Analysis
-
max time kernel
134s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 09:34
Behavioral task
behavioral1
Sample
2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240903-en
General
-
Target
2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
47b30f457ec8364e5ef92afef97ea8cf
-
SHA1
10e65c0c8ea92a4d66eddea73a2ab71b19aad1f0
-
SHA256
fde2eda4206a59d209ed2d1863abc7ac65a897b1e63852848d439f9488b6ca98
-
SHA512
6714d9278a5b7b9e51c2e3b24b18694b478bc24a8b825b1c6148160549a9ba3c3da379025c387935fc19fef6d206993b364f0ad798798951c7865a2c578d84cf
-
SSDEEP
98304:BemTLkNdfE0pZrT56utgpPFotBER/mQ32lUY:Q+u56utgpPF8u/7Y
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral1/files/0x000700000001211a-6.dat cobalt_reflective_dll behavioral1/files/0x0007000000016cd1-8.dat cobalt_reflective_dll behavioral1/files/0x0009000000016cfc-18.dat cobalt_reflective_dll behavioral1/files/0x0007000000016d36-22.dat cobalt_reflective_dll behavioral1/files/0x0007000000016d9a-39.dat cobalt_reflective_dll behavioral1/files/0x0005000000019244-90.dat cobalt_reflective_dll behavioral1/files/0x00050000000191ff-83.dat cobalt_reflective_dll behavioral1/files/0x00060000000190e0-72.dat cobalt_reflective_dll behavioral1/files/0x000600000001903b-66.dat cobalt_reflective_dll behavioral1/files/0x0006000000018c26-57.dat cobalt_reflective_dll behavioral1/files/0x0008000000016dd1-52.dat cobalt_reflective_dll behavioral1/files/0x0007000000016d96-50.dat cobalt_reflective_dll behavioral1/files/0x0006000000018792-48.dat cobalt_reflective_dll behavioral1/files/0x0005000000019256-104.dat cobalt_reflective_dll behavioral1/files/0x000500000001922c-103.dat cobalt_reflective_dll behavioral1/files/0x00050000000191d4-102.dat cobalt_reflective_dll behavioral1/files/0x0007000000016d46-101.dat cobalt_reflective_dll behavioral1/files/0x00060000000190ce-81.dat cobalt_reflective_dll behavioral1/files/0x0006000000018f53-79.dat cobalt_reflective_dll behavioral1/files/0x0006000000018c1a-78.dat cobalt_reflective_dll behavioral1/files/0x0007000000016d3e-37.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 45 IoCs
resource yara_rule behavioral1/memory/1704-0-0x000000013FD40000-0x0000000140094000-memory.dmp xmrig behavioral1/files/0x000700000001211a-6.dat xmrig behavioral1/files/0x0007000000016cd1-8.dat xmrig behavioral1/files/0x0009000000016cfc-18.dat xmrig behavioral1/memory/1704-21-0x0000000002330000-0x0000000002684000-memory.dmp xmrig behavioral1/files/0x0007000000016d36-22.dat xmrig behavioral1/memory/2544-13-0x000000013FF50000-0x00000001402A4000-memory.dmp xmrig behavioral1/memory/2372-20-0x000000013F910000-0x000000013FC64000-memory.dmp xmrig behavioral1/files/0x0007000000016d9a-39.dat xmrig behavioral1/files/0x0005000000019244-90.dat xmrig behavioral1/files/0x00050000000191ff-83.dat xmrig behavioral1/memory/2760-75-0x000000013F850000-0x000000013FBA4000-memory.dmp xmrig behavioral1/files/0x00060000000190e0-72.dat xmrig behavioral1/files/0x000600000001903b-66.dat xmrig behavioral1/memory/1704-135-0x000000013FD40000-0x0000000140094000-memory.dmp xmrig behavioral1/files/0x0006000000018c26-57.dat xmrig behavioral1/files/0x0008000000016dd1-52.dat xmrig behavioral1/files/0x0007000000016d96-50.dat xmrig behavioral1/files/0x0006000000018792-48.dat xmrig behavioral1/memory/1704-114-0x000000013F740000-0x000000013FA94000-memory.dmp xmrig behavioral1/memory/2316-113-0x000000013F640000-0x000000013F994000-memory.dmp xmrig