Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 03:44
Behavioral task
behavioral1
Sample
2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240729-en
General
-
Target
2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.7MB
-
MD5
7c2d9039386e17e2420393b5bcf60669
-
SHA1
62e50c7fc99c877973e2220bd5fb6b93fdb66f9f
-
SHA256
749422a937a8cc1664d64ee7581550c952b55b73b6c54ce81c5264ceee10a963
-
SHA512
2be5f15522a32083b2148e170514170199c6d1fd3bbbbf8f55e04652dd8192661ca7d52c7d6575ca0c60cdd6f9f83a31911bd8c114a721e57e0aaf5060a35a2e
-
SSDEEP
98304:4emTLkNdfE0pZaJ56utgpPFotBER/mQ32lUr:j+R56utgpPF8u/7r
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral2/files/0x000c000000023ba7-5.dat cobalt_reflective_dll behavioral2/files/0x0008000000023c8f-10.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c93-11.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c95-23.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c96-29.dat cobalt_reflective_dll behavioral2/files/0x0008000000023c90-36.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c97-40.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c98-47.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c9a-52.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c9b-60.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c9c-65.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c9d-70.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c9e-78.dat cobalt_reflective_dll behavioral2/files/0x0007000000023c9f-84.dat cobalt_reflective_dll behavioral2/files/0x0007000000023ca0-90.dat cobalt_reflective_dll behavioral2/files/0x0007000000023ca2-95.dat cobalt_reflective_dll behavioral2/files/0x0007000000023ca4-108.dat cobalt_reflective_dll behavioral2/files/0x0007000000023ca3-105.dat cobalt_reflective_dll behavioral2/files/0x0007000000023ca5-114.dat cobalt_reflective_dll behavioral2/files/0x0007000000023ca7-124.dat cobalt_reflective_dll behavioral2/files/0x0007000000023ca6-120.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Cobaltstrike family
-
Xmrig family
-
XMRig Miner payload 43 IoCs
resource yara_rule behavioral2/memory/4844-0-0x00007FF6B4190000-0x00007FF6B44DD000-memory.dmp xmrig behavioral2/files/0x000c000000023ba7-5.dat xmrig behavioral2/memory/3088-7-0x00007FF6F61F0000-0x00007FF6F653D000-memory.dmp xmrig behavioral2/files/0x0008000000023c8f-10.dat xmrig behavioral2/files/0x0007000000023c93-11.dat xmrig behavioral2/memory/4480-13-0x00007FF69B260000-0x00007FF69B5AD000-memory.dmp xmrig behavioral2/memory/4532-19-0x00007FF7D5790000-0x00007FF7D5ADD000-memory.dmp xmrig behavioral2/files/0x0007000000023c95-23.dat xmrig behavioral2/memory/3412-25-0x00007FF7D1DE0000-0x00007FF7D212D000-memory.dmp xmrig behavioral2/files/0x0007000000023c96-29.dat xmrig behavioral2/memory/4544-31-0x00007FF7D17C0000-0x00007FF7D1B0D000-memory.dmp xmrig behavioral2/files/0x0008000000023c90-36.dat xmrig behavioral2/files/0x0007000000023c97-40.dat xmrig behavioral2/memory/2796-42-0x00007FF7105F0000-0x00007FF71093D000-memory.dmp xmrig behavioral2/memory/60-38-0x00007FF705E90000-0x00007FF7061DD000-memory.dmp xmrig behavioral2/files/0x0007000000023c98-47.dat xmrig behavioral2/memory/4648-49-0x00007FF68E800000-0x00007FF68EB4D000-memory.dmp