Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 20:50
Behavioral task
behavioral1
Sample
2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20241023-en
General
-
Target
2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.2MB
-
MD5
1186d6539ffc3d6a0a829fc017e61925
-
SHA1
0c35522eee8f04e7eee57ea26fc7fcc16c10046c
-
SHA256
1db2892e336cb6cc05edd56624c908b3c5fac16fa911ec0c920865ed1b56e080
-
SHA512
96009a78993004a66076b4faa4a87cf4c9243d999f7378cd5625a6592db55a77b57b3a7f23b5d582841e6842add4b83cad633bebdbfc87519ca2a16274e7f707
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lw:RWWBibf56utgpPFotBER/mQ32lUM
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral2/files/0x000a000000023c87-5.dat cobalt_reflective_dll behavioral2/files/0x0008000000023c8a-11.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c8e-19.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c8f-34.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c92-35.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c95-53.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c9b-87.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c9a-83.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c9d-95.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c9c-111.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c9f-117.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c9e-115.dat cobalt_reflective_dll behavioral2/files/0x0008000000023c8b-113.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c98-94.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c96-90.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c97-81.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c99-75.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c94-67.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c93-47.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c91-40.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c90-32.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Cobaltstrike family
-
Xmrig family
-
XMRig Miner payload 45 IoCs
resource yara_rule behavioral2/memory/2840-88-0x00007FF717CE0000-0x00007FF718031000-memory.dmp xmrig behavioral2/memory/4932-63-0x00007FF713900000-0x00007FF713C51000-memory.dmp xmrig behavioral2/memory/2800-57-0x00007FF7A5470000-0x00007FF7A57C1000-memory.dmp xmrig behavioral2/memory/2456-18-0x00007FF7E05A0000-0x00007FF7E08F1000-memory.dmp xmrig behavioral2/memory/2836-120-0x00007FF669950000-0x00007FF669CA1000-memory.dmp xmrig behavioral2/memory/8-119-0x00007FF67DA00000-0x00007FF67DD51000-memory.dmp xmrig behavioral2/memory/4860-123-0x00007FF65D1C0000-0x00007FF65D511000-memory.dmp xmrig behavioral2/memory/3148-124-0x00007FF73B3D0000-0x00007FF73B721000-memory.dmp xmrig behavioral2/memory/3024-122-0x00007FF77A470000-0x00007FF77A7C1000-memory.dmp xmrig behavioral2/memory/1564-121-0x00007FF7C1F00000-0x00007FF7C2251000-memory.dmp xmrig behavioral2/memory/3816-126-0x00007FF6BCFB0000-0x00007FF6BD301000-memory.dmp xmrig behavioral2/memory/2772-127-0x00007FF7A6310000-0x00007FF7A6661000-memory.dmp xmrig behavioral2/memory/4424-125-0x00007FF7EA4A0000-0x00007FF7EA7F1000-memory.dmp xmrig behavioral2/memory/3192-135-0x00007FF7DBEC0000-0x00007FF7DC211000-memory.dmp xmrig behavioral2/memory/1224-136-0x00007FF69FA80000-0x00007FF69FDD1000-memory.dmp xmrig behavioral2/memory/620-132-0x00007FF75B050000-0x00007FF75B3A1000-memory.dmp xmrig behavioral2/memory/1572-131-0x00007FF78B920000-0x00007FF78BC71000-memory.dmp xmrig