Analysis
-
max time kernel
131s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 08:44
Behavioral task
behavioral1
Sample
2024-09-13_7609599fcab34a88dbf38298457ac73c_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240708-en
4 signatures
150 seconds
General
-
Target
2024-09-13_7609599fcab34a88dbf38298457ac73c_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
7609599fcab34a88dbf38298457ac73c
-
SHA1
3dd5d06caee0120b2c73c15bf54eafeab9332ed3
-
SHA256
9664d8a7f6ca58e03ad82a537927101c504dbb169cef1dc436bc3bb1e8239306
-
SHA512
4c73a030b47ec19ac9b237894e9821a7d8cf8a27fc16c39c46a2b8e6cc15ec846bcc5471dbd4c12a44aeb423607697ab5d941a6553f4a637497ebb8c7f7a667b
-
SSDEEP
98304:BemTLkNdfE0pZrT56utgpPFotBER/mQ32lUp:Q+u56utgpPF8u/7p
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral2/memory/1740-0-0x00007FF610470000-0x00007FF6107C4000-memory.dmp xmrig behavioral2/memory/1740-2-0x00007FF610470000-0x00007FF6107C4000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/1740-0-0x00007FF610470000-0x00007FF6107C4000-memory.dmp upx behavioral2/memory/1740-2-0x00007FF610470000-0x00007FF6107C4000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1740 2024-09-13_7609599fcab34a88dbf38298457ac73c_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 1740 2024-09-13_7609599fcab34a88dbf38298457ac73c_cobalt-strike_cobaltstrike_poet-rat.exe