Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 15:33
Behavioral task
behavioral1
Sample
202409079349ed21cc9972fdb78a6ba60429b7c2cobaltstrikecobaltstrikepoetrat.exe
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
202409079349ed21cc9972fdb78a6ba60429b7c2cobaltstrikecobaltstrikepoetrat.exe
-
Size
5.2MB
-
MD5
9349ed21cc9972fdb78a6ba60429b7c2
-
SHA1
6d20bc689c3d5c92224a7f71e401a0e16d8421c0
-
SHA256
d7b9836659d2919287bb7148ce3ae95ddd5cc93b50389f56f5b127c24a93e6d3
-
SHA512
63664a39b77a8a2aae84357b1199e609bbf52ff43008957b2de72f4053fca0cb3d2e7e251fe6b3cc1b8d78f3a6d9c2d12c4788f9805dd7bbfa7dcd99419de253
-
SSDEEP
49152:ROdWCCi7/rai56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lY:RWWBibd56utgpPFotBER/mQ32lUE
Malware Config
Signatures
-
XMRig Miner payload 15 IoCs
resource yara_rule behavioral1/memory/2856-2-0x000000013FD30000-0x0000000140081000-memory.dmp xmrig behavioral1/memory/2856-3-0x000000013FD30000-0x0000000140081000-memory.dmp xmrig behavioral1/memory/2856-4-0x000000013FD30000-0x0000000140081000-memory.dmp xmrig behavioral1/memory/2856-5-0x000000013FD30000-0x0000000140081000-memory.dmp xmrig behavioral1/memory/2856-6-0x000000013FD30000-0x0000000140081000-memory.dmp xmrig behavioral1/memory/2856-7-0x000000013FD30000-0x0000000140081000-memory.dmp xmrig behavioral1/memory/2856-8-0x000000013FD30000-0x0000000140081000-memory.dmp xmrig behavioral1/memory/2856-9-0x000000013FD30000-0x0000000140081000-memory.dmp xmrig behavioral1/memory/2856-10-0x000000013FD30000-0x0000000140081000-memory.dmp xmrig behavioral1/memory/2856-11-0x000000013FD30000-0x0000000140081000-memory.dmp xmrig behavioral1/memory/2856-12-0x000000013FD30000-0x0000000140081000-memory.dmp xmrig behavioral1/memory/2856-13-0x000000013FD30000-0x0000000140081000-memory.dmp xmrig behavioral1/memory/2856-14-0x000000013FD30000-0x0000000140081000-memory.dmp xmrig behavioral1/memory/2856-15-0x000000013FD30000-0x0000000140081000-memory.dmp xmrig behavioral1/memory/2856-16-0x000000013FD30000-0x0000000140081000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/2856-0-0x000000013FD30000-0x0000000140081000-memory.dmp upx behavioral1/memory/2856-2-0x000000013FD30000-0x0000000140081000-memory.dmp upx behavioral1/memory/2856-3-0x000000013FD30000-0x0000000140081000-memory.dmp upx behavioral1/memory/2856-4-0x000000013FD30000-0x0000000140081000-memory.dmp upx behavioral1/memory/2856-5-0x000000013FD30000-0x0000000140081000-memory.dmp upx behavioral1/memory/2856-6-0x000000013FD30000-0x0000000140081000-memory.dmp upx behavioral1/memory/2856-7-0x000000013FD30000-0x0000000140081000-memory.dmp upx behavioral1/memory/2856-8-0x000000013FD30000-0x0000000140081000-memory.dmp upx behavioral1/memory/2856-9-0x000000013FD30000-0x0000000140081000-memory.dmp upx behavioral1/memory/2856-10-0x000000013FD30000-0x0000000140081000-memory.dmp upx behavioral1/memory/2856-11-0x000000013FD30000-0x0000000140081000-memory.dmp upx behavioral1/memory/2856-12-0x000000013FD30000-0x0000000140081000-memory.dmp upx behavioral1/memory/2856-13-0x000000013FD30000-0x0000000140081000-memory.dmp upx behavioral1/memory/2856-14-0x000000013FD30000-0x0000000140081000-memory.dmp upx behavioral1/memory/2856-15-0x000000013FD30000-0x0000000140081000-memory.dmp upx behavioral1/memory/2856-16-0x000000013FD30000-0x0000000140081000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2856 202409079349ed21cc9972fdb78a6ba60429b7c2cobaltstrikecobaltstrikepoetrat.exe Token: SeLockMemoryPrivilege 2856 202409079349ed21cc9972fdb78a6ba60429b7c2cobaltstrikecobaltstrikepoetrat.exe