Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:43
Behavioral task
behavioral1
Sample
2024-09-19_0cc2138dce5f268ff96d6d7ac48050ef_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
General
-
Target
2024-09-19_0cc2138dce5f268ff96d6d7ac48050ef_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.2MB
-
MD5
0cc2138dce5f268ff96d6d7ac48050ef
-
SHA1
7b96d1c402812792ce23719c8982268918fcaec1
-
SHA256
d6ad62e63b5e90408e653d5b6159ff8a5a28dbd1d7a6a6d7463aea6ac6eb4855
-
SHA512
f301ddc27f8fb339a70b9670315436d096f47b95cf7ac83c131e4700c5b7050dd3127108a2c7f8b3eb0408e751007a8c90288f655491d850e7199818cff49367
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lp:RWWBibf56utgpPFotBER/mQ32lU9
Malware Config
Signatures
-
XMRig Miner payload 15 IoCs
resource yara_rule behavioral2/memory/3688-2-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp xmrig behavioral2/memory/3688-3-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp xmrig behavioral2/memory/3688-4-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp xmrig behavioral2/memory/3688-5-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp xmrig behavioral2/memory/3688-6-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp xmrig behavioral2/memory/3688-7-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp xmrig behavioral2/memory/3688-8-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp xmrig behavioral2/memory/3688-9-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp xmrig behavioral2/memory/3688-10-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp xmrig behavioral2/memory/3688-11-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp xmrig behavioral2/memory/3688-12-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp xmrig behavioral2/memory/3688-13-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp xmrig behavioral2/memory/3688-14-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp xmrig behavioral2/memory/3688-15-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp xmrig behavioral2/memory/3688-16-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/3688-0-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp upx behavioral2/memory/3688-2-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp upx behavioral2/memory/3688-3-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp upx behavioral2/memory/3688-4-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp upx behavioral2/memory/3688-5-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp upx behavioral2/memory/3688-6-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp upx behavioral2/memory/3688-7-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp upx behavioral2/memory/3688-8-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp upx behavioral2/memory/3688-9-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp upx behavioral2/memory/3688-10-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp upx behavioral2/memory/3688-11-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp upx behavioral2/memory/3688-12-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp upx behavioral2/memory/3688-13-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp upx behavioral2/memory/3688-14-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp upx behavioral2/memory/3688-15-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp upx behavioral2/memory/3688-16-0x00007FF6F5C50000-0x00007FF6F5FA1000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 3688 2024-09-19_0cc2138dce5f268ff96d6d7ac48050ef_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 3688 2024-09-19_0cc2138dce5f268ff96d6d7ac48050ef_cobalt-strike_cobaltstrike_poet-rat.exe