Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 08:53
Behavioral task
behavioral1
Sample
2024-09-08_db89ec1da7cca355dda93b922d469848_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
2024-09-08_db89ec1da7cca355dda93b922d469848_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
db89ec1da7cca355dda93b922d469848
-
SHA1
e1f490330a748c1eab038c658a25d020afdc70c9
-
SHA256
8380f4589120d8da07f2149da15fe1f436b8675473a9d7d14c3bd986a93301ed
-
SHA512
ce612c6113c26f2d1c93d5cfddba4e3be149c0e27ee96a47b5b75e96405e71dc6a4f63118fba986e698161fd6504d2808060c5a48263fd3a93086b147c1f61b9
-
SSDEEP
98304:oemTLkNdfE0pZrD56utgpPFotBER/mQ32lUS:T+q56utgpPF8u/7S
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/memory/1400-0-0x000000013FC70000-0x000000013FFC4000-memory.dmp xmrig behavioral1/memory/1400-2-0x000000013FC70000-0x000000013FFC4000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/1400-0-0x000000013FC70000-0x000000013FFC4000-memory.dmp upx behavioral1/memory/1400-2-0x000000013FC70000-0x000000013FFC4000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1400 2024-09-08_db89ec1da7cca355dda93b922d469848_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 1400 2024-09-08_db89ec1da7cca355dda93b922d469848_cobalt-strike_cobaltstrike_poet-rat.exe