Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 22:49
Behavioral task
behavioral1
Sample
2024-09-08_601166b08c976d74617715dd769a79e6_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
2024-09-08_601166b08c976d74617715dd769a79e6_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
601166b08c976d74617715dd769a79e6
-
SHA1
c883d45ff8f81848c138925ee471a3367928c86b
-
SHA256
b898a195f745d7d9a4bf00e085e9101caf8c032cd4cc7bba5e6c2a32141929ca
-
SHA512
1455308c6df6075e706e574b9140aebf4ca0d7166e5306100312f4ba425ecb8e066baa01f074929f15de0754f253fe127899042b846ecef680d589f4eedf4827
-
SSDEEP
98304:oemTLkNdfE0pZrD56utgpPFotBER/mQ32lUg:T+q56utgpPF8u/7g
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/memory/540-1-0x000000013FE80000-0x00000001401D4000-memory.dmp xmrig behavioral1/memory/540-2-0x000000013FE80000-0x00000001401D4000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/540-1-0x000000013FE80000-0x00000001401D4000-memory.dmp upx behavioral1/memory/540-2-0x000000013FE80000-0x00000001401D4000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 540 2024-09-08_601166b08c976d74617715dd769a79e6_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 540 2024-09-08_601166b08c976d74617715dd769a79e6_cobalt-strike_cobaltstrike_poet-rat.exe