behavioral2/memory/964-129-0x00007FF6BEC40000-0x00007FF6BEF91000-memory.dmp xmrig behavioral2/memory/1696-128-0x00007FF7865C0000-0x00007FF786911000-memory.dmp xmrig behavioral2/memory/2936-141-0x00007FF79F2A0000-0x00007FF79F5F1000-memory.dmp xmrig behavioral2/memory/1332-138-0x00007FF747380000-0x00007FF7476D1000-memory.dmp xmrig behavioral2/memory/4216-144-0x00007FF78D6D0000-0x00007FF78DA21000-memory.dmp xmrig behavioral2/memory/1696-150-0x00007FF7865C0000-0x00007FF786911000-memory.dmp xmrig behavioral2/memory/1696-151-0x00007FF7865C0000-0x00007FF786911000-memory.dmp xmrig behavioral2/memory/964-200-0x00007FF6BEC40000-0x00007FF6BEF91000-memory.dmp xmrig behavioral2/memory/2456-202-0x00007FF7E05A0000-0x00007FF7E08F1000-memory.dmp xmrig behavioral2/memory/1572-220-0x00007FF78B920000-0x00007FF78BC71000-memory.dmp xmrig behavioral2/memory/2800-222-0x00007FF7A5470000-0x00007FF7A57C1000-memory.dmp xmrig behavioral2/memory/4932-225-0x00007FF713900000-0x00007FF713C51000-memory.dmp xmrig behavioral2/memory/620-226-0x00007FF75B050000-0x00007FF75B3A1000-memory.dmp xmrig behavioral2/memory/3192-230-0x00007FF7DBEC0000-0x00007FF7DC211000-memory.dmp xmrig behavioral2/memory/1224-229-0x00007FF69FA80000-0x00007FF69FDD1000-memory.dmp xmrig behavioral2/memory/4860-237-0x00007FF65D1C0000-0x00007FF65D511000-memory.dmp xmrig behavioral2/memory/3148-238-0x00007FF73B3D0000-0x00007FF73B721000-memory.dmp xmrig behavioral2/memory/3024-242-0x00007FF77A470000-0x00007FF77A7C1000-memory.dmp xmrig behavioral2/memory/2936-246-0x00007FF79F2A0000-0x00007FF79F5F1000-memory.dmp xmrig behavioral2/memory/4424-248-0x00007FF7EA4A0000-0x00007FF7EA7F1000-memory.dmp xmrig behavioral2/memory/8-234-0x00007FF67DA00000-0x00007FF67DD51000-memory.dmp xmrig behavioral2/memory/1332-241-0x00007FF747380000-0x00007FF7476D1000-memory.dmp xmrig behavioral2/memory/2840-233-0x00007FF717CE0000-0x00007FF718031000-memory.dmp xmrig behavioral2/memory/1564-250-0x00007FF7C1F00000-0x00007FF7C2251000-memory.dmp xmrig behavioral2/memory/3816-256-0x00007FF6BCFB0000-0x00007FF6BD301000-memory.dmp xmrig behavioral2/memory/4216-258-0x00007FF78D6D0000-0x00007FF78DA21000-memory.dmp xmrig behavioral2/memory/2772-254-0x00007FF7A6310000-0x00007FF7A6661000-memory.dmp xmrig behavioral2/memory/2836-252-0x00007FF669950000-0x00007FF669CA1000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
pid Process 964 fAJnIiA.exe 2456 lnlPSYH.exe 1572 kFHIdur.exe 2800 wytfNWY.exe 620 wpSpmYc.exe 4932 tBHgyVV.exe 3192 rODOqTs.exe 1224 LpBnPeT.exe 3024 HDoXTfu.exe 1332 LINfpDO.exe 4860 PmAFxhm.exe 3148 HwxUapY.exe 2936 FNzKuNi.exe 2840 nUvfIgQ.exe 4424 AWITRAT.exe 4216 xIkJCQy.exe 3816 WLylXZD.exe 8 NFlPCSN.exe 2772 QoqRLAc.exe 2836 UznBarl.exe 1564 tQajpgz.exe -
resource yara_rule behavioral2/memory/1696-0-0x00007FF7865C0000-0x00007FF786911000-memory.dmp upx behavioral2/files/0x000a000000023c87-5.dat upx behavioral2/files/0x0008000000023c8a-11.dat upx behavioral2/files/0x0007000000023c8e-19.dat upx behavioral2/files/0x0007000000023c8f-34.dat upx behavioral2/files/0x0007000000023c92-35.dat upx behavioral2/memory/620-37-0x00007FF75B050000-0x00007FF75B3A1000-memory.dmp upx behavioral2/files/0x0007000000023c95-53.dat upx behavioral2/files/0x0007000000023c9b-87.dat upx behavioral2/files/0x0007000000023c9a-83.dat upx behavioral2/files/0x0007000000023c9d-95.dat upx behavioral2/files/0x0007000000023c9c-111.dat upx behavioral2/files/0x0007000000023c9f-117.dat upx behavioral2/files/0x0007000000023c9e-115.dat upx behavioral2/files/0x0008000000023c8b-113.dat