Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 18:29
Behavioral task
behavioral1
Sample
2024-10-05_f14da02d4e43378d20a0b9f848f03500_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
2024-10-05_f14da02d4e43378d20a0b9f848f03500_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.2MB
-
MD5
f14da02d4e43378d20a0b9f848f03500
-
SHA1
0079a8732d377e12ee2f29deea3ef05bd876a811
-
SHA256
df328ea01c6fd63a29e1334df264c15a65ea34a2f15ffdf055ec6b897fd3ac1e
-
SHA512
a3daa891d3b22664d965d29fb0d3860173e96c7848c4b4daa4544f9af015c038117d45ac93bcd4f004107e3e367f9a212a35f06810ece0a2e4c7232bdbc4e74b
-
SSDEEP
49152:ROdWCCi7/raA56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lq:RWWBibj56utgpPFotBER/mQ32lU+
Malware Config
Signatures
-
XMRig Miner payload 15 IoCs
resource yara_rule behavioral2/memory/4880-2-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp xmrig behavioral2/memory/4880-3-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp xmrig behavioral2/memory/4880-4-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp xmrig behavioral2/memory/4880-5-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp xmrig behavioral2/memory/4880-6-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp xmrig behavioral2/memory/4880-7-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp xmrig behavioral2/memory/4880-8-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp xmrig behavioral2/memory/4880-9-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp xmrig behavioral2/memory/4880-10-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp xmrig behavioral2/memory/4880-11-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp xmrig behavioral2/memory/4880-12-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp xmrig behavioral2/memory/4880-13-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp xmrig behavioral2/memory/4880-14-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp xmrig behavioral2/memory/4880-15-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp xmrig behavioral2/memory/4880-16-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/4880-0-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp upx behavioral2/memory/4880-2-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp upx behavioral2/memory/4880-3-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp upx behavioral2/memory/4880-4-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp upx behavioral2/memory/4880-5-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp upx behavioral2/memory/4880-6-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp upx behavioral2/memory/4880-7-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp upx behavioral2/memory/4880-8-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp upx behavioral2/memory/4880-9-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp upx behavioral2/memory/4880-10-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp upx behavioral2/memory/4880-11-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp upx behavioral2/memory/4880-12-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp upx behavioral2/memory/4880-13-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp upx behavioral2/memory/4880-14-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp upx behavioral2/memory/4880-15-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp upx behavioral2/memory/4880-16-0x00007FF743E80000-0x00007FF7441D1000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 4880 2024-10-05_f14da02d4e43378d20a0b9f848f03500_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 4880 2024-10-05_f14da02d4e43378d20a0b9f848f03500_cobalt-strike_cobaltstrike_poet-rat.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-05_f14da02d4e43378d20a0b9f848f03500_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-05_f14da02d4e43378d20a0b9f848f03500_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4880
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3036,i,11251706013556949551,5157034131170452377,262144 --variations-seed-version --mojo-platform-channel-handle=4188 /prefetch:81⤵PID:3816