Analysis
-
max time kernel
131s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 09:46
Behavioral task
behavioral1
Sample
2024-09-15_10959176800da8d1f1e66fcbb8146e84_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240903-en
windows7-x64
9 signatures
150 seconds
General
-
Target
2024-09-15_10959176800da8d1f1e66fcbb8146e84_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
6.1MB
-
MD5
10959176800da8d1f1e66fcbb8146e84
-
SHA1
5abf759554076c05dabda3d1b7ffecf356bf0f76
-
SHA256
314ad03d9f5941ce8f43ea599f2929c1344624f50ec2f56c4072067c4f5873df
-
SHA512
ccc5ad42d6c444c54b9660a9efe64e9720fcc614fd515feec5cf1f8444afd610b51df4c409607f180556dad836e7b57d3ec05407ef95c30e8628fd04094da7cb
-
SSDEEP
98304:EniLf9FdfE0pZB156utgpPFotBER/mQ32lU8:eOl56utgpPF8u/78
Malware Config
Signatures
-
XMRig Miner payload 1 IoCs
resource yara_rule behavioral2/memory/1048-0-0x00007FF6467C0000-0x00007FF646B14000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/1048-0-0x00007FF6467C0000-0x00007FF646B14000-memory.dmp upx
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_10959176800da8d1f1e66fcbb8146e84_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-15_10959176800da8d1f1e66fcbb8146e84_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵PID:1048
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4148,i,7447299413640964517,4240724842020506306,262144 --variations-seed-version --mojo-platform-channel-handle=4400 /prefetch:81⤵PID:2608