Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-12-2024 19:27
Behavioral task
behavioral1
Sample
2024-12-28_f87601b7990cbcc37b32110276e7e065_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-28_f87601b7990cbcc37b32110276e7e065_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-28_f87601b7990cbcc37b32110276e7e065_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.7MB
-
MD5
f87601b7990cbcc37b32110276e7e065
-
SHA1
e791d21ab1ba8773af010ed3d5f1298accd05bdb
-
SHA256
b264bbf9dd0f8d38444b48ed1383e290113274add4632224cbd2cbad16b993b2
-
SHA512
9b74f090b75c79f042c48014ba8ca399dcd13742c2e95e5afb12f873d50b1322c9beccf9dd15311cb8d65557454d703d8f2f778d61670e3879be7102879c63d3
-
SSDEEP
98304:hemTLkNdfE0pZaN56utgpPFotBER/mQ32lUV:w+156utgpPF8u/7V
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 1 IoCs
resource yara_rule behavioral1/memory/1928-0-0x000000013FE30000-0x000000014017D000-memory.dmp xmrig -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2904 1928 2024-12-28_f87601b7990cbcc37b32110276e7e065_cobalt-strike_cobaltstrike_poet-rat.exe 31 PID 1928 wrote to memory of 2904 1928 2024-12-28_f87601b7990cbcc37b32110276e7e065_cobalt-strike_cobaltstrike_poet-rat.exe 31 PID 1928 wrote to memory of 2904 1928 2024-12-28_f87601b7990cbcc37b32110276e7e065_cobalt-strike_cobaltstrike_poet-rat.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-28_f87601b7990cbcc37b32110276e7e065_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-28_f87601b7990cbcc37b32110276e7e065_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1928 -s 722⤵PID:2904
-