behavioral1/memory/316-112-0x000000013F850000-0x000000013FBA4000-memory.dmp xmrig behavioral1/memory/2780-111-0x000000013F0B0000-0x000000013F404000-memory.dmp xmrig behavioral1/memory/2816-108-0x000000013F8D0000-0x000000013FC24000-memory.dmp xmrig behavioral1/files/0x0005000000019256-104.dat xmrig behavioral1/files/0x000500000001922c-103.dat xmrig behavioral1/files/0x00050000000191d4-102.dat xmrig behavioral1/files/0x0007000000016d46-101.dat xmrig behavioral1/memory/2896-82-0x000000013FAA0000-0x000000013FDF4000-memory.dmp xmrig behavioral1/files/0x00060000000190ce-81.dat xmrig behavioral1/files/0x0006000000018f53-79.dat xmrig behavioral1/files/0x0006000000018c1a-78.dat xmrig behavioral1/memory/2060-25-0x000000013FB30000-0x000000013FE84000-memory.dmp xmrig behavioral1/memory/2736-46-0x000000013F250000-0x000000013F5A4000-memory.dmp xmrig behavioral1/files/0x0007000000016d3e-37.dat xmrig behavioral1/memory/2544-137-0x000000013FF50000-0x00000001402A4000-memory.dmp xmrig behavioral1/memory/2372-138-0x000000013F910000-0x000000013FC64000-memory.dmp xmrig behavioral1/memory/2060-139-0x000000013FB30000-0x000000013FE84000-memory.dmp xmrig behavioral1/memory/2736-140-0x000000013F250000-0x000000013F5A4000-memory.dmp xmrig behavioral1/memory/2760-141-0x000000013F850000-0x000000013FBA4000-memory.dmp xmrig behavioral1/memory/2896-142-0x000000013FAA0000-0x000000013FDF4000-memory.dmp xmrig behavioral1/memory/316-144-0x000000013F850000-0x000000013FBA4000-memory.dmp xmrig behavioral1/memory/2780-145-0x000000013F0B0000-0x000000013F404000-memory.dmp xmrig behavioral1/memory/2316-146-0x000000013F640000-0x000000013F994000-memory.dmp xmrig behavioral1/memory/2816-143-0x000000013F8D0000-0x000000013FC24000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
pid Process 2544 osKeYLO.exe 2372 SETZdbm.exe 2060 erLAUGv.exe 2736 HNyiDNg.exe 2760 xGujcxE.exe 2896 MyYUvcr.exe 2816 RxvzMEx.exe 2780 BJNaqnK.exe 316 SNsulEf.exe 2316 KrdyHYG.exe 2876 mbIvfeR.exe 2184 eCvRqqR.exe 1788 uuspbzd.exe 1780 HWXDwQF.exe 2740 UFBRVtw.exe 2904 whsznKG.exe 2660 pHuloeT.exe 2656 OmHDkYA.exe 3068 NozrNDT.exe 984 wwvzilj.exe 2024 opcaorf.exe -
Loads dropped DLL 21 IoCs
pid Process 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe -
resource yara_rule behavioral1/memory/1704-0-0x000000013FD40000-0x0000000140094000-memory.dmp upx behavioral1/files/0x000700000001211a-6.dat upx behavioral1/files/0x0007000000016cd1-8.dat upx behavioral1/files/0x0009000000016cfc-18.dat upx behavioral1/files/0x0007000000016d36-22.dat upx behavioral1/memory/2544-13-0x000000013FF50000-0x00000001402A4000-memory.dmp upx behavioral1/memory/2372-20-0x000000013F910000-0x000000013FC64000-memory.dmp upx behavioral1/files/0x0007000000016d9a-39.dat upx behavioral1/files/0x0005000000019244-90.dat upx behavioral1/files/0x00050000000191ff-83.dat upx behavioral1/memory/2760-75-0x000000013F850000-0x000000013FBA4000-memory.dmp upx behavioral1/files/0x00060000000190e0-72.dat upx behavioral1/files/0x000600000001903b-66.dat upx behavioral1/memory/1704-135-0x000000013FD40000-0x0000000140094000-memory.dmp upx behavioral1/files/0x0006000000018c26-57.dat upx behavioral1/files/0x0008000000016dd1-52.dat upx behavioral1/files/0x0007000000016d96-50.dat upx behavioral1/files/0x0006000000018792-48.dat upx behavioral1/memory/2316-113-0x000000013F640000-0x000000013F994000-memory.dmp upx behavioral1/memory/316-112-0x000000013F850000-0x000000013FBA4000-memory.dmp upx