xmrig behavioral2/files/0x0007000000023c9a-52.dat xmrig behavioral2/memory/920-54-0x00007FF7971A0000-0x00007FF7974ED000-memory.dmp xmrig behavioral2/files/0x0007000000023c9b-60.dat xmrig behavioral2/files/0x0007000000023c9c-65.dat xmrig behavioral2/memory/2924-67-0x00007FF6B4DC0000-0x00007FF6B510D000-memory.dmp xmrig behavioral2/memory/1152-61-0x00007FF68C420000-0x00007FF68C76D000-memory.dmp xmrig behavioral2/files/0x0007000000023c9d-70.dat xmrig behavioral2/memory/536-72-0x00007FF7F6110000-0x00007FF7F645D000-memory.dmp xmrig behavioral2/files/0x0007000000023c9e-78.dat xmrig behavioral2/memory/2400-79-0x00007FF659B40000-0x00007FF659E8D000-memory.dmp xmrig behavioral2/files/0x0007000000023c9f-84.dat xmrig behavioral2/memory/2744-85-0x00007FF755EF0000-0x00007FF75623D000-memory.dmp xmrig behavioral2/files/0x0007000000023ca0-90.dat xmrig behavioral2/files/0x0007000000023ca2-95.dat xmrig behavioral2/memory/2456-109-0x00007FF77B5E0000-0x00007FF77B92D000-memory.dmp xmrig behavioral2/files/0x0007000000023ca4-108.dat xmrig behavioral2/memory/5040-106-0x00007FF6ABE00000-0x00007FF6AC14D000-memory.dmp xmrig behavioral2/files/0x0007000000023ca3-105.dat xmrig behavioral2/memory/4296-99-0x00007FF6696D0000-0x00007FF669A1D000-memory.dmp xmrig behavioral2/memory/908-91-0x00007FF618E70000-0x00007FF6191BD000-memory.dmp xmrig behavioral2/files/0x0007000000023ca5-114.dat xmrig behavioral2/files/0x0007000000023ca7-124.dat xmrig behavioral2/memory/628-126-0x00007FF762430000-0x00007FF76277D000-memory.dmp xmrig behavioral2/memory/4716-121-0x00007FF73BB30000-0x00007FF73BE7D000-memory.dmp xmrig behavioral2/files/0x0007000000023ca6-120.dat xmrig behavioral2/memory/2480-115-0x00007FF6629E0000-0x00007FF662D2D000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
pid Process 3088 InbLYPk.exe 4480 RAFXGyl.exe 4532 SyIaqmV.exe 3412 rSeVpEI.exe 4544 CuKdZzx.exe 60 SYGJqUM.exe 2796 hsQpQlm.exe 4648 WOKXUWo.exe 920 jMYEoqg.exe 1152 RBrSvEd.exe 2924 dAfaCXY.exe 536 kyTpwHH.exe 2400 sXYFRmx.exe 2744 wpGoeOG.exe 908 VPBnZwQ.exe 4296 FdEZjOJ.exe 5040 ELCOCYJ.exe 2456 kTEgMDw.exe 2480 PDccWlw.exe 4716 sMaFiUO.exe 628 eRhyUfm.exe -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\System\eRhyUfm.exe 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\InbLYPk.exe 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\RAFXGyl.exe 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\SYGJqUM.exe 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\FdEZjOJ.exe 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ELCOCYJ.exe 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\SyIaqmV.exe 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\RBrSvEd.exe 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\kTEgMDw.exe 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\PDccWlw.exe 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\sMaFiUO.exe 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\rSeVpEI.exe 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\CuKdZzx.exe 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\WOKXUWo.exe 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\dAfaCXY.exe 