Analysis
-
max time kernel
131s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 08:22
Behavioral task
behavioral1
Sample
2024-09-09_4f1a93e59a6c59c3b90211d1e82421e7_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
2024-09-09_4f1a93e59a6c59c3b90211d1e82421e7_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
4f1a93e59a6c59c3b90211d1e82421e7
-
SHA1
4ac41dd4a0536ec47a5640dd38e9d16e9460df5f
-
SHA256
d24887c1162279cbbecc83652bb6df955f6479aae7092e46b98843542f7e9eac
-
SHA512
ea4b971904282644b3b299f6120f60f4c2a79397a1ba77aeabdd32a5621f18b73bfd40b97b8112bf5fadb11938687d895c35c9c7701094539211e589daa29e0c
-
SSDEEP
98304:oemTLkNdfE0pZrD56utgpPFotBER/mQ32lU4:T+q56utgpPF8u/74
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral2/memory/1256-0-0x00007FF602890000-0x00007FF602BE4000-memory.dmp xmrig behavioral2/memory/1256-2-0x00007FF602890000-0x00007FF602BE4000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/1256-0-0x00007FF602890000-0x00007FF602BE4000-memory.dmp upx behavioral2/memory/1256-2-0x00007FF602890000-0x00007FF602BE4000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1256 2024-09-09_4f1a93e59a6c59c3b90211d1e82421e7_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 1256 2024-09-09_4f1a93e59a6c59c3b90211d1e82421e7_cobalt-strike_cobaltstrike_poet-rat.exe