upx behavioral2/memory/4216-100-0x00007FF78D6D0000-0x00007FF78DA21000-memory.dmp upx behavioral2/files/0x0007000000023c98-94.dat upx behavioral2/files/0x0007000000023c96-90.dat upx behavioral2/memory/2840-88-0x00007FF717CE0000-0x00007FF718031000-memory.dmp upx behavioral2/files/0x0007000000023c97-81.dat upx behavioral2/memory/2936-78-0x00007FF79F2A0000-0x00007FF79F5F1000-memory.dmp upx behavioral2/files/0x0007000000023c99-75.dat upx behavioral2/memory/1332-74-0x00007FF747380000-0x00007FF7476D1000-memory.dmp upx behavioral2/files/0x0007000000023c94-67.dat upx behavioral2/memory/4932-63-0x00007FF713900000-0x00007FF713C51000-memory.dmp upx behavioral2/memory/2800-57-0x00007FF7A5470000-0x00007FF7A57C1000-memory.dmp upx behavioral2/memory/1224-48-0x00007FF69FA80000-0x00007FF69FDD1000-memory.dmp upx behavioral2/files/0x0007000000023c93-47.dat upx behavioral2/memory/3192-44-0x00007FF7DBEC0000-0x00007FF7DC211000-memory.dmp upx behavioral2/files/0x0007000000023c91-40.dat upx behavioral2/files/0x0007000000023c90-32.dat upx behavioral2/memory/1572-26-0x00007FF78B920000-0x00007FF78BC71000-memory.dmp upx behavioral2/memory/2456-18-0x00007FF7E05A0000-0x00007FF7E08F1000-memory.dmp upx behavioral2/memory/964-13-0x00007FF6BEC40000-0x00007FF6BEF91000-memory.dmp upx behavioral2/memory/2836-120-0x00007FF669950000-0x00007FF669CA1000-memory.dmp upx behavioral2/memory/8-119-0x00007FF67DA00000-0x00007FF67DD51000-memory.dmp upx behavioral2/memory/4860-123-0x00007FF65D1C0000-0x00007FF65D511000-memory.dmp upx behavioral2/memory/3148-124-0x00007FF73B3D0000-0x00007FF73B721000-memory.dmp upx behavioral2/memory/3024-122-0x00007FF77A470000-0x00007FF77A7C1000-memory.dmp upx behavioral2/memory/1564-121-0x00007FF7C1F00000-0x00007FF7C2251000-memory.dmp upx behavioral2/memory/3816-126-0x00007FF6BCFB0000-0x00007FF6BD301000-memory.dmp upx behavioral2/memory/2772-127-0x00007FF7A6310000-0x00007FF7A6661000-memory.dmp upx behavioral2/memory/4424-125-0x00007FF7EA4A0000-0x00007FF7EA7F1000-memory.dmp upx behavioral2/memory/3192-135-0x00007FF7DBEC0000-0x00007FF7DC211000-memory.dmp upx behavioral2/memory/1224-136-0x00007FF69FA80000-0x00007FF69FDD1000-memory.dmp upx behavioral2/memory/620-132-0x00007FF75B050000-0x00007FF75B3A1000-memory.dmp upx behavioral2/memory/1572-131-0x00007FF78B920000-0x00007FF78BC71000-memory.dmp upx behavioral2/memory/964-129-0x00007FF6BEC40000-0x00007FF6BEF91000-memory.dmp upx behavioral2/memory/1696-128-0x00007FF7865C0000-0x00007FF786911000-memory.dmp upx behavioral2/memory/2936-141-0x00007FF79F2A0000-0x00007FF79F5F1000-memory.dmp upx behavioral2/memory/1332-138-0x00007FF747380000-0x00007FF7476D1000-memory.dmp upx behavioral2/memory/4216-144-0x00007FF78D6D0000-0x00007FF78DA21000-memory.dmp upx behavioral2/memory/1696-150-0x00007FF7865C0000-0x00007FF786911000-memory.dmp upx behavioral2/memory/1696-151-0x00007FF7865C0000-0x00007FF786911000-memory.dmp upx behavioral2/memory/964-200-0x00007FF6BEC40000-0x00007FF6BEF91000-memory.dmp upx behavioral2/memory/2456-202-0x00007FF7E05A0000-0x00007FF7E08F1000-memory.dmp upx behavioral2/memory/1572-220-0x00007FF78B920000-0x00007FF78BC71000-memory.dmp upx behavioral2/memory/2800-222-0x00007FF7A5470000-0x00007FF7A57C1000-memory.dmp upx behavioral2/memory/4932-225-0x00007FF713900000-0x00007FF713C51000-memory.dmp upx behavioral2/memory/620-226-0x00007FF75B050000-0x00007FF75B3A1000-memory.dmp upx behavioral2/memory/3192-230-0x00007FF7DBEC0000-0x00007FF7DC211000-memory.dmp upx