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\VPBnZwQ.exe 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\hsQpQlm.exe 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\jMYEoqg.exe 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\kyTpwHH.exe 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\sXYFRmx.exe 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\wpGoeOG.exe 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4844 wrote to memory of 3088 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 83 PID 4844 wrote to memory of 3088 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 83 PID 4844 wrote to memory of 4480 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 84 PID 4844 wrote to memory of 4480 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 84 PID 4844 wrote to memory of 4532 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 85 PID 4844 wrote to memory of 4532 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 85 PID 4844 wrote to memory of 3412 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 86 PID 4844 wrote to memory of 3412 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 86 PID 4844 wrote to memory of 4544 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 87 PID 4844 wrote to memory of 4544 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 87 PID 4844 wrote to memory of 60 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 88 PID 4844 wrote to memory of 60 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 88 PID 4844 wrote to memory of 2796 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 89 PID 4844 wrote to memory of 2796 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 89 PID 4844 wrote to memory of 4648 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 90 PID 4844 wrote to memory of 4648 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 90 PID 4844 wrote to memory of 920 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 91 PID 4844 wrote to memory of 920 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 91 PID 4844 wrote to memory of 1152 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 92 PID 4844 wrote to memory of 1152 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 92 PID 4844 wrote to memory of 2924 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 93 PID 4844 wrote to memory of 2924 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 93 PID 4844 wrote to memory of 536 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 94 PID 4844 wrote to memory of 536 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 94 PID 4844 wrote to memory of 2400 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 95 PID 4844 wrote to memory of 2400 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 95 PID 4844 wrote to memory of 2744 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 96 PID 4844 wrote to memory of 2744 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 96 PID 4844 wrote to memory of 908 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 97 PID 4844 wrote to memory of 908 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 97 PID 4844 wrote to memory of 4296 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 