behavioral1/memory/2780-111-0x000000013F0B0000-0x000000013F404000-memory.dmp upx behavioral1/memory/2816-108-0x000000013F8D0000-0x000000013FC24000-memory.dmp upx behavioral1/files/0x0005000000019256-104.dat upx behavioral1/files/0x000500000001922c-103.dat upx behavioral1/files/0x00050000000191d4-102.dat upx behavioral1/files/0x0007000000016d46-101.dat upx behavioral1/memory/2896-82-0x000000013FAA0000-0x000000013FDF4000-memory.dmp upx behavioral1/files/0x00060000000190ce-81.dat upx behavioral1/files/0x0006000000018f53-79.dat upx behavioral1/files/0x0006000000018c1a-78.dat upx behavioral1/memory/2060-25-0x000000013FB30000-0x000000013FE84000-memory.dmp upx behavioral1/memory/2736-46-0x000000013F250000-0x000000013F5A4000-memory.dmp upx behavioral1/files/0x0007000000016d3e-37.dat upx behavioral1/memory/2544-137-0x000000013FF50000-0x00000001402A4000-memory.dmp upx behavioral1/memory/2372-138-0x000000013F910000-0x000000013FC64000-memory.dmp upx behavioral1/memory/2060-139-0x000000013FB30000-0x000000013FE84000-memory.dmp upx behavioral1/memory/2736-140-0x000000013F250000-0x000000013F5A4000-memory.dmp upx behavioral1/memory/2760-141-0x000000013F850000-0x000000013FBA4000-memory.dmp upx behavioral1/memory/2896-142-0x000000013FAA0000-0x000000013FDF4000-memory.dmp upx behavioral1/memory/316-144-0x000000013F850000-0x000000013FBA4000-memory.dmp upx behavioral1/memory/2780-145-0x000000013F0B0000-0x000000013F404000-memory.dmp upx behavioral1/memory/2316-146-0x000000013F640000-0x000000013F994000-memory.dmp upx behavioral1/memory/2816-143-0x000000013F8D0000-0x000000013FC24000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\System\eCvRqqR.exe 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\uuspbzd.exe 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\opcaorf.exe 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\HWXDwQF.exe 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\HNyiDNg.exe 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\xGujcxE.exe 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\whsznKG.exe 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\pHuloeT.exe 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\osKeYLO.exe 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\RxvzMEx.exe 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\OmHDkYA.exe 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\SNsulEf.exe 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\erLAUGv.exe 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\UFBRVtw.exe 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\MyYUvcr.exe 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\NozrNDT.exe 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\wwvzilj.exe 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\SETZdbm.exe 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\KrdyHYG.exe 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\mbIvfeR.exe 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\BJNaqnK.exe 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2544 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 31 PID 1704 wrote to memory of 2544 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 31 PID 1704 wrote to memory of 2544 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 31 PID 1704 wrote to memory of 2372 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 32 PID 1704 wrote to memory of 2372 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 32 PID 1704 