Analysis
-
max time kernel
132s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 18:31
Behavioral task
behavioral1
Sample
20240901e03deec5b82d792c78e2733ea59e7a73cobaltstrikecobaltstrikepoetrat.exe
Resource
win7-20240708-en
4 signatures
150 seconds
General
-
Target
20240901e03deec5b82d792c78e2733ea59e7a73cobaltstrikecobaltstrikepoetrat.exe
-
Size
5.9MB
-
MD5
e03deec5b82d792c78e2733ea59e7a73
-
SHA1
2ed6b4c55b3b2ea435629178a45a0aa9d058314f
-
SHA256
5d2a5f7a9693375395ac1292059c28b192b7d382647e83b0681c72168ac32dec
-
SHA512
41bb6218d54060d2e4e24f2c4fc0145858cecc982625cebd9f7f0c6011e29763265d6bb8d55ac21d767a1c3e7cc98c4d48a1b870496f2d62bdfc067a37ba8039
-
SSDEEP
98304:oemTLkNdfE0pZrD56utgpPFotBER/mQ32lUn:T+q56utgpPF8u/7n
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/memory/1708-0-0x000000013F0E0000-0x000000013F434000-memory.dmp xmrig behavioral1/memory/1708-2-0x000000013F0E0000-0x000000013F434000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/1708-0-0x000000013F0E0000-0x000000013F434000-memory.dmp upx behavioral1/memory/1708-2-0x000000013F0E0000-0x000000013F434000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1708 20240901e03deec5b82d792c78e2733ea59e7a73cobaltstrikecobaltstrikepoetrat.exe Token: SeLockMemoryPrivilege 1708 20240901e03deec5b82d792c78e2733ea59e7a73cobaltstrikecobaltstrikepoetrat.exe