Analysis
-
max time kernel
132s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 09:22
Behavioral task
behavioral1
Sample
2024-09-13_d3cb0493b22435ff8de95f75752aa726_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
2024-09-13_d3cb0493b22435ff8de95f75752aa726_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
d3cb0493b22435ff8de95f75752aa726
-
SHA1
9820ec6d2402ee607f8a4922864afc9a118c1d76
-
SHA256
c326ce6125d86342a0434d52db33a8c5d42048a9f6fadb68a88108f3fa9642d2
-
SHA512
22acc7bcb5a799e57987da545c1d14c2ad286eb17c320000219fb12d75e71466004a2ca83f099a2ccf8889f8b2c02b23fcc42899807554dd45d9f1961ac493c1
-
SSDEEP
98304:BemTLkNdfE0pZrT56utgpPFotBER/mQ32lUP:Q+u56utgpPF8u/7P
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/memory/1860-0-0x000000013FE30000-0x0000000140184000-memory.dmp xmrig behavioral1/memory/1860-2-0x000000013FE30000-0x0000000140184000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/1860-0-0x000000013FE30000-0x0000000140184000-memory.dmp upx behavioral1/memory/1860-2-0x000000013FE30000-0x0000000140184000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1860 2024-09-13_d3cb0493b22435ff8de95f75752aa726_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 1860 2024-09-13_d3cb0493b22435ff8de95f75752aa726_cobalt-strike_cobaltstrike_poet-rat.exe