Analysis
-
max time kernel
131s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 09:43
Behavioral task
behavioral1
Sample
2024-09-14_19d93029a9f56faabdb5519d1e4e4239_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240704-en
windows7-x64
4 signatures
150 seconds
General
-
Target
2024-09-14_19d93029a9f56faabdb5519d1e4e4239_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
19d93029a9f56faabdb5519d1e4e4239
-
SHA1
8060e9b932d48fee85c632c0e6f13f83b0698485
-
SHA256
6a80684178d03fd6d8db271ead0b0d112cf42c10cb69306134400ef9f80609fd
-
SHA512
530256f5593b500a2416bd54bf0744399e8f3d200dda2ded4caa0e9c4c0e3e3aff1fe19732987d5d97a7663cadb6da411d53ded90ab6a1c696ddbafbf5867beb
-
SSDEEP
98304:oemTLkNdfE0pZrt56utgpPFotBER/mQ32lUC:T+856utgpPF8u/7C
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral2/memory/2584-0-0x00007FF6BF350000-0x00007FF6BF6A4000-memory.dmp xmrig behavioral2/memory/2584-2-0x00007FF6BF350000-0x00007FF6BF6A4000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/2584-0-0x00007FF6BF350000-0x00007FF6BF6A4000-memory.dmp upx behavioral2/memory/2584-2-0x00007FF6BF350000-0x00007FF6BF6A4000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2584 2024-09-14_19d93029a9f56faabdb5519d1e4e4239_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 2584 2024-09-14_19d93029a9f56faabdb5519d1e4e4239_cobalt-strike_cobaltstrike_poet-rat.exe