID 2312 wrote to memory of 3004 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 97 PID 2312 wrote to memory of 3004 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 97 PID 2312 wrote to memory of 5048 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 98 PID 2312 wrote to memory of 5048 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 98 PID 2312 wrote to memory of 3192 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 99 PID 2312 wrote to memory of 3192 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 99 PID 2312 wrote to memory of 3732 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 100 PID 2312 wrote to memory of 3732 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 100 PID 2312 wrote to memory of 3900 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 103 PID 2312 wrote to memory of 3900 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 103 PID 2312 wrote to memory of 2864 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 105 PID 2312 wrote to memory of 2864 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 105 PID 2312 wrote to memory of 1356 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 106 PID 2312 wrote to memory of 1356 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 106 PID 2312 wrote to memory of 4944 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 107 PID 2312 wrote to memory of 4944 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 107 PID 2312 wrote to memory of 4272 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 109 PID 2312 wrote to memory of 4272 2312 2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-22_e56c6344c76776f5be11c60dd9534b4d_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\System\tESNhAV.exeC:\Windows\System\tESNhAV.exe2⤵
- Executes dropped EXE
PID:4600
-
-
C:\Windows\System\YwqNuPv.exeC:\Windows\System\YwqNuPv.exe2⤵
- Executes dropped EXE
PID:3220
-
-
C:\Windows\System\yzsNZmX.exeC:\Windows\System\yzsNZmX.exe2⤵
- Executes dropped EXE
PID:1596
-
-
C:\Windows\System\wnxbccC.exeC:\Windows\System\wnxbccC.exe2⤵
- Executes dropped EXE
PID:2676
-
-
C:\Windows\System\WDtEaLn.exeC:\Windows\System\WDtEaLn.exe2⤵
- Executes dropped EXE
PID:3296
-
-
C:\Windows\System\rJcBcNk.exeC:\Windows\System\rJcBcNk.exe2⤵
- Executes dropped EXE
PID:2768
-
-
C:\Windows\System\eHxdHVN.exeC:\Windows\System\eHxdHVN.exe2⤵
- Executes dropped EXE
PID:2092
-
-
C:\Windows\System\fCkpHpM.exeC:\Windows\System\fCkpHpM.exe2⤵
- Executes dropped EXE
PID:3484
-
-
C:\Windows\System\bxNKDRZ.exeC:\Windows\System\bxNKDRZ.exe2⤵
- Executes dropped EXE
PID:4732
-
-
C:\Windows\System\McjVyWR.exeC:\Windows\System\McjVyWR.exe2⤵
- Executes dropped EXE
PID:4324
-
-
C:\Windows\System\OwNTeOp.exeC:\Windows\System\OwNTeOp.exe2⤵
- Executes dropped EXE
PID:3244
-
-
C:\Windows\System\IpEBYmJ.exeC:\Windows\System\IpEBYmJ.exe2⤵
- Executes dropped EXE
PID:1268
-
-
C:\Windows\System\exHwfJF.exeC:\Windows\System\exHwfJF.exe2⤵
- Executes dropped EXE
PID:3004
-
-
C:\Windows\System\HcRmmKo.exeC:\Windows\System\HcRmmKo.exe2⤵
- Executes dropped EXE
PID:5048
-
-
C:\Windows\System\ACEsjYG.exeC:\Windows\System\ACEsjYG.exe2⤵
- Executes dropped EXE
PID:3192
-
-
C:\Windows\System\jFoyMsQ.exeC:\Windows\System\jFoyMsQ.exe2⤵
- Executes dropped EXE
PID:3732
-
-
C:\Windows\System\edaoEDe.exeC:\Windows\System\edaoEDe.exe2⤵
- Executes dropped EXE
PID:3900
-
-