wrote to memory of 2372 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 32 PID 1704 wrote to memory of 2060 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 33 PID 1704 wrote to memory of 2060 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 33 PID 1704 wrote to memory of 2060 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 33 PID 1704 wrote to memory of 2316 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 34 PID 1704 wrote to memory of 2316 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 34 PID 1704 wrote to memory of 2316 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 34 PID 1704 wrote to memory of 2736 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 35 PID 1704 wrote to memory of 2736 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 35 PID 1704 wrote to memory of 2736 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 35 PID 1704 wrote to memory of 2876 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 36 PID 1704 wrote to memory of 2876 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 36 PID 1704 wrote to memory of 2876 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 36 PID 1704 wrote to memory of 2760 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 37 PID 1704 wrote to memory of 2760 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 37 PID 1704 wrote to memory of 2760 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 37 PID 1704 wrote to memory of 2740 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 38 PID 1704 wrote to memory of 2740 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 38 PID 1704 wrote to memory of 2740 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 38 PID 1704 wrote to memory of 2896 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 39 PID 1704 wrote to memory of 2896 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 39 PID 1704 wrote to memory of 2896 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 39 PID 1704 wrote to memory of 2904 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 40 PID 1704 wrote to memory of 2904 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 40 PID 1704 wrote to memory of 2904 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 40 PID 1704 wrote to memory of 2816 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 41 PID 1704 wrote to memory of 2816 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 41 PID 1704 wrote to memory of 2816 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 41 PID 1704 wrote to memory of 2660 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 42 PID 1704 wrote to memory of 2660 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 42 PID 1704 wrote to memory of 2660 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 42 PID 1704 wrote to memory of 2780 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 43 PID 1704 wrote to memory of 2780 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 43 PID 1704 wrote to memory of 2780 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 43 PID 1704 wrote to memory of 2656 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 44 PID 1704 wrote to memory of 2656 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 44 PID 1704 wrote to memory of 2656 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 44 PID 1704 wrote to memory of 316 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 45 PID 1704 wrote to memory