Overview
overview
5Static
static
51.bat
windows7-x64
51.bat
windows10-2004-x64
510.bat
windows7-x64
510.bat
windows10-2004-x64
511.bat
windows7-x64
511.bat
windows10-2004-x64
512.bat
windows7-x64
512.bat
windows10-2004-x64
513.bat
windows7-x64
513.bat
windows10-2004-x64
514.bat
windows7-x64
514.bat
windows10-2004-x64
515.bat
windows7-x64
515.bat
windows10-2004-x64
516.bat
windows7-x64
516.bat
windows10-2004-x64
517.bat
windows7-x64
517.bat
windows10-2004-x64
518.bat
windows7-x64
518.bat
windows10-2004-x64
519.bat
windows7-x64
519.bat
windows10-2004-x64
52.bat
windows7-x64
52.bat
windows10-2004-x64
520.bat
windows7-x64
520.bat
windows10-2004-x64
521.bat
windows7-x64
521.bat
windows10-2004-x64
522.bat
windows7-x64
522.bat
windows10-2004-x64
523.bat
windows7-x64
523.bat
windows10-2004-x64
5Resubmissions
18-10-2024 10:19
241018-mcnlxathqj 518-10-2024 09:38
241018-ll7kpszcjc 518-10-2024 07:51
241018-jpt3nsvgje 518-10-2024 05:23
241018-f3ch1asepn 517-10-2024 20:22
241017-y5xk3axdrk 5Analysis
-
max time kernel
1791s -
max time network
1801s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 07:51
Behavioral task
behavioral1
Sample
1.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
10.bat
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
10.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
11.bat
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
11.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
12.bat
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
12.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
13.bat
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
13.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
14.bat
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
14.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
15.bat
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
15.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
16.bat
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
16.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
17.bat
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
17.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
18.bat
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
18.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
19.bat
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
19.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
2.bat
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
2.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
20.bat
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
20.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
21.bat
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
21.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
22.bat
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
22.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
23.bat
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
23.bat
Resource
win10v2004-20241007-en
General
-
Target
11.bat
-
Size
116B
-
MD5
e5fabf2c3e749ba27836edb76b41db16
-
SHA1
bdc6e2eb78ebf221d1acc41835e3a9992269d57e
-
SHA256
a30a2ecaebe9755a9b04da590e731bb0a8eacbf6e8020e98ba38cf3f8f9534ac
-
SHA512
172f9345d1a4676f7b5a7711ee31eb3ec749494d82ec6305a4848d0b8f25902d7db10d808b82da7b8fe17cabc0d3441569020b29242469b42bb6e95ce029a2ef
Malware Config
Signatures
-
resource yara_rule behavioral5/memory/2332-2-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-4-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-6-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-7-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-9-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-11-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-14-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-15-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-20-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-22-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-24-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-25-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-26-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-27-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-28-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-29-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-31-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-34-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-35-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-36-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-37-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-38-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-39-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-41-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-42-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-43-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-45-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-47-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-49-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-50-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-52-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-53-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-54-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-55-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-56-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-57-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-58-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-59-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-60-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-62-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-63-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-65-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-66-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-67-0x000000013FD00000-0x0000000140387000-memory.dmp upx behavioral5/memory/2332-68-0x000000013FD00000-0x0000000140387000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2332 cpuminer-sse2.exe Token: SeLockMemoryPrivilege 2332 cpuminer-sse2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2332 2276 cmd.exe 32 PID 2276 wrote to memory of 2332 2276 cmd.exe 32 PID 2276 wrote to memory of 2332 2276 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\11.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespowerTIDE -o stratum+tcp://stratum-eu.rplant.xyz:7059 -u TD368ah8Kuzn2quR7g6r8sUYbsVvKzwpyc2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2332
-