Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 03:40
Behavioral task
behavioral1
Sample
2024-09-18_8630218573543f530872bd71d4219fe8_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
General
-
Target
2024-09-18_8630218573543f530872bd71d4219fe8_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
8630218573543f530872bd71d4219fe8
-
SHA1
887d0d5acd32bd505fdfb50bd324b33555348960
-
SHA256
85ee2e3e7d6db46a568b0b4e84b1738d81e9fefeb641ecaacf3377601e467148
-
SHA512
aa29f1777d8dbb3f3e027c215c1c7c85be0c4422097482c07f2cf3ae15b96f04a4a22e18d3e085c2693584abdaf3a50e5924f99374db970b60662e27cd56d669
-
SSDEEP
98304:oemTLkNdfE0pZrt56utgpPFotBER/mQ32lUH:T+856utgpPF8u/7H
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/memory/2488-0-0x000000013F8F0000-0x000000013FC44000-memory.dmp xmrig behavioral1/memory/2488-2-0x000000013F8F0000-0x000000013FC44000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/2488-0-0x000000013F8F0000-0x000000013FC44000-memory.dmp upx behavioral1/memory/2488-2-0x000000013F8F0000-0x000000013FC44000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2488 2024-09-18_8630218573543f530872bd71d4219fe8_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 2488 2024-09-18_8630218573543f530872bd71d4219fe8_cobalt-strike_cobaltstrike_poet-rat.exe