Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 08:05
Behavioral task
behavioral1
Sample
2024-06-11_f58220014029a7ba3f576778ff679147_cobalt-strike_cobaltstrike.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
2024-06-11_f58220014029a7ba3f576778ff679147_cobalt-strike_cobaltstrike.exe
-
Size
5.9MB
-
MD5
f58220014029a7ba3f576778ff679147
-
SHA1
a477324afca023f2b6e207531a2dfab6b49cc127
-
SHA256
55d14b239f7edde28417850576cd81a33687df51ae7c19772ae15f8998521c9d
-
SHA512
6205d8aa500fb12c638dc5204373cb5f7ad6093cfa91c0ba50c5a02a2c4e88f19aee9f8ecb150e6bbbb1f07ad7d62266e5111c451f8030795cbcb783a2c8a43b
-
SSDEEP
98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lU+:Q+856utgpPF8u/7+
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 2 IoCs
resource yara_rule behavioral1/memory/1628-1-0x000000013F0A0000-0x000000013F3F4000-memory.dmp UPX behavioral1/memory/1628-2-0x000000013F0A0000-0x000000013F3F4000-memory.dmp UPX -
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/memory/1628-1-0x000000013F0A0000-0x000000013F3F4000-memory.dmp xmrig behavioral1/memory/1628-2-0x000000013F0A0000-0x000000013F3F4000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/1628-1-0x000000013F0A0000-0x000000013F3F4000-memory.dmp upx behavioral1/memory/1628-2-0x000000013F0A0000-0x000000013F3F4000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1628 2024-06-11_f58220014029a7ba3f576778ff679147_cobalt-strike_cobaltstrike.exe Token: SeLockMemoryPrivilege 1628 2024-06-11_f58220014029a7ba3f576778ff679147_cobalt-strike_cobaltstrike.exe