behavioral2/memory/1224-229-0x00007FF69FA80000-0x00007FF69FDD1000-memory.dmp upx behavioral2/memory/4860-237-0x00007FF65D1C0000-0x00007FF65D511000-memory.dmp upx behavioral2/memory/3148-238-0x00007FF73B3D0000-0x00007FF73B721000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\System\PmAFxhm.exe 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\UznBarl.exe 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\tQajpgz.exe 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\LINfpDO.exe 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\HwxUapY.exe 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\FNzKuNi.exe 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\WLylXZD.exe 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\QoqRLAc.exe 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\wytfNWY.exe 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\wpSpmYc.exe 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\tBHgyVV.exe 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\nUvfIgQ.exe 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\AWITRAT.exe 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\fAJnIiA.exe 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\kFHIdur.exe 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\rODOqTs.exe 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\LpBnPeT.exe 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\HDoXTfu.exe 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\xIkJCQy.exe 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\NFlPCSN.exe 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\lnlPSYH.exe 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1696 wrote to memory of 964 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 84 PID 1696 wrote to memory of 964 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 84 PID 1696 wrote to memory of 2456 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 85 PID 1696 wrote to memory of 2456 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 85 PID 1696 wrote to memory of 1572 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 86 PID 1696 wrote to memory of 1572 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 86 PID 1696 wrote to memory of 620 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 87 PID 1696 wrote to memory of 620 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 87 PID 1696 wrote to memory of 2800 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 88 PID 1696 wrote to memory of 2800 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 88 PID 1696 wrote to memory of 4932 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 89 PID 1696 wrote to memory of 4932 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 89 PID 1696 wrote to memory of 3192 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 90 PID 1696 wrote to memory of 3192 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 90 PID 1696 wrote to memory of 1224 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 91 PID 1696 wrote to memory of 1224 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 91 PID 1696 wrote to memory of 3024 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 92 PID 1696 wrote to memory of 3024 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 92 PID 1696 wrote to memory of 1332 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 93 PID 1696 wrote to memory of 1332 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 93 PID 1696 wrote to memory of 4860 