Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2024, 03:01
Behavioral task
behavioral1
Sample
2024-12-30_d6ba33b8481fae4fe5d63311199ad644_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
2024-12-30_d6ba33b8481fae4fe5d63311199ad644_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.2MB
-
MD5
d6ba33b8481fae4fe5d63311199ad644
-
SHA1
8329b56605670e957864a39856153726cb442c7f
-
SHA256
da2d22eb6f7cc2e9a9b6a99ebe9aecc9e8865039e36a6de71857dad1d09ceb7c
-
SHA512
dd0b3bacff2d9e879793d3e639a48023a861d62d60d503e78bc0668dce60a3f3704a5048266b10a3469b5bef97a2934f867a5cf240dc0e75ac093509bcedfb3f
-
SSDEEP
49152:ROdWCCi7/rai56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lV:RWWBibd56utgpPFotBER/mQ32lUp
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 15 IoCs
resource yara_rule behavioral2/memory/4304-2-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp xmrig behavioral2/memory/4304-3-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp xmrig behavioral2/memory/4304-4-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp xmrig behavioral2/memory/4304-5-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp xmrig behavioral2/memory/4304-6-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp xmrig behavioral2/memory/4304-7-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp xmrig behavioral2/memory/4304-8-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp xmrig behavioral2/memory/4304-9-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp xmrig behavioral2/memory/4304-10-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp xmrig behavioral2/memory/4304-11-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp xmrig behavioral2/memory/4304-12-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp xmrig behavioral2/memory/4304-13-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp xmrig behavioral2/memory/4304-14-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp xmrig behavioral2/memory/4304-15-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp xmrig behavioral2/memory/4304-16-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/4304-0-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp upx behavioral2/memory/4304-2-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp upx behavioral2/memory/4304-3-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp upx behavioral2/memory/4304-4-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp upx behavioral2/memory/4304-5-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp upx behavioral2/memory/4304-6-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp upx behavioral2/memory/4304-7-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp upx behavioral2/memory/4304-8-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp upx behavioral2/memory/4304-9-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp upx behavioral2/memory/4304-10-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp upx behavioral2/memory/4304-11-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp upx behavioral2/memory/4304-12-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp upx behavioral2/memory/4304-13-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp upx behavioral2/memory/4304-14-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp upx behavioral2/memory/4304-15-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp upx behavioral2/memory/4304-16-0x00007FF6836F0000-0x00007FF683A41000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 4304 2024-12-30_d6ba33b8481fae4fe5d63311199ad644_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 4304 2024-12-30_d6ba33b8481fae4fe5d63311199ad644_cobalt-strike_cobaltstrike_poet-rat.exe