98 PID 4844 wrote to memory of 4296 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 98 PID 4844 wrote to memory of 5040 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 99 PID 4844 wrote to memory of 5040 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 99 PID 4844 wrote to memory of 2456 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 100 PID 4844 wrote to memory of 2456 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 100 PID 4844 wrote to memory of 2480 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 101 PID 4844 wrote to memory of 2480 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 101 PID 4844 wrote to memory of 4716 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 102 PID 4844 wrote to memory of 4716 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 102 PID 4844 wrote to memory of 628 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 103 PID 4844 wrote to memory of 628 4844 2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-21_7c2d9039386e17e2420393b5bcf60669_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\System\InbLYPk.exeC:\Windows\System\InbLYPk.exe2⤵
- Executes dropped EXE
PID:3088
-
-
C:\Windows\System\RAFXGyl.exeC:\Windows\System\RAFXGyl.exe2⤵
- Executes dropped EXE
PID:4480
-
-
C:\Windows\System\SyIaqmV.exeC:\Windows\System\SyIaqmV.exe2⤵
- Executes dropped EXE
PID:4532
-
-
C:\Windows\System\rSeVpEI.exeC:\Windows\System\rSeVpEI.exe2⤵
- Executes dropped EXE
PID:3412
-
-
C:\Windows\System\CuKdZzx.exeC:\Windows\System\CuKdZzx.exe2⤵
- Executes dropped EXE
PID:4544
-
-
C:\Windows\System\SYGJqUM.exeC:\Windows\System\SYGJqUM.exe2⤵
- Executes dropped EXE
PID:60
-
-
C:\Windows\System\hsQpQlm.exeC:\Windows\System\hsQpQlm.exe2⤵
- Executes dropped EXE
PID:2796
-
-
C:\Windows\System\WOKXUWo.exeC:\Windows\System\WOKXUWo.exe2⤵
- Executes dropped EXE
PID:4648
-
-
C:\Windows\System\jMYEoqg.exeC:\Windows\System\jMYEoqg.exe2⤵
- Executes dropped EXE
PID:920
-
-
C:\Windows\System\RBrSvEd.exeC:\Windows\System\RBrSvEd.exe2⤵
- Executes dropped EXE
PID:1152
-
-
C:\Windows\System\dAfaCXY.exeC:\Windows\System\dAfaCXY.exe2⤵
- Executes dropped EXE
PID:2924
-
-
C:\Windows\System\kyTpwHH.exeC:\Windows\System\kyTpwHH.exe2⤵
- Executes dropped EXE
PID:536
-
-
C:\Windows\System\sXYFRmx.exeC:\Windows\System\sXYFRmx.exe2⤵
- Executes dropped EXE
PID:2400
-
-
C:\Windows\System\wpGoeOG.exeC:\Windows\System\wpGoeOG.exe2⤵
- Executes dropped EXE
PID:2744
-
-
C:\Windows\System\VPBnZwQ.exeC:\Windows\System\VPBnZwQ.exe2⤵
- Executes dropped EXE
PID:908
-
-
C:\Windows\System\FdEZjOJ.exeC:\Windows\System\FdEZjOJ.exe2⤵
- Executes dropped EXE
PID:4296
-
-
C:\Windows\System\ELCOCYJ.exeC:\Windows\System\ELCOCYJ.exe2⤵
- Executes dropped EXE
PID:5040
-
-
C:\Windows\System\kTEgMDw.exeC:\Windows\System\kTEgMDw.exe2⤵
- Executes dropped EXE
PID:2456
-
-
C:\Windows\System\PDccWlw.exeC:\Windows\System\PDccWlw.exe2⤵
- Executes dropped EXE
PID:2480
-
-
C:\Windows\System\sMaFiUO.exeC:\Windows\System\sMaFiUO.exe2⤵
- Executes dropped EXE
PID:4716
-
-
C:\Windows\System\eRhyUfm.exeC:\Windows\System\eRhyUfm.exe2⤵
- Executes dropped EXE
PID:628
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.7MB
