Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 09:57
Behavioral task
behavioral1
Sample
2024-11-25_cfe55fd935d79db052b8fd091e0f0df9_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20241010-en
windows7-x64
5 signatures
150 seconds
General
-
Target
2024-11-25_cfe55fd935d79db052b8fd091e0f0df9_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.2MB
-
MD5
cfe55fd935d79db052b8fd091e0f0df9
-
SHA1
ae5356cca337fb5a8ae6cabe034da4c5ed5a774b
-
SHA256
810007e5dbeea2ca10dfa1d169044d9014df9a01dd500fa2f1aa937c5cf626a5
-
SHA512
29089625ffba23d9d57bd2fac298aa4ec5313d885f07b01d84f7855b28a1491e4f435dbe5070ad478a258a0897f182348ec4d186c12f0fc83c1aa2fae91a22b8
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lv:RWWBibf56utgpPFotBER/mQ32lUr
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 15 IoCs
Processes:
resource yara_rule behavioral2/memory/4480-2-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp xmrig behavioral2/memory/4480-3-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp xmrig behavioral2/memory/4480-4-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp xmrig behavioral2/memory/4480-5-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp xmrig behavioral2/memory/4480-6-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp xmrig behavioral2/memory/4480-7-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp xmrig behavioral2/memory/4480-8-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp xmrig behavioral2/memory/4480-9-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp xmrig behavioral2/memory/4480-10-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp xmrig behavioral2/memory/4480-11-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp xmrig behavioral2/memory/4480-12-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp xmrig behavioral2/memory/4480-13-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp xmrig behavioral2/memory/4480-14-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp xmrig behavioral2/memory/4480-15-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp xmrig behavioral2/memory/4480-16-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral2/memory/4480-0-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp upx behavioral2/memory/4480-2-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp upx behavioral2/memory/4480-3-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp upx behavioral2/memory/4480-4-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp upx behavioral2/memory/4480-5-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp upx behavioral2/memory/4480-6-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp upx behavioral2/memory/4480-7-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp upx behavioral2/memory/4480-8-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp upx behavioral2/memory/4480-9-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp upx behavioral2/memory/4480-10-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp upx behavioral2/memory/4480-11-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp upx behavioral2/memory/4480-12-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp upx behavioral2/memory/4480-13-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp upx behavioral2/memory/4480-14-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp upx behavioral2/memory/4480-15-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp upx behavioral2/memory/4480-16-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-11-25_cfe55fd935d79db052b8fd091e0f0df9_cobalt-strike_cobaltstrike_poet-rat.exedescription pid Process Token: SeLockMemoryPrivilege 4480 2024-11-25_cfe55fd935d79db052b8fd091e0f0df9_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 4480 2024-11-25_cfe55fd935d79db052b8fd091e0f0df9_cobalt-strike_cobaltstrike_poet-rat.exe