Analysis
-
max time kernel
131s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 22:49
Behavioral task
behavioral1
Sample
2024-09-08_601166b08c976d74617715dd769a79e6_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
2024-09-08_601166b08c976d74617715dd769a79e6_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
601166b08c976d74617715dd769a79e6
-
SHA1
c883d45ff8f81848c138925ee471a3367928c86b
-
SHA256
b898a195f745d7d9a4bf00e085e9101caf8c032cd4cc7bba5e6c2a32141929ca
-
SHA512
1455308c6df6075e706e574b9140aebf4ca0d7166e5306100312f4ba425ecb8e066baa01f074929f15de0754f253fe127899042b846ecef680d589f4eedf4827
-
SSDEEP
98304:oemTLkNdfE0pZrD56utgpPFotBER/mQ32lUg:T+q56utgpPF8u/7g
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral2/memory/1344-0-0x00007FF609F00000-0x00007FF60A254000-memory.dmp xmrig behavioral2/memory/1344-2-0x00007FF609F00000-0x00007FF60A254000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/1344-0-0x00007FF609F00000-0x00007FF60A254000-memory.dmp upx behavioral2/memory/1344-2-0x00007FF609F00000-0x00007FF60A254000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1344 2024-09-08_601166b08c976d74617715dd769a79e6_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 1344 2024-09-08_601166b08c976d74617715dd769a79e6_cobalt-strike_cobaltstrike_poet-rat.exe