Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 04:02
Behavioral task
behavioral1
Sample
2024-09-09_bca0b31e5cceedf6e1449e09253fcad0_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
2024-09-09_bca0b31e5cceedf6e1449e09253fcad0_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
bca0b31e5cceedf6e1449e09253fcad0
-
SHA1
ca3f77184a98a028bb098e61fa6bc0ab668f01c1
-
SHA256
9c345cad1543a75770e4c7e853e4b82334127845cc904b5a69153146adb44a1a
-
SHA512
438c5768097f5c6b1a65eb7bf1444c6ae24d0da73f3f041c2aa785b9dadca15203388807edc3e6e18ca67047a9c911adabe81fbfdaf2103c527f1d19e40226bd
-
SSDEEP
98304:oemTLkNdfE0pZrD56utgpPFotBER/mQ32lUW:T+q56utgpPF8u/7W
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral2/memory/4864-0-0x00007FF62C000000-0x00007FF62C354000-memory.dmp xmrig behavioral2/memory/4864-2-0x00007FF62C000000-0x00007FF62C354000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/4864-0-0x00007FF62C000000-0x00007FF62C354000-memory.dmp upx behavioral2/memory/4864-2-0x00007FF62C000000-0x00007FF62C354000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 4864 2024-09-09_bca0b31e5cceedf6e1449e09253fcad0_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 4864 2024-09-09_bca0b31e5cceedf6e1449e09253fcad0_cobalt-strike_cobaltstrike_poet-rat.exe