Analysis
-
max time kernel
294s -
max time network
297s -
platform
windows10-1703_x64 -
resource
win10-20231220-ja -
resource tags
arch:x64arch:x86image:win10-20231220-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
11-02-2024 20:02
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231220-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4448 b2e.exe 1240 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1240 cpuminer-sse2.exe 1240 cpuminer-sse2.exe 1240 cpuminer-sse2.exe 1240 cpuminer-sse2.exe 1240 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/2348-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2348 wrote to memory of 4448 2348 batexe.exe 75 PID 2348 wrote to memory of 4448 2348 batexe.exe 75 PID 2348 wrote to memory of 4448 2348 batexe.exe 75 PID 4448 wrote to memory of 3188 4448 b2e.exe 76 PID 4448 wrote to memory of 3188 4448 b2e.exe 76 PID 4448 wrote to memory of 3188 4448 b2e.exe 76 PID 3188 wrote to memory of 1240 3188 cmd.exe 79 PID 3188 wrote to memory of 1240 3188 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\92E9.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\92E9.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\92E9.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\94CE.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1240
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16.7MB
MD50706a20818474bca0cd8ee0580db56b6
SHA1b87b2d851f566f3003dc54211bb725854a551e80
SHA2562c329ec771df684124fe9da8ac05d06e990c0d5bee031a8da8bba9ca242a5169
SHA512aca2eff07109abc35ec4660842e7dc4500eb839b9848372aa84f28f55302abee02bcc3d54bfbdeac0224e694961282b691353f7f6009057979fafa42e371ab1d
-
Filesize
17.8MB
MD580e3f606a7e96be480c1f3396f51f194
SHA181cf9f5dfaec19199a640e46d43a3801cfcc49ac
SHA25648a2b72d15a467ca862a6d90694a7da492a17bb4096d447470c0f5aafa47368f
SHA512e2be6bf83ce5cee33b3b92a30b1f3c4efcad6d1e33b5083bd7f8fe1a130982e7cecd7ef196e0d78202af4c29ef08b782cf0d490a6abf1ec8fca9b7dd6aad025b
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.3MB
MD54c04147c386ba8792ac6a03069572a8a
SHA1dda67789fc1d0f2469ca95f01a5c81034853ca6a
SHA256c7739a1e940a282703d06eccda7110426d306f390e97fdbbd9df18472fd132cd
SHA512a8b5a0b878a9a7d30cb38feff814e1f4dce24d000158edc10a43ee9a89920bedf7adc92eb7e3913098b6aab7fbd0531f56fc09f508b5c2769992a94e55d153db
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
5.0MB
MD594966fc4ab271306a8f5c285c711a370
SHA17f6de8fd0ce9635ec851b55a331aaa9bed5a8f3b
SHA2560f270e2ce92cc44905b429e49bc906e8414a2537a5d66923d0df3ef5e544e8c5
SHA51276a82e225f7dd17711da8bdb506dd096f5c3dc13b2d8ac59ba55737202985389ae470836c5fd3e5a47a93600e0bf953b8a9b829dbdaadd46e89e3023627a9705
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
5.5MB
MD5b98562cd210d63f56a7e40f1780afc74
SHA16ca6946c8497ea0e79b5f0722a7fdb670e8f844a
SHA2567aa7797c1fdd3a82f907d6b1320c24a261cb636dea95c7a4c0e48e347c618794
SHA512de1283ba503d133b466bf5b090cd8002d48e6b14fcffec0a5c00cdb3cb759c3ba5a835fc33f9c13085d7091261f924a5d969e91a8e4ecadf82b81c9517e57478
-
Filesize
4.9MB
MD50dd93bb3ece384c5d1c10ae567d08006
SHA14130a7b7a799eac8671b564201e462f82eda197d
SHA256fc5349c5013e9e286c05c60b049309674ed4d811863f0bee8d528440fbff661f
SHA5122d1785f3ef3ddf3858fa468792d1bb4d7f6d3ccbc4b1f21c08eaf6a146866d67ca90cf31cd3132556003c6cdc217a87da86e52a98902906f61693df0a862a3b6
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770