Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 00:52
Behavioral task
behavioral1
Sample
2025-01-03_14547754f33cdef9159e2c159e3c6ede_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
2025-01-03_14547754f33cdef9159e2c159e3c6ede_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.2MB
-
MD5
14547754f33cdef9159e2c159e3c6ede
-
SHA1
dd5d42546d913f92b14ba9f4239eaab6d7d8314c
-
SHA256
ef62b82398f8d65228dd169dd046f81ebe180d76d4e24a956fd4be0fb65e342e
-
SHA512
5067ea5d32574223a6f7f5ece681ba6a651b1fe7b7aa5d2fa4b9e90e964bc501c9fbd4a55f3cb0a10a00e48576d05d10a7f182d908ce62198e102e6010ea3594
-
SSDEEP
49152:ROdWCCi7/raN56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6l8:RWWBib+56utgpPFotBER/mQ32lUQ
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 15 IoCs
resource yara_rule behavioral2/memory/3228-2-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp xmrig behavioral2/memory/3228-3-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp xmrig behavioral2/memory/3228-4-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp xmrig behavioral2/memory/3228-5-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp xmrig behavioral2/memory/3228-6-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp xmrig behavioral2/memory/3228-7-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp xmrig behavioral2/memory/3228-8-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp xmrig behavioral2/memory/3228-9-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp xmrig behavioral2/memory/3228-10-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp xmrig behavioral2/memory/3228-11-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp xmrig behavioral2/memory/3228-12-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp xmrig behavioral2/memory/3228-13-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp xmrig behavioral2/memory/3228-14-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp xmrig behavioral2/memory/3228-15-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp xmrig behavioral2/memory/3228-16-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/3228-0-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp upx behavioral2/memory/3228-2-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp upx behavioral2/memory/3228-3-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp upx behavioral2/memory/3228-4-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp upx behavioral2/memory/3228-5-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp upx behavioral2/memory/3228-6-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp upx behavioral2/memory/3228-7-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp upx behavioral2/memory/3228-8-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp upx behavioral2/memory/3228-9-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp upx behavioral2/memory/3228-10-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp upx behavioral2/memory/3228-11-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp upx behavioral2/memory/3228-12-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp upx behavioral2/memory/3228-13-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp upx behavioral2/memory/3228-14-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp upx behavioral2/memory/3228-15-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp upx behavioral2/memory/3228-16-0x00007FF6429E0000-0x00007FF642D31000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 3228 2025-01-03_14547754f33cdef9159e2c159e3c6ede_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 3228 2025-01-03_14547754f33cdef9159e2c159e3c6ede_cobalt-strike_cobaltstrike_poet-rat.exe