Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 03:49
Behavioral task
behavioral1
Sample
2024-11-23_b776fffcb9c26651e8f20abaa8dddb83_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
General
-
Target
2024-11-23_b776fffcb9c26651e8f20abaa8dddb83_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.2MB
-
MD5
b776fffcb9c26651e8f20abaa8dddb83
-
SHA1
90b224072e18f61a0156464e2089cd87393f9970
-
SHA256
b5ad5cb20b3fe81dc896cffacd29a2023d93f138fc173c2c529249ca3f676e81
-
SHA512
3ffd24b4028ed7123c084dd3e0be18c2cfa4e1773dac123785e44b591860822ab6afc1404f4091aef9ad216bc991cbb063fd28cbfe5130ba0016200d8721c0ba
-
SSDEEP
49152:ROdWCCi7/rai56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lJ:RWWBibd56utgpPFotBER/mQ32lUN
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 15 IoCs
Processes:
resource yara_rule behavioral1/memory/3040-2-0x000000013F530000-0x000000013F881000-memory.dmp xmrig behavioral1/memory/3040-3-0x000000013F530000-0x000000013F881000-memory.dmp xmrig behavioral1/memory/3040-4-0x000000013F530000-0x000000013F881000-memory.dmp xmrig behavioral1/memory/3040-5-0x000000013F530000-0x000000013F881000-memory.dmp xmrig behavioral1/memory/3040-6-0x000000013F530000-0x000000013F881000-memory.dmp xmrig behavioral1/memory/3040-7-0x000000013F530000-0x000000013F881000-memory.dmp xmrig behavioral1/memory/3040-8-0x000000013F530000-0x000000013F881000-memory.dmp xmrig behavioral1/memory/3040-9-0x000000013F530000-0x000000013F881000-memory.dmp xmrig behavioral1/memory/3040-10-0x000000013F530000-0x000000013F881000-memory.dmp xmrig behavioral1/memory/3040-11-0x000000013F530000-0x000000013F881000-memory.dmp xmrig behavioral1/memory/3040-12-0x000000013F530000-0x000000013F881000-memory.dmp xmrig behavioral1/memory/3040-13-0x000000013F530000-0x000000013F881000-memory.dmp xmrig behavioral1/memory/3040-14-0x000000013F530000-0x000000013F881000-memory.dmp xmrig behavioral1/memory/3040-15-0x000000013F530000-0x000000013F881000-memory.dmp xmrig behavioral1/memory/3040-16-0x000000013F530000-0x000000013F881000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral1/memory/3040-0-0x000000013F530000-0x000000013F881000-memory.dmp upx behavioral1/memory/3040-2-0x000000013F530000-0x000000013F881000-memory.dmp upx behavioral1/memory/3040-3-0x000000013F530000-0x000000013F881000-memory.dmp upx behavioral1/memory/3040-4-0x000000013F530000-0x000000013F881000-memory.dmp upx behavioral1/memory/3040-5-0x000000013F530000-0x000000013F881000-memory.dmp upx behavioral1/memory/3040-6-0x000000013F530000-0x000000013F881000-memory.dmp upx behavioral1/memory/3040-7-0x000000013F530000-0x000000013F881000-memory.dmp upx behavioral1/memory/3040-8-0x000000013F530000-0x000000013F881000-memory.dmp upx behavioral1/memory/3040-9-0x000000013F530000-0x000000013F881000-memory.dmp upx behavioral1/memory/3040-10-0x000000013F530000-0x000000013F881000-memory.dmp upx behavioral1/memory/3040-11-0x000000013F530000-0x000000013F881000-memory.dmp upx behavioral1/memory/3040-12-0x000000013F530000-0x000000013F881000-memory.dmp upx behavioral1/memory/3040-13-0x000000013F530000-0x000000013F881000-memory.dmp upx behavioral1/memory/3040-14-0x000000013F530000-0x000000013F881000-memory.dmp upx behavioral1/memory/3040-15-0x000000013F530000-0x000000013F881000-memory.dmp upx behavioral1/memory/3040-16-0x000000013F530000-0x000000013F881000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-11-23_b776fffcb9c26651e8f20abaa8dddb83_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process Token: SeLockMemoryPrivilege 3040 2024-11-23_b776fffcb9c26651e8f20abaa8dddb83_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 3040 2024-11-23_b776fffcb9c26651e8f20abaa8dddb83_cobalt-strike_cobaltstrike_poet-rat.exe