MD51e85f4a27a919da6bed155d941d667bb
SHA1eadc036bcd66a69dc330390dfb3cd8e971ad7f21
SHA256b60a44f67eee87a5be247c568c6f9ea2daf0cba0ed5308056cb6f9d5a44cd222
SHA512c8513f756d78bb3a0eb3032e158b925f9b87692931bdb07934715d105ed2ecdee4d89e5ce30891d3811cfdae3121af0ec82a5d5d0f15afa4aed8bf9f1f877034
-
Filesize
5.7MB
MD5c0d27759252e24be31399b6bb6a4fada
SHA11e3961d8a5dccc7107d2af78cd47767375c69e92
SHA256c8a57ab9134cbdfdea03947c0e5c4bcc556cd7f177fc0b95df5361e443a929b0
SHA5125d71936f346d050b4608f2b76637d5fb83f30fdd61e9a71ea6622f59a85d978e726c8cc98a453a3c3b5df7050aca28b6944967cc4e13f6fb3c30fd915b5dd0b6
-
Filesize
5.7MB
MD54f8ee6f8ff300ccc1407c7646dccaa89
SHA11dc12fcb36d288e1988f73ad684f11f845d187f1
SHA256b9eb3f7f031b9c71ca57f65b2b416651e6b579208e1b1d7d3d9cfd9cd982c1f4
SHA512fcc9255f5d4880f985f791ddb5afa162ec0fde8a91fbf1f68b9502da69bc2e93746392b4134b316be80f1e2abf6d344d96461bd749ac63b028340c8836b6f6c6
-
Filesize
5.7MB
MD5cd950505b9adb28db86d5bfce21eae92
SHA17e40686d6ac56a5a1f4a655cfdc97f38d02c35d6
SHA256c546972e47d3b251ae0c25502722aa03c81d299745b40dbed487d082643ef20a
SHA512f1dfb596109b160ed364d1634f1418105bb25ed06c473345b009a99c5cb3f50efa02f7fd1701be7afe95398002f774a6982a008aae33ef2b60845f131dc634f5
-
Filesize
5.7MB
MD5ac72cbdf389222c0598e09b2ecd046b3
SHA1a684db4e90086566613e00a45bbc219e85e0f559
SHA256ea210fccbad8e53390f8e8f5779be973a53d2319fa22d5df2ee2c9fd8aaf7ae9
SHA512b63f78c489487c0d531be99f2a3b56279b0cd10f7e0f7fc0ffb655b58e7b528c324f54fbbc14117772f421ce9c4cd70d5eb2734253cb0067f2c359bcf1e2f9fe
-
Filesize
5.7MB
MD5fdd427bdbc05784bfabc6ae7d0467a32
SHA16c661306cebf89b1fc740d0d0049b6acdc78984d
SHA25699ab9fabf22334d6709b3b15e951f74a126000d033c42aac6fa42ef14366ed20
SHA5129ded6b320ee8c38a702607c670e931d56106d123b1da65ce199f87c271cf07f9f11bf2f15ee366df90d31d1791231128ee90cd7ea8c4fd238c537f3369278fb6
-
Filesize
5.7MB
MD5dee6fede76211a1e29065fb22fcd044a
SHA1dcb3deac1d362c4b10bb711c979a231129e1dae8
SHA2562b64d4759cbc4b397bf0a3f5eb0de53225f71faa358e710064c3db890e077644
SHA5122316b53748362974d62e153b06b260e9820987fb33c09ed2632f3c2a9d54a9306d7aa719277526ad594958a73e820b64c175bb040ef12471a65edbfe65ab5540
-
Filesize
5.7MB
MD57eae5c31435773a3693c6dd3177b1839
SHA1455150925e49d9a543d8394cb02b09b177aea971
SHA256ccec4dd24fafcc70ef1707eefadfdcc3f5b9eb45cdc15c21e78cff04b278344d
SHA512018bd2ba9c2789ae778f3ee33e4a1bbe86634c5197600d3516708f4b3bcba50d6993be1b0d0bdb98dd7f71e17a42c8af54bf5220a42f62277b3fc1b02e6d080d
-
Filesize
5.7MB
MD5acbc333b1cdcc50d9c93180f8048d748
SHA10cf2eb51f2e6aa98d823e3142342d6335e9eb2f3
SHA256a9a5a648b430e1354ef9d21dc477b281ba762a50b4280cc6d5c358051aa25bbd
SHA51203fa39b50ed4e0b4e16cc85a3e43ee66fa1a51c59fb998f1e2f56ffcf05ffe3863d874c5ed097a6ed791a37295ba69338a0e10133e286ef48182b817be7b50c8
-
Filesize
5.7MB
MD5a2b6e44f6cda7fcc2c61dbc2fdcbfa46
SHA1203d710f40dfa9b76334009d1103534fa60295ff
SHA256d143a8a644cd39cc8311e1d8ea69111aa4c919f764ddc62e1be29bd703784bdd
SHA5126abefeeaf527edbd7b6c850671a79e48272d7e78dfde32ae301c6000967a39b9aaca8758eafcd9a637bf9db67140d2cbad308c7df2167ebb9cfba06d032ab9aa
-
Filesize
5.7MB
MD52b0f336738f1eedd68fa245d81a39a0f
SHA125284831d1987569c814a712da6148ca830a0468
SHA2564f5dbcfce3bc8a4293ffd527a42bee9f8c6e4669aaaf2a00071ef41b01aecb68
