Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 02:46
Behavioral task
behavioral1
Sample
2024-12-30_17e50c98f7413d8d31374698dac5a0c3_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20241010-en
5 signatures
150 seconds
General
-
Target
2024-12-30_17e50c98f7413d8d31374698dac5a0c3_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.2MB
-
MD5
17e50c98f7413d8d31374698dac5a0c3
-
SHA1
de7722a5fb84be88586da436cb3c6e138bada4ea
-
SHA256
8cff10c85eb6a410a155b9bb5f738cae920957184743a38b909fdc535bfcc2b6
-
SHA512
5c48805540e80f52d7433c50beb15d1cfb8dee1b80602bd06c274c2f55dbd536967af6f7414774d7cb995130827423e51a761a00644f01ea92561d7ceccdd59c
-
SSDEEP
49152:ROdWCCi7/rai56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6l9:RWWBibd56utgpPFotBER/mQ32lU5
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 15 IoCs
resource yara_rule behavioral1/memory/2500-2-0x000000013FE90000-0x00000001401E1000-memory.dmp xmrig behavioral1/memory/2500-3-0x000000013FE90000-0x00000001401E1000-memory.dmp xmrig behavioral1/memory/2500-4-0x000000013FE90000-0x00000001401E1000-memory.dmp xmrig behavioral1/memory/2500-5-0x000000013FE90000-0x00000001401E1000-memory.dmp xmrig behavioral1/memory/2500-6-0x000000013FE90000-0x00000001401E1000-memory.dmp xmrig behavioral1/memory/2500-7-0x000000013FE90000-0x00000001401E1000-memory.dmp xmrig behavioral1/memory/2500-8-0x000000013FE90000-0x00000001401E1000-memory.dmp xmrig behavioral1/memory/2500-9-0x000000013FE90000-0x00000001401E1000-memory.dmp xmrig behavioral1/memory/2500-10-0x000000013FE90000-0x00000001401E1000-memory.dmp xmrig behavioral1/memory/2500-11-0x000000013FE90000-0x00000001401E1000-memory.dmp xmrig behavioral1/memory/2500-12-0x000000013FE90000-0x00000001401E1000-memory.dmp xmrig behavioral1/memory/2500-13-0x000000013FE90000-0x00000001401E1000-memory.dmp xmrig behavioral1/memory/2500-14-0x000000013FE90000-0x00000001401E1000-memory.dmp xmrig behavioral1/memory/2500-15-0x000000013FE90000-0x00000001401E1000-memory.dmp xmrig behavioral1/memory/2500-16-0x000000013FE90000-0x00000001401E1000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/2500-0-0x000000013FE90000-0x00000001401E1000-memory.dmp upx behavioral1/memory/2500-2-0x000000013FE90000-0x00000001401E1000-memory.dmp upx behavioral1/memory/2500-3-0x000000013FE90000-0x00000001401E1000-memory.dmp upx behavioral1/memory/2500-4-0x000000013FE90000-0x00000001401E1000-memory.dmp upx behavioral1/memory/2500-5-0x000000013FE90000-0x00000001401E1000-memory.dmp upx behavioral1/memory/2500-6-0x000000013FE90000-0x00000001401E1000-memory.dmp upx behavioral1/memory/2500-7-0x000000013FE90000-0x00000001401E1000-memory.dmp upx behavioral1/memory/2500-8-0x000000013FE90000-0x00000001401E1000-memory.dmp upx behavioral1/memory/2500-9-0x000000013FE90000-0x00000001401E1000-memory.dmp upx behavioral1/memory/2500-10-0x000000013FE90000-0x00000001401E1000-memory.dmp upx behavioral1/memory/2500-11-0x000000013FE90000-0x00000001401E1000-memory.dmp upx behavioral1/memory/2500-12-0x000000013FE90000-0x00000001401E1000-memory.dmp upx behavioral1/memory/2500-13-0x000000013FE90000-0x00000001401E1000-memory.dmp upx behavioral1/memory/2500-14-0x000000013FE90000-0x00000001401E1000-memory.dmp upx behavioral1/memory/2500-15-0x000000013FE90000-0x00000001401E1000-memory.dmp upx behavioral1/memory/2500-16-0x000000013FE90000-0x00000001401E1000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2500 2024-12-30_17e50c98f7413d8d31374698dac5a0c3_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 2500 2024-12-30_17e50c98f7413d8d31374698dac5a0c3_cobalt-strike_cobaltstrike_poet-rat.exe