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 94 PID 1696 wrote to memory of 4860 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 94 PID 1696 wrote to memory of 3148 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 95 PID 1696 wrote to memory of 3148 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 95 PID 1696 wrote to memory of 2936 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 96 PID 1696 wrote to memory of 2936 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 96 PID 1696 wrote to memory of 2840 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 97 PID 1696 wrote to memory of 2840 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 97 PID 1696 wrote to memory of 4424 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 98 PID 1696 wrote to memory of 4424 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 98 PID 1696 wrote to memory of 4216 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 99 PID 1696 wrote to memory of 4216 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 99 PID 1696 wrote to memory of 3816 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 100 PID 1696 wrote to memory of 3816 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 100 PID 1696 wrote to memory of 8 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 101 PID 1696 wrote to memory of 8 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 101 PID 1696 wrote to memory of 2772 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 102 PID 1696 wrote to memory of 2772 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 102 PID 1696 wrote to memory of 2836 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 103 PID 1696 wrote to memory of 2836 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 103 PID 1696 wrote to memory of 1564 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 104 PID 1696 wrote to memory of 1564 1696 2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-11_1186d6539ffc3d6a0a829fc017e61925_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\System\fAJnIiA.exeC:\Windows\System\fAJnIiA.exe2⤵
- Executes dropped EXE
PID:964
-
-
C:\Windows\System\lnlPSYH.exeC:\Windows\System\lnlPSYH.exe2⤵
- Executes dropped EXE
PID:2456
-
-
C:\Windows\System\kFHIdur.exeC:\Windows\System\kFHIdur.exe2⤵
- Executes dropped EXE
PID:1572
-
-
C:\Windows\System\wpSpmYc.exeC:\Windows\System\wpSpmYc.exe2⤵
- Executes dropped EXE
PID:620
-
-
C:\Windows\System\wytfNWY.exeC:\Windows\System\wytfNWY.exe2⤵
- Executes dropped EXE
PID:2800
-
-
C:\Windows\System\tBHgyVV.exeC:\Windows\System\tBHgyVV.exe2⤵
- Executes dropped EXE
PID:4932
-
-
C:\Windows\System\rODOqTs.exeC:\Windows\System\rODOqTs.exe2⤵
- Executes dropped EXE
PID:3192
-
-
C:\Windows\System\LpBnPeT.exeC:\Windows\System\LpBnPeT.exe2⤵
- Executes dropped EXE
PID:1224
-
-
C:\Windows\System\HDoXTfu.exeC:\Windows\System\HDoXTfu.exe2⤵
- Executes dropped EXE
PID:3024
-
-
C:\Windows\System\LINfpDO.exeC:\Windows\System\LINfpDO.exe2⤵
- Executes dropped EXE
PID:1332
-
-
C:\Windows\System\PmAFxhm.exeC:\Windows\System\PmAFxhm.exe2⤵
- Executes dropped EXE
PID:4860
-
-
C:\Windows\System\HwxUapY.exeC:\Windows\System\HwxUapY.exe2⤵
- Executes dropped EXE
PID:3148
-
-
C:\Windows\System\FNzKuNi.exeC:\Windows\System\FNzKuNi.exe2⤵
- Executes dropped EXE
PID:2936
-
-
C:\Windows\System\nUvfIgQ.exeC:\Windows\System\nUvfIgQ.exe2⤵
- Executes dropped EXE
PID:2840
-
-
C:\Windows\System\AWITRAT.exeC:\Windows\System\AWITRAT.exe2⤵
- Executes dropped EXE
PID:4424
-
-