of 316 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 45 PID 1704 wrote to memory of 316 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 45 PID 1704 wrote to memory of 3068 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 46 PID 1704 wrote to memory of 3068 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 46 PID 1704 wrote to memory of 3068 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 46 PID 1704 wrote to memory of 2184 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 47 PID 1704 wrote to memory of 2184 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 47 PID 1704 wrote to memory of 2184 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 47 PID 1704 wrote to memory of 984 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 48 PID 1704 wrote to memory of 984 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 48 PID 1704 wrote to memory of 984 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 48 PID 1704 wrote to memory of 1788 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 49 PID 1704 wrote to memory of 1788 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 49 PID 1704 wrote to memory of 1788 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 49 PID 1704 wrote to memory of 2024 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 50 PID 1704 wrote to memory of 2024 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 50 PID 1704 wrote to memory of 2024 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 50 PID 1704 wrote to memory of 1780 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 51 PID 1704 wrote to memory of 1780 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 51 PID 1704 wrote to memory of 1780 1704 2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-29_47b30f457ec8364e5ef92afef97ea8cf_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\System\osKeYLO.exeC:\Windows\System\osKeYLO.exe2⤵
- Executes dropped EXE
PID:2544
-
-
C:\Windows\System\SETZdbm.exeC:\Windows\System\SETZdbm.exe2⤵
- Executes dropped EXE
PID:2372
-
-
C:\Windows\System\erLAUGv.exeC:\Windows\System\erLAUGv.exe2⤵
- Executes dropped EXE
PID:2060
-
-
C:\Windows\System\KrdyHYG.exeC:\Windows\System\KrdyHYG.exe2⤵
- Executes dropped EXE
PID:2316
-
-
C:\Windows\System\HNyiDNg.exeC:\Windows\System\HNyiDNg.exe2⤵
- Executes dropped EXE
PID:2736
-
-
C:\Windows\System\mbIvfeR.exeC:\Windows\System\mbIvfeR.exe2⤵
- Executes dropped EXE
PID:2876
-
-
C:\Windows\System\xGujcxE.exeC:\Windows\System\xGujcxE.exe2⤵
- Executes dropped EXE
PID:2760
-
-
C:\Windows\System\UFBRVtw.exeC:\Windows\System\UFBRVtw.exe2⤵
- Executes dropped EXE
PID:2740
-
-
C:\Windows\System\MyYUvcr.exeC:\Windows\System\MyYUvcr.exe2⤵
- Executes dropped EXE
PID:2896
-
-
C:\Windows\System\whsznKG.exeC:\Windows\System\whsznKG.exe2⤵
- Executes dropped EXE
PID:2904
-
-
C:\Windows\System\RxvzMEx.exeC:\Windows\System\RxvzMEx.exe2⤵
- Executes dropped EXE
PID:2816
-
-
C:\Windows\System\pHuloeT.exeC:\Windows\System\pHuloeT.exe2⤵
- Executes dropped EXE
PID:2660
-
-
C:\Windows\System\BJNaqnK.exeC:\Windows\System\BJNaqnK.exe2⤵
- Executes dropped EXE
PID:2780
-
-
C:\Windows\System\OmHDkYA.exeC:\Windows\System\OmHDkYA.exe2⤵
- Executes dropped EXE
PID:2656
-
-
C:\Windows\System\SNsulEf.exeC:\Windows\System\SNsulEf.exe2⤵
- Executes dropped EXE
PID:316
-
-
C:\Windows\System\NozrNDT.exeC:\Windows\System\NozrNDT.exe2⤵
- Executes dropped EXE
PID:3068
-
-
C:\Windows\System\eCvRqqR.exeC:\Windows\System\eCvRqqR.exe2⤵
