Analysis

  • max time kernel
    140s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-09-2024 00:56

General

  • Target

    2024-09-23_bb47cde87acb6dc85fcee70f33c0a5cd_cobalt-strike_cobaltstrike_poet-rat.exe

  • Size

    5.2MB

  • MD5

    bb47cde87acb6dc85fcee70f33c0a5cd

  • SHA1

    d4fac5644d64e4a24dd7f26e23ea9fa49b9ce898

  • SHA256

    88a8254dcfbcefdef48e7962116c450ad09ef4e563da66e8202b9436e4f5ca90

  • SHA512

    16a0c12a20856dad2d778116c24dea5462b3a90739077ab304b1dede2d61c136e8db5377dcf2980a451b2ae853f2233ba294e232d60bee6cb77b01d53c177383

  • SSDEEP

    49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6ls:RWWBibf56utgpPFotBER/mQ32lUI

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 15 IoCs
  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-23_bb47cde87acb6dc85fcee70f33c0a5cd_cobalt-strike_cobaltstrike_poet-rat.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-23_bb47cde87acb6dc85fcee70f33c0a5cd_cobalt-strike_cobaltstrike_poet-rat.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3612

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3612-0-0x00007FF6FA3C0000-0x00007FF6FA711000-memory.dmp

    Filesize

    3.3MB

  • memory/3612-1-0x000001F6A14B0000-0x000001F6A14C0000-memory.dmp

    Filesize

    64KB

  • memory/3612-2-0x00007FF6FA3C0000-0x00007FF6FA711000-memory.dmp

    Filesize

    3.3MB

  • memory/3612-3-0x00007FF6FA3C0000-0x00007FF6FA711000-memory.dmp

    Filesize

    3.3MB

  • memory/3612-4-0x00007FF6FA3C0000-0x00007FF6FA711000-memory.dmp

    Filesize

    3.3MB

  • memory/3612-5-0x00007FF6FA3C0000-0x00007FF6FA711000-memory.dmp

    Filesize

    3.3MB

  • memory/3612-6-0x00007FF6FA3C0000-0x00007FF6FA711000-memory.dmp

    Filesize

    3.3MB

  • memory/3612-7-0x00007FF6FA3C0000-0x00007FF6FA711000-memory.dmp

    Filesize

    3.3MB

  • memory/3612-8-0x00007FF6FA3C0000-0x00007FF6FA711000-memory.dmp

    Filesize

    3.3MB

  • memory/3612-9-0x00007FF6FA3C0000-0x00007FF6FA711000-memory.dmp

    Filesize

    3.3MB

  • memory/3612-10-0x00007FF6FA3C0000-0x00007FF6FA711000-memory.dmp

    Filesize

    3.3MB

  • memory/3612-11-0x00007FF6FA3C0000-0x00007FF6FA711000-memory.dmp

    Filesize

    3.3MB

  • memory/3612-12-0x00007FF6FA3C0000-0x00007FF6FA711000-memory.dmp

    Filesize

    3.3MB

  • memory/3612-13-0x00007FF6FA3C0000-0x00007FF6FA711000-memory.dmp

    Filesize

    3.3MB

  • memory/3612-14-0x00007FF6FA3C0000-0x00007FF6FA711000-memory.dmp

    Filesize

    3.3MB

  • memory/3612-15-0x00007FF6FA3C0000-0x00007FF6FA711000-memory.dmp

    Filesize

    3.3MB

  • memory/3612-16-0x00007FF6FA3C0000-0x00007FF6FA711000-memory.dmp

    Filesize

    3.3MB