C:\Windows\System\xIkJCQy.exeC:\Windows\System\xIkJCQy.exe2⤵
- Executes dropped EXE
PID:4216
-
-
C:\Windows\System\WLylXZD.exeC:\Windows\System\WLylXZD.exe2⤵
- Executes dropped EXE
PID:3816
-
-
C:\Windows\System\NFlPCSN.exeC:\Windows\System\NFlPCSN.exe2⤵
- Executes dropped EXE
PID:8
-
-
C:\Windows\System\QoqRLAc.exeC:\Windows\System\QoqRLAc.exe2⤵
- Executes dropped EXE
PID:2772
-
-
C:\Windows\System\UznBarl.exeC:\Windows\System\UznBarl.exe2⤵
- Executes dropped EXE
PID:2836
-
-
C:\Windows\System\tQajpgz.exeC:\Windows\System\tQajpgz.exe2⤵
- Executes dropped EXE
PID:1564
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD505bf22c05b6659e4ae52a619c89f55c7
SHA177205d5f92fc7b848577c02ff05456de6b9571fa
SHA2562ff454a72baa6d17ceffa3b0c332556df2a6b0967ccf61052f1b3ac1d3a5b879
SHA5122b738e52fac40137bb95c233078f47e494136a37ff9982a86525a81ec2adcc52b234fb1a2fd6a9084e968ceb36b49b03d609b85ae1aabbbebae5e5c2c6102cab
-
Filesize
5.2MB
MD5d30bc1becb77cfa6505c3160e4562e0a
SHA1941a7132a16a52e08a4f53dd3f6edbe724f9a21f
SHA2562b6dbd174a4ecfb277efd547e85893067ec49ee6238d798054c90bd157cae5cc
SHA51265fb80755a697e4887133b716cfee48c25a5d0a1b58472fd6a005a07209e00d7c9263af06385722b1d4c77ef828e5bd79f606aa6443fcdd308e8b57d202cb78a
-
Filesize
5.2MB
MD54f1bb2d795fd6ba64ef40affcfb05044
SHA1510693b37544e0f8c081487fa7406ecea38a580a
SHA2566afb876655557eaac1ed0a2075581b9218a1029441ad13cb52a3ef8d9979b957
SHA512a0928329925b1e330b18c69582da64fe070765943741eedc6856ab6e058a4c3db0c5f59b88cd07f8c0c4a975942086c367bff277a70204372c793a2e5ab3f739
-
Filesize
5.2MB
MD5863b228a27406a0c5b75a72f18ef6693
SHA1ad1dc767c0c2cbc0645630effabc2de493a647e9
SHA25665480e7b143c7574115c038abe31564db7b1b355d79152801406042911ede820
SHA512cae926e28defbba81b063100420a21a2dbb331b7cdcdc379659f59dc9ec4ef7794ea9a68f935e2c7515dff177fb3c14dae19962a941178c0cc78aeb66fd80b11
-
Filesize
5.2MB
MD5609a4fa93bb2427a9eb26de8bc852efc
SHA193d177f9309f6b1a42f6c7eb920132872ff338c2
SHA2563be656a57d872ce8bca28c51167a09b698a6fb70168bbf847abf0b830bd46397
SHA512337abbb28dcbe9a7144645ceff2e5e502823bcab538b6fec5f0ab284e289e39bc17e6e51b178e9a358e09eddbd7c14bd2df2674727a296f47164387a43fff08d
-
Filesize
5.2MB
MD5acc224846936b1cfad0f282fe721b424
SHA1d13c345ad054379778c47d47dee17380876a4b94
SHA256f8f6408f5ee4271ffd96855e4a9d5240bb2f7155840b85e30eaa56f242a8e76f
SHA512059b1d86a0f1d039eca585dc316f73d718cef3631be04a05ea2832e0b934ca3e155e4bd870ff98d21f2efd2e23b4c77440fbd3f3589a07fba15affba5a105458
-
Filesize
5.2MB
MD5ea85e98749997fa158e487c064dbfcd8
SHA1120a199024644938c360d75f2901bc4d0bcb9130
SHA2565e2971e99fce3f402b8f39add3dd7f46489ae999063e06f0c1f0a19c1bff6331
SHA512b32fe4df91ef5b5a5a7672ea372cc1a4c74e87462de38596ddc6c35ed40ccd475d815d28d83c4447e2c64e298e1e08192bcff5b896fafac81018336bf29c4e48
-
Filesize
5.2MB
MD5730ae65015b2f9b2f18f35d2465c798b
SHA1445f5e786ecb3b0f4f0507c330757926edaac394
SHA2566191046fabd37cc7c2edffdc78247ec0c128c45563c69dd9f49f1e61821fb052
SHA512c16fba05acb1ebe4151417724e698da348d2c929e7960cd0516e410221b5380cb1eabdffdad976b9d4fb8aa416860c02d52e63db85b0695dddce0c20f12b1a38
-
Filesize
5.2MB
MD51228ece728f93a03ff85eda1c1097022
SHA18b35d2b8d83a2bc0a5174484711c0a9f33b613b8
SHA256344703073666c49a414736dae26c05724632bd07a25d191cbda13b3ee980e4aa
SHA5121c14291791bf8ac4aee38b6ee16c1f86fe1156e7dbdc39717582cdce3b8daf8d7e0fda53feb0c377e6ee2ebd7741727222ff0b0960f05725b5b0e98d4562cd4d
-
Filesize
5.2MB
MD5d1548a5a1ed32fb601ec816e1cdb5d32
SHA1418fd16cd3ba729a92e6081b003967014621bb42
SHA2561e96cfcb16502d1b89ae34646902f4cb300d849f49dc094dbf29e0aaeb44b31b
