Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 07:58
Behavioral task
behavioral1
Sample
2024-09-09_fee4d288c86c479b679e761d85b6137c_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
2024-09-09_fee4d288c86c479b679e761d85b6137c_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
fee4d288c86c479b679e761d85b6137c
-
SHA1
3cb573a80a990deed92edb82029f5a0ec67ceddf
-
SHA256
eb4ef2fe095ddc5abd72123ff1230732b4721100bef421427c6421c324bf4b16
-
SHA512
e730ba5a89a18b55e1cf4e9d6972860da42e0ab360a2983bfb7799d71fcedde98401e16c6af015dee9a3c6c8eab6042aee55f61bad6611b189598f64139130d6
-
SSDEEP
98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lUA:Q+856utgpPF8u/7A
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/memory/2348-0-0x000000013FCA0000-0x000000013FFF4000-memory.dmp xmrig behavioral1/memory/2348-2-0x000000013FCA0000-0x000000013FFF4000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/2348-0-0x000000013FCA0000-0x000000013FFF4000-memory.dmp upx behavioral1/memory/2348-2-0x000000013FCA0000-0x000000013FFF4000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2348 2024-09-09_fee4d288c86c479b679e761d85b6137c_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 2348 2024-09-09_fee4d288c86c479b679e761d85b6137c_cobalt-strike_cobaltstrike_poet-rat.exe