Analysis

  • max time kernel
    140s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2024 09:57

General

  • Target

    2024-11-25_cfe55fd935d79db052b8fd091e0f0df9_cobalt-strike_cobaltstrike_poet-rat.exe

  • Size

    5.2MB

  • MD5

    cfe55fd935d79db052b8fd091e0f0df9

  • SHA1

    ae5356cca337fb5a8ae6cabe034da4c5ed5a774b

  • SHA256

    810007e5dbeea2ca10dfa1d169044d9014df9a01dd500fa2f1aa937c5cf626a5

  • SHA512

    29089625ffba23d9d57bd2fac298aa4ec5313d885f07b01d84f7855b28a1491e4f435dbe5070ad478a258a0897f182348ec4d186c12f0fc83c1aa2fae91a22b8

  • SSDEEP

    49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lv:RWWBibf56utgpPFotBER/mQ32lUr

Score
10/10

Malware Config

Signatures

  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 15 IoCs
  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-11-25_cfe55fd935d79db052b8fd091e0f0df9_cobalt-strike_cobaltstrike_poet-rat.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-11-25_cfe55fd935d79db052b8fd091e0f0df9_cobalt-strike_cobaltstrike_poet-rat.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4480

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4480-0-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp

    Filesize

    3.3MB

  • memory/4480-1-0x00000269C8040000-0x00000269C8050000-memory.dmp

    Filesize

    64KB

  • memory/4480-2-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp

    Filesize

    3.3MB

  • memory/4480-3-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp

    Filesize

    3.3MB

  • memory/4480-4-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp

    Filesize

    3.3MB

  • memory/4480-5-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp

    Filesize

    3.3MB

  • memory/4480-6-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp

    Filesize

    3.3MB

  • memory/4480-7-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp

    Filesize

    3.3MB

  • memory/4480-8-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp

    Filesize

    3.3MB

  • memory/4480-9-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp

    Filesize

    3.3MB

  • memory/4480-10-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp

    Filesize

    3.3MB

  • memory/4480-11-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp

    Filesize

    3.3MB

  • memory/4480-12-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp

    Filesize

    3.3MB

  • memory/4480-13-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp

    Filesize

    3.3MB

  • memory/4480-14-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp

    Filesize

    3.3MB

  • memory/4480-15-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp

    Filesize

    3.3MB

  • memory/4480-16-0x00007FF7EFD80000-0x00007FF7F00D1000-memory.dmp

    Filesize

    3.3MB