SHA512ae5c9126c1f2daa5dcc12f96f04c2ba585daacdd4c5b0c7eb6772c824debf6c7960b67d5e7b2415f455355c869c6036dc37933343bac8da83c85adc0c70c38e9
-
Filesize
5.7MB
MD556c2388ac8323e2fdd055c2c867bca09
SHA13239526714d8bd8578bec670ee08fe11f00d2ee8
SHA2561ff51c22ecb37b0d3cfd647bed0418fce59bcfdf88b94c333546cef5d33ce767
SHA512de679d25509847641ea93b3ff9ded3fb5b7437adb5c32edf6ecd5d4b2f2b78e5fa534dbc7ace2b2bc2509830b11330170edc43d6f1f7f15988fb8da01794b65d
-
Filesize
5.7MB
MD5f0c06902c1f1b6112e4db555e6b2ed01
SHA106d7b7b9e7e7e6ce029cebc6d0bbf5507f5af68e
SHA256063413b41b3f6c653a4f549d36c7281021d688f71fce61527460f3573b4a9bfe
SHA512cdd6e1ac97651da318d38d728831762d57e834d5f009c9cf3c288e64189c93a58a7e501b385deac0262940ee1684f3d8f03d6d27db6f1e33c07c5274c38bf90d
-
Filesize
5.7MB
MD552fa286df9275315b7b3eac0b6370b41
SHA1ff59b5c3ca9835269fbb8666df9c26ef37b73a29
SHA2560008e6ce3155221f25762961ff14acf892006f1f9ea7837ad88318d812b0e021
SHA512dbc884fa2804564f5dc99005ab65a14004fff332772e56c8ce18a0fc9df9c77af6f9418f1371e5a692eda00972e6961178cb8e186467095b25f12e831e3b0fb8
-
Filesize
5.7MB
MD5965a354cf8bdb5d27f6a53397510786c
SHA13dd2402d184ef1f5b6b489bfbdd4ad6ab589d419
SHA2562a5bbffb6b51baf28486b127f2709a91b51cd81fdda4b131d28a537f8295d34f
SHA5121468afd285037ec1783113e541bec7435a4c08a318cc1f26d567a94b1e893c20e43e33a445020ffaabdb950c81bd8848769401ab6026fa5b0f6d85e51c06e735
-
Filesize
5.7MB
MD52266d9085af8da03d0b4444bf78122d8
SHA1be4b3c9684e4924184e67677abb1c3025dd1a333
SHA25611e120432ed1794c653493b329291d0b07969362fd801507267b3ba0bfb2557c
SHA5128e1fa27cd7a992525615b98671e06436e255adda470ca9e1c4aac287c02738f5e47ba9aa5d204b55c11f5527ae810df1c2c4afa71cc149604ccde9b86915d09f
-
Filesize
5.7MB
MD524580495c95673f8823e9d31a16a2f9c
SHA16846000f1e30fd1f96f2826fe595508ee5d31b2e
SHA2566a60855eefe3808dc55001c45fa261a0e115e817f5d4ea33b8b7d4f7bbb9f6c4
SHA512ef27896b332df93ac464c4fdd9e1d6c12257d5a9e2e75d436c2eea8a9e17a835ecce100cdbcdaa0d14e5d36d4cf6d28effd30d67242af0b0a491387399921cc1
-
Filesize
5.7MB
MD530c2ad835e9a143366fbaeb3f4fbcaf2
SHA155fc23a46ba5c2e557157c29c7230fc36d0a8c4e
SHA256a12cf62f97e7ccd70e76e78d4001311008573c8723e372b960c5b0e34e3c5b38
SHA512b5964a6c4dd85a0814b01557a12b3e5efcefba9b4269f846a9180fce8ab8104c005949547c215f6d82cf49e818988a981f1a276eef09fdde13b324d209ce3877
-
Filesize
5.7MB
MD5ed79a3946401b4f546f053738d469352
SHA14b124dfa3b0d6a529b6c924cda45b80627ab0600
SHA25635489ad43d6535c333d958263ba257a2d7e9c9c2120cfa8b4fe430c99722ecc9
SHA51214d566fc133fa85cf38391f783e59f8b96ffbdcd25798775ef41751ab4dc2782a17f9d2f194010c9876de30fc2adbe0096fe2f9e38239562077629c0ade3ab29
-
Filesize
5.7MB
MD526a3ddb44c836e4321c1d478dd3b1cf2
SHA1a3aa8015b7ea8ff70454bd1f0b2b0a78fb462d8b
SHA256830275726e6aadf7eaf80203f84cf3a071b814d40e527d4d43d5d8ab6b279a38
SHA512e332564350cd9b262d23eecda5c493cdd9784c8f7cc790413cd67d7e078bf3900c1810647326be4093c88708016f37acb86660b6724ca1d86a68144eea2dd158
-
Filesize
5.7MB
MD50fbe09602103bc20b76c6e22215a36ac
SHA1b5ae617e8f8abcf3161a51fc79b62e26587788dd
SHA25666b68e09b4b411bbfe6547480101637c3796154871ab9938a50d94832023234b
SHA51279186257982ad46fdedcac69e8efbb22407f8b90ab683ba4bb5726cab62ca2e716896508f235bbef938468c44c467e706f5c9730f4769fee4ac5fd196bfad20a