Analysis
-
max time kernel
131s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:25
Behavioral task
behavioral1
Sample
2024-09-19_2f82f8eb14c19d384064c6dacadbfa18_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240704-en
windows7-x64
4 signatures
150 seconds
General
-
Target
2024-09-19_2f82f8eb14c19d384064c6dacadbfa18_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
2f82f8eb14c19d384064c6dacadbfa18
-
SHA1
dcb22e6b0a29519e26a65062e4c3c243ee4ad2b5
-
SHA256
c5a074ad48a3d3dc5af24bf93bb079ec43aa59b1727595068f6f3ecfd5433d50
-
SHA512
0076f35522883b4a57433d56a60917e38bff01280d395c9d03a84dc4920366cde2da3285ebbb26b7718921546677ef2de511aa149f93557bf3595fc742122a4f
-
SSDEEP
98304:oemTLkNdfE0pZrD56utgpPFotBER/mQ32lUk:T+q56utgpPF8u/7k
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral2/memory/3488-0-0x00007FF6E9570000-0x00007FF6E98C4000-memory.dmp xmrig behavioral2/memory/3488-2-0x00007FF6E9570000-0x00007FF6E98C4000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/3488-0-0x00007FF6E9570000-0x00007FF6E98C4000-memory.dmp upx behavioral2/memory/3488-2-0x00007FF6E9570000-0x00007FF6E98C4000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 3488 2024-09-19_2f82f8eb14c19d384064c6dacadbfa18_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 3488 2024-09-19_2f82f8eb14c19d384064c6dacadbfa18_cobalt-strike_cobaltstrike_poet-rat.exe