C:\Windows\System\pkWhxke.exeC:\Windows\System\pkWhxke.exe2⤵
- Executes dropped EXE
PID:2864
-
-
C:\Windows\System\JmAwpDn.exeC:\Windows\System\JmAwpDn.exe2⤵
- Executes dropped EXE
PID:1356
-
-
C:\Windows\System\VEiZQvl.exeC:\Windows\System\VEiZQvl.exe2⤵
- Executes dropped EXE
PID:4944
-
-
C:\Windows\System\rMcPSPG.exeC:\Windows\System\rMcPSPG.exe2⤵
- Executes dropped EXE
PID:4272
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.9MB
MD55eeb518a0bf49a287ed6e4a37e9a6393
SHA1ea81a7636fe7e0ead21d83f07fde6a2f129565a2
SHA2560969b169c8228d3cc95db53c0c98595dbf683fa928f242dc924b2af33d256b3c
SHA51272be76a12bf15bda98f1fdfee35c0a924f70b1a85e1316a05fb8a51803b9c3c7a9ba05f706ed62ece0caf96574bd5eb8d2924c8433fef1be945b813c20462233
-
Filesize
5.9MB
MD56dd7741abf3096dbfcdd6c2eb1b5961a
SHA13864ea72f05c48d85b59d82a3eb7994b5e0379fc
SHA256c42710ee2ff02f8bb7545ce8e76d4a90f4cd6b7e7ba40f89ba06ff5ca48a8d65
SHA5125aaef38a7269ea29ce50b752215d98c4a27bc63304bdb082e165e7a8173fcd95cd992964ba60b1f4bf32e58f39e9b2153de427a8fa95e6c7866838e467397eea
-
Filesize
5.9MB
MD5b8fe8021059ef86ce27b1863b6c28299
SHA1a196d022d70c48048faeae39a487fc6545405f21
SHA256759e45e86062e07e3d1bb5bbcfd1a83924bcbf578e40aeaec770f3ba6f2d8067
SHA512e58b5007e640276f9478476229ee4b75724fab7592fa410c7b4675cf9d87da1f39c4254c7428c5e9abccb7d6002539cdb44506fc674cb9787536d15e25468ef6
-
Filesize
5.9MB
MD57bb94a6ea0131e68bd88ff9c25b187b5
SHA1b08bd7538bcb0bcbf422c06309b2802f4dbce412
SHA25699024e9c4db4f40e3a4521da9e6ae7b0fae1bd84138d36fedaf2dafa2e6bfeae
SHA512c6920b62f2a130c12010b94d77469353517cb1e3c3301654f3f3001c95237e7e4133f0de85588c606ae2ee34976d2c93714dc33c9ae1d3298cfd4798854f27f9
-
Filesize
5.9MB
MD5550120875671f890a4ea662831265824
SHA1204738d247674c97e0a347a67f454d463ed4876f
SHA256a36287ad0e92a7e7aae5080c8b9d1916d70df9dc62a436a363ac4f2b58c62d7b
SHA5124486dec1570af95585c602491281d34fe11d96edefc1124bdbd9e675bef4849571d22e874870fad49fcd62c49c61f02d2141036eb8f6995d78071f23d1e0b5ee
-
Filesize
5.9MB
MD51f3791030ef40202fe068836d719d19b
SHA1b511af863c819b972c32bfe956c72c3f9562b0c4
SHA256291541a32fa2abd2877f2a4179560f173818080df638e6d70a4c67b760c370a5
SHA5123bfca4d4e305893b6a2d50b21c9ef677965f8f2321ca0ba03c7bb376bed770cc1f14a32ae73f83ce25477564a4bd3e4014c75d6de2e98cf2f0dd1a7a87701870
-
Filesize
5.9MB
MD56800773e453055fcda4b31c23a3945a3
SHA1713bebbb5ac41f8da26b478a4fc51db2b37b44f0
SHA256261f194628330a7c7e92b384c6ab98afd2d92d515c3bfec957aa2c401611322d
SHA51204c1ab576076d25a84b3394fe21aa77fd473421792cb100afd71160c0757ef636131bfd141a79668d408e13e9fe66dea45f1b5c429135fd39953f904e53e7891
-
Filesize
5.9MB
MD5822f9f3cc499d44dffe9a906a2e5d600
SHA12d252f1522e8552ea70875151a5fe0823db7fac9
SHA256ff53794e5c8564bc3cbf370c7d7f483776d1550cf5432d0dab01c14c7925d14e
SHA51247e977d07c56e545c1f9603cbe9d4c1c0d5b2c163ca1cd9b2e66f9770e0feae8c4188be08a93bfb51ef7ed813bf9559fd4284798db88694ef08505f56f06bf82
-
Filesize
5.9MB
MD538b655b4a96626e602a9c603e8a66568
SHA15ad45020bd2600952b2a2b926290dd12b54a50ca
SHA256219be4e2db3c20c592e3bd9a7c9d5bc0e2d4ec12145a14606cefa4932128788e
SHA5126fd305b41c92acc231fd08c5df3cdc91d8a0c5b65505b4a2e5509e8ba54fcbdf55436ce98a81ec481c6e5510ba8bfa35e7887bd1dff31a5d29e09c9e8ce15b01
-
Filesize
5.9MB
MD574131ed021d4d0709203a29a8a18205a
SHA1dc2f24573fb02ffaa617827a0d893ee90587be0c
SHA25632d73e41e46f108068e970281098bbb454f5e6e3c97cd7ee915519071b990b78
SHA5127a465fec4a7790fa7c03daa9fc3cd616efb030716bd89f089fc183580042665d3db5102dea72d5026e6026e3cf1e163f99f8ae835986ff4385e01918b9b4e8cd
