Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 01:43
Behavioral task
behavioral1
Sample
2024-06-01_f07bc285e4e6d90b685d25806e64661f_cobalt-strike_cobaltstrike.exe
Resource
win7-20240508-en
5 signatures
150 seconds
General
-
Target
2024-06-01_f07bc285e4e6d90b685d25806e64661f_cobalt-strike_cobaltstrike.exe
-
Size
6.0MB
-
MD5
f07bc285e4e6d90b685d25806e64661f
-
SHA1
08d151b0c1ce4e3f5fa104cc80896d6969cca576
-
SHA256
b2f77a77da53b5d4b08acd81909c59837243a39d894b06a913615bc1432d50a5
-
SHA512
e3cad52af1467e986c8a2890c5cb2d1171db18c807a404fd09e4a4e664ce200835e6513b08ecaeff047da1dfc30079d9ec3fc57947828f77a4f6d8352c76fa27
-
SSDEEP
98304:oemTLkNdfE0pZrt56utgpPFotBER/mQ32lUV:T+856utgpPF8u/7V
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 2 IoCs
resource yara_rule behavioral1/memory/2416-0-0x000000013FD70000-0x00000001400C4000-memory.dmp UPX behavioral1/memory/2416-2-0x000000013FD70000-0x00000001400C4000-memory.dmp UPX -
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/memory/2416-0-0x000000013FD70000-0x00000001400C4000-memory.dmp xmrig behavioral1/memory/2416-2-0x000000013FD70000-0x00000001400C4000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/2416-0-0x000000013FD70000-0x00000001400C4000-memory.dmp upx behavioral1/memory/2416-2-0x000000013FD70000-0x00000001400C4000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2416 2024-06-01_f07bc285e4e6d90b685d25806e64661f_cobalt-strike_cobaltstrike.exe Token: SeLockMemoryPrivilege 2416 2024-06-01_f07bc285e4e6d90b685d25806e64661f_cobalt-strike_cobaltstrike.exe