SHA5122a717e6aab34b900af022c0af0c8d2c578832167bfea3be6812c95991174c30f1bdf0b6c7e6749103121bff2bc980958653a5868cb0137f89959285d6fe81891
-
Filesize
5.2MB
MD5b88b777914f9d82f83316a6fdb4d4a4f
SHA1e2ed94194764797697d4e10a869119937b17a172
SHA256b21963cbab1e745949b5d696027903d5a6366300371b37102dced5dd3759d292
SHA512e8465bf277ccdfd660eb63b0ec297d6bab6a7bffe2013fd81cbc19ec11cf339bbb0674c7bd4c079f2ed971d748dfc48fbc34a96f97549aba1649002e9ba4b785
-
Filesize
5.2MB
MD581566a349baa7b135ce7967c79be8228
SHA1da4eea1dde77817ba59ee6745395edc3d1b1aee1
SHA2560fdb2ce5de4d05c849953af27ef7fdf8a21c79e356d16ac60bbba64426f87a09
SHA512650e8700f1775a52f0ff8e7ba6d5e8e19cea66306c915c04f79a3edf3dd6033cd1851f583f93bd3d6c3d7994d5163f8f9f946663b96b8c705c3c1f8695102522
-
Filesize
5.2MB
MD5b07bb5a9fa2c21a21df3404c7e6a1584
SHA167a039ecf52a685bd3ad1ee6706e440e5d00368a
SHA256ea1178137b3d3bc94db65acde88603683f03f4cf6514ef6c097090e856d5f6b1
SHA512daa078fbad6064df727c6b317f80531aaf699a8d20de3290911b7cfff79cd7bb7c600b6b64020c6ee8b22cb38aca7754b5fca3b46f13413a0d62664dd1994725
-
Filesize
5.2MB
MD5f777338764346b184595901f895d8135
SHA10668da30395e0c1f7fac094f0b26c34b60d2c2d3
SHA2569d12fe95447f4ad56be25d3a5cbb20669cfbb894f181f9b62b51950a18e750eb
SHA512009bd33679ce5921547a7b4e936e0f32a465fd9e112c19a87d356699f52c5bd0897e204f9e1cf91871c9e937fd446b17288651122d3dafc7ea5a94341f4c4c89
-
Filesize
5.2MB
MD55b12959c768fa423ec3f4dc417e07a15
SHA11aaccc0987addf62fc3d51df931f5a74bad173d5
SHA2563cc9083e1cd7f2eb1260ac77cabb895b8a3c7d55e241a20e8acfbd4b1bcae0d8
SHA51281856d4b96114cee685ec5e0adac71c902dc9bf65987a96349710b6331b197bdd9cd9ccc42d46bce3d33458c669000d2decef4a4dc8c7f6ec679b6705a9b0887
-
Filesize
5.2MB
MD56142ff6b8526f2b15e5820e39c07c302
SHA163acede2ff05ba12d5d49a383578bb4432316cdb
SHA256db0fe316eec73e9476ef571251a5d10a6db85eb9043fdf21a96062438ae06f73
SHA51298ac0047fbfad191e09623a7ef574deb1855908b0f2eb519c53094576685fbef313d48ebe51ac72ed1fd1f78de177a79dd1bc111c2ee786dd8de73c9072e9c65
-
Filesize
5.2MB
MD5aab5e6ab008a62049894868d5e1addeb
SHA1fd9a8fb16417c5ef460b7affbaf45af761aecd0e
SHA256ac4e67ea3f123c03de62992d428b978227e6c5c4794af060c39a62d9694804b2
SHA5127e342a7098f8210d9e177467da063e6146c6bc8ed2c05f04735f006db81aa776339f595984cb3e75a9ad7be8ee049bcce140dbe65982de734699f61ea733dc15
-
Filesize
5.2MB
MD57e11f0cef1ce0574573ad8299be462d4
SHA115af1b7152c5f4f69db4a4e55c08bd941564a3a5
SHA25635ac473f3657722b95e1d3064beac7f0e441f6300e9b42c568794015d5e9df50
SHA51251d8413ed50027b9a67ae882c21accff19ae411a69390521c6c555b981950bb0e44809b6cb4618f8723639193a2baebdf97ebff2f8be813a67ffc57ba765323a
-
Filesize
5.2MB
MD57dd5996c795bd3f375bf000fa656563d
SHA19829f697b5f86e6760d490782b85ac1d01e15e2d
SHA2569084bad23cc9d1d86f72a72120ce0e9b4293edf8cab9578e40ca84d3c780fd94
SHA512a3369001e57e476491afa148d07e6d3b146748994282b3fa773cdbf9cc4e1625f6d5060db559559bb624acf93ef6742d79c9879f96867033b1321d29fa28d397
-
Filesize
5.2MB
MD51677225b96f2e6c0cd7d3dbf1a8ab940
SHA13cbedd1bfad44d23c3284c119c032a3ab97694b5
SHA2566aae1ee7e9bd8322eec5617f71dae27fd62f8a40037408316592b2247a68b899
SHA51213215c3bb94086f861c98af046f4e4f3cc26dec0da825b6a3c2af2729ddae41422e8ba82ee5ba260598bdaf3c66452523d2a9d4924e919d0a46f549cc760f229
-
Filesize
5.2MB
MD54b63ec367458010d5d1df4c684da7f1e
SHA12afb1c04a6c7e145693c30706feeed3dd0115c2b
SHA2564891390b0441c4401b182e5a27541b76993d4945da09d84c4d4d2d1aa87bbb9f
SHA512f6aeb4adfe31cc6cb2c98b9991fd9fc4a7904a7546d70b3744eb34176ba5427a14a1bfa390b21c90f9b9a90724fba531bcc81c0fd39a459d91af81d1db75e547