-
Filesize
5.9MB
MD51cb73e0e030f69d272d2f84cf8f72260
SHA1b9461dceb67c1f6fbdc54fe73950c2f47c4dac9c
SHA256d19fe256206fbf5ea0316794f7e917678443980d9d4259d469feb0d0aaab94af
SHA512c20e4348787b83f853be977ff8de6b9ad66db402dcb06eeffe05f9962f78ee9b236ac92f144e213f7d4e028b5b396eceb61d5251e3d096de28ac06cf6c13917b
-
Filesize
5.9MB
MD59d90675f800392dd64a4af071ad7e4d6
SHA1ee8f8c92708f0b78c04e8abbaa8283b6b60e01fd
SHA25697bd65eb302ca5cfeefaf896c261d3b91c1c24268c32de6744cc278751edea1f
SHA5122696496b2d7c3ca1d8167b0685efeee07e8d8d3ad54e3945bfd29eedffa1f14213de1cd1121a7f3fbe173f8f862940d46810db1efceb9f28891927de0fcece0e
-
Filesize
5.9MB
MD5673d3615a9965f9f6e0e3893919230db
SHA150c76845c47bcc635d316efc0face599b91bba06
SHA2561053b694c3985f4c28e4ea88705ba866fc2e87b143f97bdaf79900911c9acf82
SHA5123ecd8e1bbfb08d8d407480fd1c8d0178203c0f47cdd09550f036d9dd59ec9bb227cc892d1762a4ebe674407a1b599a14817a19bf26d9269523be5a0b9e06ab98
-
Filesize
5.9MB
MD5500f2eae957a16434e362a10b4e3ed3d
SHA1dcb4971651db37aebe9b9956c66dbddb1ab003f1
SHA2565a46993cf5dbe71fb1a83ebfb04514a595b04813fdbaa4ea4290249fb53507fc
SHA5124aba41481c8e9addbff2efe4c94c20dcb55c599b36449a7cef3ddfed8b765fe07489731f8c6fd731c461864aea8181a212d2cc61c886b6f0dc92b6c46594eea5
-
Filesize
5.9MB
MD57b1e75f86946b150fca8bafa6f8de029
SHA17fff503f653d840b722516e365fe4bcea69f0189
SHA256b201040d41b015bf2f1644f3dd520d45aea9bbaa112dd2040f19f5ee46b48b3e
SHA51297a44fa90f28317d13fc90e8591beb7b5cf9783f03cfc67516294ed79c69a07bb05308313d3ca0e89ceb938819da85471db7a2fa54c08a215bdb2a9fd0cf7e81
-
Filesize
5.9MB
MD59855e8d6659e18e0d4c7cd0d9980e835
SHA197445fa3946e5743463358ffbf2371b53239de4c
SHA25659f2752a38e931986457620eeca7e0219aec5ff089e503e735ab0036aae3e1df
SHA51262c1a235bdcbba17f5c20fb4e70eed31644647a4e5a20842ef40e00b34923c9c01b6c73b70c010a4958fc50ccb6bc808d771acaa3675e8e6eda9af4c1f355db0
-
Filesize
5.9MB
MD543a03ec5f8a68f140a376416c718bb51
SHA187d2734972925b443025a0928ca5692ef5830116
SHA256da4c88d08e9f5aeeb23052603ec180e282863111879c06926891bb06a557eb00
SHA512d49d9a9a18118349a6280164b40c827087701e6deaff93d6f8aca81f6f55e38c0034318717d0452f795b2c94fe93cb9933c84f085a7036b8da0853c25c78b353
-
Filesize
5.9MB
MD5fc062775c33b18aafb2401d687ad07c6
SHA11511b34ecbb68f5c7289298438bc4048c6f3ac33
SHA25687f1d27547a621d1cf0cda4c6bd6b6d9c5523a60aca8b0f6d8e94b6d04971a25
SHA5121d64e66cb6709087901d09d96f82d7044ef422f8b8d11bde734bde104c9760b92d84e432e96f7ad6b9b384c27c39ee8c03b37c75143c253a6d334ad9b1000c5a
-
Filesize
5.9MB
MD5158ef8cb6824ed73709cc63a4052e1f6
SHA1471a3c2cddccfd8993c38e29e070ccdff3a496e1
SHA25649c3354322befc96bf97b0201727f5b759f940e517a87a66fe4dae43d81ee42c
SHA512d6fdf3d955d65ec71252560c60c6bec9905507244a9a8f0e61cd30e9947329d85b4c4046750b31bf008209843a0144e1a0a50fdd418cef79216c0c6056bd08c7
-
Filesize
5.9MB
MD53359cc29cefc8e589a0b8d4d21298afe
SHA1b946a9047ca56c08189df93cc04d1db8194e1b8d
SHA2562a160fc2fe38be6ba78c3c03c771f6135c710572f92f06b219ab6d44786f1031
SHA512cd3646364a95397b2db7e25397ead88443fe5e356e9d0c2b4eb3e7f7eafa2b93b24b43d7476432b61927c1aec83570a8f2fcec0ee32d2289422599a6693ff586
-
Filesize
5.9MB
MD5516346cf310121bd1fe112cd8dde28af
SHA183d591472ce67be074ac5da93cd1aa8ee4767a5e
SHA256491a14795e670e65e2401b8954cf08b9a6be5241be42563ebb9956909daa20a0
SHA5121130dfead1953c7f825b0b1181d066e8f58d26a6e19961129014096fc9ff3b2dffe1137345cf9fe19e7bab164735627c8b1e4a158fbd1280dc3f13fd2eaa4afb