Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
09-06-2024 20:17
Behavioral task
behavioral1
Sample
2024-06-09_f623ffc9a5714c4c7ad9dbc6ba39d419_cobalt-strike_cobaltstrike.exe
Resource
win7-20240419-en
windows7-x64
5 signatures
150 seconds
General
-
Target
2024-06-09_f623ffc9a5714c4c7ad9dbc6ba39d419_cobalt-strike_cobaltstrike.exe
-
Size
5.9MB
-
MD5
f623ffc9a5714c4c7ad9dbc6ba39d419
-
SHA1
3ba9e8c495cccb1e0b9e588b7c9ae4ade4d6fd60
-
SHA256
4ed246b9eca17df8d1a894f2b05112fad1a3e94455019f861cc26853360af81f
-
SHA512
1e9c862f8921fa31fe8a8ca2ac28858542730113463552a527dd008ac56ca9cc9e41896b574a779e32304ea9e682b560f93230e9b001078d781cb8333bc09cda
-
SSDEEP
98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lUS:Q+856utgpPF8u/7S
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 2 IoCs
resource yara_rule behavioral1/memory/2288-0-0x000000013FCE0000-0x0000000140034000-memory.dmp UPX behavioral1/memory/2288-2-0x000000013FCE0000-0x0000000140034000-memory.dmp UPX -
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/memory/2288-0-0x000000013FCE0000-0x0000000140034000-memory.dmp xmrig behavioral1/memory/2288-2-0x000000013FCE0000-0x0000000140034000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/2288-0-0x000000013FCE0000-0x0000000140034000-memory.dmp upx behavioral1/memory/2288-2-0x000000013FCE0000-0x0000000140034000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2288 2024-06-09_f623ffc9a5714c4c7ad9dbc6ba39d419_cobalt-strike_cobaltstrike.exe Token: SeLockMemoryPrivilege 2288 2024-06-09_f623ffc9a5714c4c7ad9dbc6ba39d419_cobalt-strike_cobaltstrike.exe