Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02-09-2024 10:27
Behavioral task
behavioral1
Sample
2024-09-02_597dbe3400dcf7b500762c6d57f1b1a2_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240729-en
windows7-x64
4 signatures
150 seconds
General
-
Target
2024-09-02_597dbe3400dcf7b500762c6d57f1b1a2_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
597dbe3400dcf7b500762c6d57f1b1a2
-
SHA1
39bbe35c596a5d01feef44653f941a92da015469
-
SHA256
bcdcc83ada3e32a96a4c566c9c107f20567283b20f13e5795c4a49d1e6020c97
-
SHA512
709dad93517e42139e44c57d02295dda8d983d05bff92191923e4563a831d44a87d1ed5d1e6ac616719b50d13b8def6003362c60cd806c50eb5c2f7498b215e3
-
SSDEEP
98304:oemTLkNdfE0pZrt56utgpPFotBER/mQ32lUr:T+856utgpPF8u/7r
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/memory/1244-0-0x000000013F790000-0x000000013FAE4000-memory.dmp xmrig behavioral1/memory/1244-2-0x000000013F790000-0x000000013FAE4000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/1244-0-0x000000013F790000-0x000000013FAE4000-memory.dmp upx behavioral1/memory/1244-2-0x000000013F790000-0x000000013FAE4000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1244 2024-09-02_597dbe3400dcf7b500762c6d57f1b1a2_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 1244 2024-09-02_597dbe3400dcf7b500762c6d57f1b1a2_cobalt-strike_cobaltstrike_poet-rat.exe