Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 15:25
Behavioral task
behavioral1
Sample
2024-09-20_1173731bd17cf17a274d9c25e387db1c_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
General
-
Target
2024-09-20_1173731bd17cf17a274d9c25e387db1c_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.2MB
-
MD5
1173731bd17cf17a274d9c25e387db1c
-
SHA1
9ac49204a3e03269d235b951260b6a6f3533786b
-
SHA256
37ca0bd9ce076d78874bcfa3a12ba927466d2f260d33407b79a3ce220636c3a7
-
SHA512
b0f2c0d0717a234aa436170bc6235a3e70db81115d90d8510e08bd6eaed85c8dc6d1d435149405885418e1605ba775e139101e64ab1cdb08db4ba0018be80870
-
SSDEEP
49152:ROdWCCi7/raA56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lj:RWWBibj56utgpPFotBER/mQ32lUX
Malware Config
Signatures
-
XMRig Miner payload 15 IoCs
resource yara_rule behavioral2/memory/2368-2-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp xmrig behavioral2/memory/2368-3-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp xmrig behavioral2/memory/2368-4-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp xmrig behavioral2/memory/2368-5-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp xmrig behavioral2/memory/2368-6-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp xmrig behavioral2/memory/2368-7-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp xmrig behavioral2/memory/2368-8-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp xmrig behavioral2/memory/2368-9-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp xmrig behavioral2/memory/2368-10-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp xmrig behavioral2/memory/2368-11-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp xmrig behavioral2/memory/2368-12-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp xmrig behavioral2/memory/2368-13-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp xmrig behavioral2/memory/2368-14-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp xmrig behavioral2/memory/2368-15-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp xmrig behavioral2/memory/2368-16-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/2368-0-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp upx behavioral2/memory/2368-2-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp upx behavioral2/memory/2368-3-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp upx behavioral2/memory/2368-4-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp upx behavioral2/memory/2368-5-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp upx behavioral2/memory/2368-6-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp upx behavioral2/memory/2368-7-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp upx behavioral2/memory/2368-8-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp upx behavioral2/memory/2368-9-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp upx behavioral2/memory/2368-10-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp upx behavioral2/memory/2368-11-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp upx behavioral2/memory/2368-12-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp upx behavioral2/memory/2368-13-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp upx behavioral2/memory/2368-14-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp upx behavioral2/memory/2368-15-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp upx behavioral2/memory/2368-16-0x00007FF6DE310000-0x00007FF6DE661000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2368 2024-09-20_1173731bd17cf17a274d9c25e387db1c_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 2368 2024-09-20_1173731bd17cf17a274d9c25e387db1c_cobalt-strike_cobaltstrike_poet-rat.exe