Analysis
-
max time kernel
19s -
max time network
84s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20/02/2024, 07:31
Behavioral task
behavioral1
Sample
cpuminer-multi-rel1.3.1-x64.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
cpuminer-multi-rel1.3.1-x64.zip
Resource
win10v2004-20231215-en
General
-
Target
cpuminer-multi-rel1.3.1-x64.zip
-
Size
4.2MB
-
MD5
d51d1586a806f098761dae6934aa6a4b
-
SHA1
8028751d54b7b1ac513dd360286c96e389ccda16
-
SHA256
1208fb1c3cbdcbfc5089d46f4ab339d494139ba904e84a41a1707f7723edb7e2
-
SHA512
b6b9e51c35224d70585a3d1a09e220670f46fd1d38a3237583fbdb4c4acd57f6803a7893e1aece24bee4d7598710ddefa93f0451cdcb6b0a5fe050d416d7a999
-
SSDEEP
98304:E65BrUcuBokjm41JWsB6I5d7fUL/wHyWKkhag74cp13bXwDDwKWqi4QGubGs+:E6nY1m4XBYIDfUUHyW7agci1rXKUGNQ6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2588 chrome.exe 2588 chrome.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2588 wrote to memory of 2736 2588 chrome.exe 31 PID 2588 wrote to memory of 2736 2588 chrome.exe 31 PID 2588 wrote to memory of 2736 2588 chrome.exe 31 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2788 2588 chrome.exe 33 PID 2588 wrote to memory of 2796 2588 chrome.exe 35 PID 2588 wrote to memory of 2796 2588 chrome.exe 35 PID 2588 wrote to memory of 2796 2588 chrome.exe 35 PID 2588 wrote to memory of 2792 2588 chrome.exe 34 PID 2588 wrote to memory of 2792 2588 chrome.exe 34 PID 2588 wrote to memory of 2792 2588 chrome.exe 34 PID 2588 wrote to memory of 2792 2588 chrome.exe 34 PID 2588 wrote to memory of 2792 2588 chrome.exe 34 PID 2588 wrote to memory of 2792 2588 chrome.exe 34 PID 2588 wrote to memory of 2792 2588 chrome.exe 34 PID 2588 wrote to memory of 2792 2588 chrome.exe 34 PID 2588 wrote to memory of 2792 2588 chrome.exe 34 PID 2588 wrote to memory of 2792 2588 chrome.exe 34 PID 2588 wrote to memory of 2792 2588 chrome.exe 34 PID 2588 wrote to memory of 2792 2588 chrome.exe 34 PID 2588 wrote to memory of 2792 2588 chrome.exe 34 PID 2588 wrote to memory of 2792 2588 chrome.exe 34 PID 2588 wrote to memory of 2792 2588 chrome.exe 34 PID 2588 wrote to memory of 2792 2588 chrome.exe 34 PID 2588 wrote to memory of 2792 2588 chrome.exe 34 PID 2588 wrote to memory of 2792 2588 chrome.exe 34 PID 2588 wrote to memory of 2792 2588 chrome.exe 34
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\cpuminer-multi-rel1.3.1-x64.zip1⤵PID:2416
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2752
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6389758,0x7fef6389768,0x7fef63897782⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1348,i,16320378385955794397,4042451096655263223,131072 /prefetch:22⤵PID:2788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1532 --field-trial-handle=1348,i,16320378385955794397,4042451096655263223,131072 /prefetch:82⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1492 --field-trial-handle=1348,i,16320378385955794397,4042451096655263223,131072 /prefetch:82⤵PID:2796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2168 --field-trial-handle=1348,i,16320378385955794397,4042451096655263223,131072 /prefetch:12⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2188 --field-trial-handle=1348,i,16320378385955794397,4042451096655263223,131072 /prefetch:12⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1448 --field-trial-handle=1348,i,16320378385955794397,4042451096655263223,131072 /prefetch:22⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2964 --field-trial-handle=1348,i,16320378385955794397,4042451096655263223,131072 /prefetch:12⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3732 --field-trial-handle=1348,i,16320378385955794397,4042451096655263223,131072 /prefetch:82⤵PID:924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3928 --field-trial-handle=1348,i,16320378385955794397,4042451096655263223,131072 /prefetch:12⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
194KB
MD5ac84f1282f8542dee07f8a1af421f2a7
SHA1261885284826281a99ff982428a765be30de9029
SHA256193b8f571f3fd65b98dc39601431ff6e91ade5f90ee7790bfc1fba8f7580a4b0
SHA5129f4f58ab43ddadad903cea3454d79b99a750f05e4d850de5f25371d5bec16fc312015a875b8f418154f1124c400ae1c82e2efd862870cd35c3f0961426c8cd82
-
Filesize
192B
MD5d1034eac0a91ab3fd01574492f46c4d7
SHA1dea98b6fbf8e04e613cf9ac3cb45659b06706a37
SHA2561f25e6679348be66388ce9c14077252d12647ae6860caeb5443570f2527177da
SHA5126149816473d66ce328ec0b903a504e37049d5c902238a1e382c1cc25ca8e304a9c6017532c2d457056e3b10d9d5fa160dd851e404dc57bb941a7d963aa324de4
-
Filesize
168B
MD550f7d93072ad6102cd4c767471bff99c
SHA1a6021a67c1bd9cc43aa982becf08bffca26bb00d
SHA256ef5d6c128e41ee1f89d4334a6f07170d02de8681eb061d25ed85728c300e5fae
SHA5125f1b9709b806b282cd319198df41e846777fe11cfd023184b2d2a2a3ac37406f6820220db9c5fff6e9b1d7f2d458d775a9ee5e43dea92738a68f2e4b16b0be76
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD54bfa668df6a9ec89233b1431a6d0304d
SHA15f992f74568de844591933995cbfcd6a74ee502f
SHA256bebc7a0a2b9ad86b049b4da952f7685ee0edf02468545fa2a870c3329eaad54d
SHA512c07db3ce808e020f530a7eaa321b972bd5fbd3731a64441b54c28758acd0e7ab71308231ceff286b212c6c534d889ecc4fdf510436be37ccb166aa00fef6c565
-
Filesize
5KB
MD5afe28fc1990dce8eaac050617e08cfd6
SHA10ef6026d89530dec5d0ea3162c252da161832eef
SHA2567267a86ab049b15eb3cfb327ec16e886d6973204f67a4e2657f8192835954f3d
SHA512010a76aa71b67e7a9f7f6965cd3e8842241ead2386af0f6219b9031271cbdad578cbdf9785f352241c350f3b1ef19a87766ff5a6eb7256c3be7368bbea9b5ae4
-
Filesize
5KB
MD5b4475eaee0ac57f8bee2917001351c27
SHA17f7ff1229ff5a3b54041776d1672b035268a784f
SHA25628bdfeb2b823eea0a8bf501bf482e4e908826fe06d298b9fad8a7383a86064f1
SHA51218da94568ba1968ade78cd8a0df727b2c6753ac3f73e3adab9f9739c6b8bf8f9332ea522948e5b5719df61b6312dc7cbc7d9563e721f71bf50ab66c15a186625
-
Filesize
4KB
MD52ceeae5a7b665176140bdb8d68e653ce
SHA19a138f7f24b9bdb110dc94499e52b33699e51fad
SHA2566bba09c5763bc689b7e12242b5d47274218a2a5e2dd9831cf207f2084e8377aa
SHA51252fbc7895cec8ae98dab7eab7877b67b5c7b8f5249658da3dfc78ead5061709c33d38fd84368de67131f4cb8a32485ed514172a2a321022e35a3e2d7180e66cd
-
Filesize
240KB
MD542020771ca6efae5da4d03f2711e3d4f
SHA1564e4558bb56100f2733ca5d9e35f4591fb243be
SHA256776e10fe9d1b67c9625a5b377bdee31ffbff1188ec22208d36853aad76d547c2
SHA51249a8663eec0bdc920e559760b814daa3da04ba3a73bfafbe447eb01a18ffb995935afee1dc0bf697c979dc6de123d1dfdd5fdbb32761c8dc569d2467c5d9d2f5
-
Filesize
240KB
MD5769a70bbb601e994f63ad8fccf0d54eb
SHA17f49de994ce11e71ca1929b72d4300e191b6d76e
SHA256e108ab9067e62da387fa1aa7f2e72196099d66111226e5e3298372e12c0dfefc
SHA5125244f58f68fee199c83e584fb122b8411c713c437878b4a1434a7021edb7162360c0dd5996f0fc34bab34ccbc3949189ae19659ee6c2ea1fa0c6ea2db6201190