Analysis
-
max time kernel
131s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2024 01:43
Behavioral task
behavioral1
Sample
2024-06-01_f07bc285e4e6d90b685d25806e64661f_cobalt-strike_cobaltstrike.exe
Resource
win7-20240508-en
5 signatures
150 seconds
General
-
Target
2024-06-01_f07bc285e4e6d90b685d25806e64661f_cobalt-strike_cobaltstrike.exe
-
Size
6.0MB
-
MD5
f07bc285e4e6d90b685d25806e64661f
-
SHA1
08d151b0c1ce4e3f5fa104cc80896d6969cca576
-
SHA256
b2f77a77da53b5d4b08acd81909c59837243a39d894b06a913615bc1432d50a5
-
SHA512
e3cad52af1467e986c8a2890c5cb2d1171db18c807a404fd09e4a4e664ce200835e6513b08ecaeff047da1dfc30079d9ec3fc57947828f77a4f6d8352c76fa27
-
SSDEEP
98304:oemTLkNdfE0pZrt56utgpPFotBER/mQ32lUV:T+856utgpPF8u/7V
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 2 IoCs
resource yara_rule behavioral2/memory/2164-0-0x00007FF7A3B00000-0x00007FF7A3E54000-memory.dmp UPX behavioral2/memory/2164-2-0x00007FF7A3B00000-0x00007FF7A3E54000-memory.dmp UPX -
XMRig Miner payload 2 IoCs
resource yara_rule behavioral2/memory/2164-0-0x00007FF7A3B00000-0x00007FF7A3E54000-memory.dmp xmrig behavioral2/memory/2164-2-0x00007FF7A3B00000-0x00007FF7A3E54000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/2164-0-0x00007FF7A3B00000-0x00007FF7A3E54000-memory.dmp upx behavioral2/memory/2164-2-0x00007FF7A3B00000-0x00007FF7A3E54000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2164 2024-06-01_f07bc285e4e6d90b685d25806e64661f_cobalt-strike_cobaltstrike.exe Token: SeLockMemoryPrivilege 2164 2024-06-01_f07bc285e4e6d90b685d25806e64661f_cobalt-strike_cobaltstrike.exe