- Executes dropped EXE
PID:2184
-
-
C:\Windows\System\wwvzilj.exeC:\Windows\System\wwvzilj.exe2⤵
- Executes dropped EXE
PID:984
-
-
C:\Windows\System\uuspbzd.exeC:\Windows\System\uuspbzd.exe2⤵
- Executes dropped EXE
PID:1788
-
-
C:\Windows\System\opcaorf.exeC:\Windows\System\opcaorf.exe2⤵
- Executes dropped EXE
PID:2024
-
-
C:\Windows\System\HWXDwQF.exeC:\Windows\System\HWXDwQF.exe2⤵
- Executes dropped EXE
PID:1780
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.9MB
MD5015e50180cfb505ab7152972a7f1c3c3
SHA180e3db3eaa11d6f2fe6cf651d725adbc646ccd11
SHA256dc3b5424e23dbe275b81564f4ea43bcc298bd467712701bf504126cfc7bb8fb5
SHA5128a841e31a8e4db6ed51d381fb72f80328bd8a9635b7a184e682f45abf72eeb3e1b2bc172bc81145d47f55ed41734b482abe143aa9ab5fec77fa9223c9e7b906e
-
Filesize
5.9MB
MD57d472f27e3421282fab2e3b833c18b8d
SHA16d7b4fb89b13ad65938361fded8bd9c279d5af42
SHA256348f66cafdcbcdfad31c823e1c94ecbd4cde2951ac6773628e3e8258b4c26622
SHA5120b75ee8c1167c25671e646cb2ce5652b13b23154877d89133dc76ed4bce79a8b0e4a7ec84528891ebd4bffb39536f0cdddb70069654e3f1796edcdee144ee94f
-
Filesize
5.9MB
MD53653acd91c8e1502d56dda58a623e697
SHA188e959d88fb5c742daffc50fbd16790cbabb137a
SHA256e47a847ec6e621dd0ae50fc03f8cbcff795e6faf73e714a667ccac63f8661763
SHA512a36b3c5e6b54f14eb994b5015416931f0fc88572bcc2f3bf45aa8f7fa3e28bdb72b4f505bea1a5b1160e95e695b27719055dfba236f8f652943328dc8d71574c
-
Filesize
5.9MB
MD52b9c002cdef80e327cbf4dc364712461
SHA1f17a65b1a46e981f3c719addd17726b66f85abdb
SHA2568b6a9ffe92757aea4f781b699bbf1340508833fd89383cccd7a44cafdf3bb421
SHA512c620916b0e7170b5a96ea2745b7b37a1b08295a9e669e502d20055ceff5c597a4b14e0edb744c800f6322e177657151758997451f17bf49215a5a07d7b63a1ac
-
Filesize
5.9MB
MD599f794f5e0fcdb84941d1cd77ce0257d
SHA143914c2fa52fcbda6360d9c3a345bc8dbdf8ab13
SHA2560ed175697960ea747c0a2228a9e923c12d7d1abb4e8405ae5be84eaeb398573c
SHA512b7ed926161e3f2a0d7a150e94b06ec309ee3372db9ccfa5dd2d4cd49b6f1d2a836e518f35bb9be6e6fda995f700e202c5d1563c19936c7397fbb227180231d25
-
Filesize
5.9MB
MD520163b9d8c57b5e947817de1573bc3e6
SHA199119e88c1a1afbe92f57f64aaf2c3d3567685a8
SHA256908008a05ed13bc545cb847c12e843f25cfda203042650c212ba2f2edddb39e9
SHA512c8973126cfc462848ec194e1a1cb077c409e4858d2d41d7485b489eb4cf7ea749dbaa519b2b5105d9e528e1c784a6a5fe980139f97928ab1ecefb9af0f5247a8
-
Filesize
5.9MB
MD5613a13c5f5bee1c330f6234b456580ac
SHA1ac1ebd6a71d46d5663057b699737c17c7680f6c7
SHA256023cc5b85ad3473201217aeeab9ee7dce406f9914fdbb4e6a4bbd7c78eb55126
SHA512da775fea0f303f01f0a8d0ea9e07d2698c9344d4d9a2436af9d157c80e6cd631a0c1b7a19fdfb7b6d5d411aa64a8e5adea535569f710613e2893e02a0031d779
-
Filesize
5.9MB
MD54e5030f01c2f1c8f3a5714fda6f44f6d
SHA10b9bc0944367eafa06915e16e44a6869d6ca1e61
SHA256cd7d6f53d0ba9a69b8bfd23c7685fe61a644aaac4dcc760f1ea783efc17f81e2
SHA51281f8768a9921dd4659d41faf01b7d4a274d9492e928480dd982b51c67123792ecae51b6a80325d7e0dea6fa47b9a4135372752d1b53b9ffe18d76eb9975d08f4
-
Filesize
5.9MB
MD5f6a0c1a943a7c4a9ddfbb5dcdd5e8924
SHA1c2817734852c7ca219b037f523da1097c6f74fff
SHA256483835ac7b8bf5febb2612165b94b8a6768ccdc1905283b3ae44a001e6c6f279
SHA512d49f1fec060202634c282aaa15f4f116d5d3258029b7b1af202e79f17236191408b45656fac72930043bfd776eeea16fdc7e89661ef63ae781d6ea6e4d2aaf20
-
Filesize
5.9MB
MD56cad914727341e712ba1411ea445cf2b
SHA17afa29b1407b83e11586c534837d8fcf0015889e
SHA256661c4506624caaaddc12ade5410d0fac1d28846df77f337d6689422ec90d9fc9
