Analysis
-
max time kernel
299s -
max time network
295s -
platform
windows10-1703_x64 -
resource
win10-20231215-ja -
resource tags
arch:x64arch:x86image:win10-20231215-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
12-02-2024 01:34
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4492 b2e.exe 4168 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4168 cpuminer-sse2.exe 4168 cpuminer-sse2.exe 4168 cpuminer-sse2.exe 4168 cpuminer-sse2.exe 4168 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/520-4-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 520 wrote to memory of 4492 520 batexe.exe 74 PID 520 wrote to memory of 4492 520 batexe.exe 74 PID 520 wrote to memory of 4492 520 batexe.exe 74 PID 4492 wrote to memory of 4860 4492 b2e.exe 75 PID 4492 wrote to memory of 4860 4492 b2e.exe 75 PID 4492 wrote to memory of 4860 4492 b2e.exe 75 PID 4860 wrote to memory of 4168 4860 cmd.exe 78 PID 4860 wrote to memory of 4168 4860 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\AppData\Local\Temp\1170.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\1170.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\1170.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\174C.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4168
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD58bf8f5c9d34334938bf32fc15bc9404d
SHA1fc6b04c193ad23f74ea2a395d67fabfd9ac4aeae
SHA256176555a7e230054dfb5acb067e8b9306657c5c574f903e67fec1ffe8ecd0a372
SHA51247658beffb531e00acbd6e1949d549fc8a936f8af46020fb94f6664bac9d153137fdbd2a9b8fb0a5747a06810949cada5de0a014bfcb1928819904c906293dce
-
Filesize
3.1MB
MD53f8d37887d7aff453d02a72c8d8d3242
SHA1af82f2a2d0c1ca14f5c4d0a82a88be032a53fe3d
SHA256f2a689240e307fec8ee8e72b920f9d81d56918387eab55b43b563b85d96303b2
SHA512ea53880bf451bc300c40592ea693f10597005f3fe1972e1f851afb3e82b54c40557d3e286f8d19e95118f43a5e7ef8a25c12e270010ac206991c9182a62b4ee2
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
742KB
MD53eca65c57d04cd2cfb197e651a587381
SHA181ec56dc9f0d011592acb101217c990709e1624c
SHA25646db1fdb9f3bbb2aecff5977b79c779324c9f55d9eb705b9e5b4b6cfb6297f85
SHA512046efc4443e7657bb762d2a963edfb1845910795db916bef82763004b9aa62b73a6129827e47473752153a5212331c8966c067d56ba3c66f992167f444fe519d
-
Filesize
651KB
MD51d336924d8493f579ab115313a039b13
SHA1d773141162d34a7d9034c620f56e16a74e708049
SHA2562812359b9ca6eaf547a8a285207fa3f6fad8f89266f71f198d500cc474af0785
SHA5129fc7e9b0c6941ffaa03bca39261e43929e6be6a532cb5f927af9bc285bab450e16a4a55d679d5b3ccfb0efcd1bd633aacd75b863d38ba67bc95205bf81a33519
-
Filesize
9KB
MD52282cc4cc64c20967309ff3c09ef9879
SHA1d2c9a4e5d954c1360a52141e59c13cee7705dd03
SHA256e957ce01e2a712cfdb045ba87490ed676a541bb73b8978c04eb0080680f8cd7f
SHA51248dffda12ee08303cb0ef07c7f4773966e3bfaf9c3d0826d4e32886968b166baad728fcaf41a1e69f5382154d9ed6b60dbabef6e3ab38fb2988d779c3bbf7e9e
-
Filesize
585KB
MD5899634b9ea9026a16f504f6111141c67
SHA1960dd9abf1c6d5b8e935fd63453725d62af8ae37
SHA2561d677aa1551171eba1bf32a502346e7fee476923b404ab86299a0649731fb860
SHA512ffb84336f1352ea8028990dfe528d31ac9ab6c551b1cadd1e93a9da71ee921a1c10466856705894b019fcee16d747cec99308d1cd120dacbe97fa060acb63358
-
Filesize
794KB
MD545ac35ce6adfbc1723a55b9f71688bbb
SHA1451821ec880bbcad9b0ceed3a74af203f2b0903c
SHA256699b63f8fb8d525d4a59fcd595beca7867c2b7dc62e02db4244eeebb38c95a2f
SHA5123163d6ab67f0aa18744694708f2234384ad8d765d4eadecd1fe395e77ef7af446a77a6137abb1ef1baddb3ff86dc6f6c46e7bd620259c7e73b988d180ee589ae
-
Filesize
472KB
MD568431823b2e77ac5b874b485e71594b2
SHA140d726cb480311f885747758e091aa1443f5c0c7
SHA256bea5871f21671827ea032b22639108c91892028d583974437a3852b61df0638c
SHA512fb81b0eec3caa87a9e4536cfded288e8e72b693d56bcaea930b1cfa628c0a63c3a086c5055ea74da55cc7d46b551f8aa08fe36124399078c98e90998bc04d4d4
-
Filesize
586KB
MD59bf3d0fb0167129bb348e9b4ee513ccc
SHA1e63dbcc03bb7a42e11618df9729b4584d6197fa6
SHA2569fc20b62cd93728b9095746357109bbff0af3d98ff1f5043ad9d9d7bbb0328e6
SHA51252dcb433f02c443ae40c4e0a5d3c774be8ca000b3ea8b8d6035bbe06b14ff94d2a9d827317976010f50c43230979fea09bfcf866192a58876d6f246fcb3abf4e
-
Filesize
688KB
MD5b5a17e0fe9975980d3bce4cd3a16185f
SHA161516ad44fa7aa533f792d28b64799b8cc8be788
SHA2565587c80be76a0c402b1505459d7fa9332fe38dc9a3250ed8bcaeda3534a62357
SHA512b6f141b9edfd91519b3252ce83767f2cb661bdff20b3a625a0a316c775ff4b1fbb3cfab46b2b5356d902a32d6c877e2b515e6ac51e91fcf0247b52a02dea4eb4
-
Filesize
503KB
MD5a426a4a2d6a237581b17fcdfb6a8ac6a
SHA1ee64bc7ba5b51ebfa5247d21fae25a10c1983702
SHA256def4e5ae1bf68937a93460f91378c841779fc3cf5c05c612ede3eb3bb04c9ca9
SHA512aad6d88f316a4b529587e124a7056339005797b206b87da4bdd0d11e6c3610b8814042a2395334f4fcce3cfcd0e86ad2f87e19fef0e253d4c78a139f8c710653
-
Filesize
469KB
MD53167edc3602d1d0dcb192e08c9d82c3c
SHA1c4ead865a5ae110cba24708f8888370094567171
SHA2569e7b85f89d6594f9f6e2ef7f5d26a9f3790e28e3797520e1e81150e4a74b337d
SHA51244695ec4e4626cdf8a1f664fc3cf56f9aae8a6de227c69ebfdc7a7ced0bd2246d62855e27d07d656e36abea6a2e59c5c63427df4f3602bd6d9006a17a2e95712
-
Filesize
476KB
MD5b66176beab5d8d87de1b1a12e3dc5e74
SHA12d939a95b2ceaad68901513916235b60c96aa870
SHA256354d4a5e8d7ddba77172b6e322f5c9e77d2882f6b02aea0f86dd1c495347b44d
SHA5121955d22011f899bf7ad348f88c27f81884a85edcb51c0721e45493636d0437575c84ed4698f8e7ac479863c450a288d3490d25361a5c3ea6dc491861e9181a67