SHA512d5fcf37ef46f574f8eff26f995dbf65f0f06e12df7ed9f821d5b456d947284b32ee72583c25197e8ecefffa7f3e9dff433f804c6f15c01993b2db51a446df866
-
Filesize
5.9MB
MD50f237d4332ae57bf6e928f6fa5d65dba
SHA177822b19593dbd796db6ff4938c2ce765a5635ed
SHA25686f843e8de910daf107189a4d5b180c1e436c80947e43e3f65aff440a9490bdd
SHA51265ae91aec3ddfbf806854a463260120cdf21725d8daed1035056d918ba2ae70b6326047add55480a48a6370503ea93862fc7b7be58b77fd47070c799fc81951f
-
Filesize
5.9MB
MD5fd76e7fda9eb9847c5f4b034c15621a5
SHA18ccd0e7bb9fd9d988e32a650a9238e1825929cee
SHA2568c77c12b298ceb14c33ec116d63b06ac6349dc67107ceb9b633973440f2d23a2
SHA512aec8c1c10d50f65aca37a5013ca68dc37fc707bf534f64135f4040cfc8372b485e7b13c318e515884bbc1dedcfaa1726aad5040805afa4c9e57ca1c24475a043
-
Filesize
5.9MB
MD52ba0d8d20d229661d4b7afa04af90029
SHA10dcb2288606397ab10c6c9e35ecf0f9b6a6f17b3
SHA25609cda084ead98afdec7a66cefaa50d196708182ff9453a4c142743a8cdf82e83
SHA5124aaf98f0062bd5d4e32f141a0bf5741adfdb1abf200d59bd1042cbebd2d69d7039a797c73810417971b3e7d3fe3b86dce0d8e3018343c449280249fa35962bb7
-
Filesize
5.9MB
MD559145cd1164ec74d5c2bf5265f5dd596
SHA18057ab2dd1333331b591af69d3534ccc5120306b
SHA256863cbaa91ca376e7421bbc572487e5c52023ec28a8bda011fcf3158139783442
SHA512c6e6c7e4e29287ed740081bad1e8f9a7f07ca41ee239da9cbc52fcf7402e4a494b424540bd78343b39050662b77aa258070d06e381123386d03279a0a8c898d9
-
Filesize
5.9MB
MD56857099361eefe95d14908108cc3fd07
SHA111ac9e2409de5d3429ae716f737dc3dac0ad64f4
SHA256746da8d5089b1a1b7670ad97b2bdd0e5d0ea7bca1d7e55ed37cf8ff453537a66
SHA5123bc82ffc02d01d0e8f5805412951bf13c46abbdfd856d2318d78fd1d273bb6315c6e043a4617466916858578a52b5a853ca5d7bba34228d0c1dc2abeef47c9c6
-
Filesize
5.9MB
MD5ed006b28cddfdb14bef53f9b8395a831
SHA146ec07a4ee99d3220323f4dd58d5127c567e5017
SHA25661b6f8720b2f4ae7d6622badf302027f250808f29e395c781a0731a195a5e03e
SHA512eb81f23d5fb7e74503bd5139be2983b8f23d6764f5cbc9265ec9c3af73e473dc88a41d7924e43154f02f19fe37b2ab42c19a4fa33b1795d1078f7374dc78249f
-
Filesize
5.9MB
MD5ec5471c863a0dac9b4b8b1816fce1491
SHA175a51ac83c5ce50740bedba565e67f6120c9e019
SHA2561b7d12f9a52d73ed029835d6f75f94e0648beaba6e5310734cd7d4e87236fa89
SHA512f393fae07010d195accaaf1d903ab8858371fbf5a1dbb47d58d8ea635a9246e0e6a755e731abbc6c0ff21b24f31a145e102fa9549275f0dc0d583e457883c1a7
-
Filesize
5.9MB
MD54392975d1713d31895d1b6d504b7a617
SHA179468b25ed1617406224d804a7a3c6f7ee92c3d2
SHA256635e47bc0a2bfe3c9a812f962b503cad13485d02581aa9ea4dfc240e90ac8a1a
SHA51238fe991c4d0cbd8842eea665a135f92b3fbe1da4734c69dc36e5a4246c4827ec2952bf67d12c15611999b06bfd4b0919b7618052b9f3714b0107193e32777384
-
Filesize
5.9MB
MD5b5a5a331142612134bbe54a13dae778a
SHA17dd892bf53d670da13cff5e15d1c782db5f71e9a
SHA25643cfae24b083a0688e9fa65753c14bd6771ebdf848a702e8935cebbf8195dd8f
SHA5129fba3a6a0bd0c8fa71362d3357a58b26243fcac1a64d2a0d83cbd39d5f89ee63c8e10347899142192c9e4eeceba4d774aaa9bee8be840d2660455bb06e81d918
-
Filesize
5.9MB
MD567bba03bf6e1856432664fad41efd317
SHA1137b9f7ed0520ee224674336c6b2605d93caaed5
SHA2569275b3028089d537d3a1aad1491daeae6eccccd2d7a765287ddf988110ab2eee
SHA512c23af67417db5fe5bd8b88da66b0d60b2fca34752c1791bcad92687bc4b125c2cddb02f6f609def25a9a50a5f9d3334e008fd9f1401dfd34b42cf192f5c0db68
-
Filesize
5.9MB
MD568488d4795d085fcbcd6781afe490bc0
SHA1b3b138c9bfda340380c959512206a3b4a374d3f2
SHA2567530b5e7ac57b920d237003b906404d7298d0c1faf3dd8056eb5ce94729c47dc
SHA51288a430a34bcd87209a2004e7c04af891e40a5aab1fe84eed8e6d32ed18f5885842e80b7f97120ffcdd70da15e40b6e5c889227c4b5af9d387df41c5f83efde79