Analysis
-
max time kernel
293s -
max time network
296s -
platform
windows10-1703_x64 -
resource
win10-20231220-ja -
resource tags
arch:x64arch:x86image:win10-20231220-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
12-02-2024 05:59
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231220-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3912 b2e.exe 3748 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3748 cpuminer-sse2.exe 3748 cpuminer-sse2.exe 3748 cpuminer-sse2.exe 3748 cpuminer-sse2.exe 3748 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/2172-4-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2172 wrote to memory of 3912 2172 batexe.exe 36 PID 2172 wrote to memory of 3912 2172 batexe.exe 36 PID 2172 wrote to memory of 3912 2172 batexe.exe 36 PID 3912 wrote to memory of 3888 3912 b2e.exe 49 PID 3912 wrote to memory of 3888 3912 b2e.exe 49 PID 3912 wrote to memory of 3888 3912 b2e.exe 49 PID 3888 wrote to memory of 3748 3888 cmd.exe 48 PID 3888 wrote to memory of 3748 3888 cmd.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\91E0.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\91E0.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\91E0.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9395.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3888
-
-
-
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD53e63d8d147aec3c4d5e3e08d79395350
SHA1633cc399218c2915b895a83bda89bce9f37e39dc
SHA25639cc053a2dc8074a4530b02f00bd8bb723e52196224d978d9aad3b0f75740320
SHA512545308057e5ea490e55f5bdd7fbec20fd954f847cae6f60460a4b135bf76c4c8502d922768d8e3a96d29d4c3a513b91ebc40bcaf5395de2c50d4368fd46fc536
-
Filesize
74KB
MD58e9d2909374847cd66f9d0da514ebecb
SHA1f5b0d391e8f8391a7ad960e80e2214e3c0c40e85
SHA256b3c566f00a11a0891a8cc7ffa4014d57e56d7b02b66045a6610fc7d7be4bb712
SHA512e2a9cc17b22533a65de26e42a7e083b366fca7c22751b5704d9d24808b034d2bc0cd28cecc274b36800c8cd50cefdc5cb93cfeff1ff7984ba21d876358faae1c
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
307KB
MD57079b43e53e11e9ce62c0a993b7584eb
SHA1f8028c318f63eaa2edfea3759c213dce777a5c47
SHA25645edcd28ed0f5e9c18e85208fe92a58243f15e44ae20e6b37989f0f4713f1b07
SHA5120b568df9cb947e3392c90cf59f9eebac7ed4b879e6c7af19b52e2efbcb10f3ae28ab18922e2d2817a6f5e13f6a2e5d6731195612f60136e777e31baa21af9e27
-
Filesize
643KB
MD5b8b51db380a5769dd15353fa53b2f53d
SHA180f9a664bec21e12654cda631f1b2c6d4dc184c4
SHA2562643a09b48799d369ce60937639450a61663e6fd2c351eac191c70e8e9d74a18
SHA5123f8468422bdc65afcbe05a2577e14a69d9b44251dc3e49979709178605a548ccf5b569bcb42eef7145b04486165bc72fac34f40f080793840fa28747b572d3c1
-
Filesize
605KB
MD5958e992d0a3f37850d832dba33184cd6
SHA16af595dc40ad2122cc72a3efea04c96c397d9089
SHA256f547de08ecd6e28db5d9767807a1340d5af7d76e78c8172dd1c9b91a0ba01d8e
SHA51265565c6a5d08e8f5fbdbfec8b387cc2edd5e65f33c3a49efb969c4b7dc6627e28ade9556e20ff7df412194ee122a0daaf24e5ed6acb861694ef1198734aa31c1
-
Filesize
443KB
MD589534d048ce88192bd5a4e60b2b9fd7f
SHA1cc8b6c25782f17c907c3ef92a8d8b52873b608e4
SHA256297ba0ecccb16773d141d4da692edec189541031d37dcabdf7aaaed7a9966ec1
SHA51276413e78dbb1acc1d35f1bf412029dd898cbca4de111b26d79ebd16b7a377bbe947979167fbb3852b85c758e8f82275957a023a9f15c4a3584de7f368f9082d0
-
Filesize
381KB
MD5d13a714e7e46e4d36e14ab0e71fe9f8d
SHA12c0e5c50de96b9d5fdcd9e828a058e0125259e17
SHA25694bb846a4684a03d028afe8981c8712a3d941e2eef27f8246a2356466c7a531f
SHA5129acb1219e27395c3bf7106c2aae4bcdd72ca6c0654c36de31bdefc5623ae9840e98e4c4fc2fcb615190da099bb46283064cdf1c1c64835e4dd8115044857e4cf
-
Filesize
517KB
MD50b7b9263c4e7fe6675f5df27e4959810
SHA1ce9b4ea7c6a6049194a158283559f363ebeac7e9
SHA2563b4e91420de8ac2a689281ac1b94401ac206dc492d4a7e37d7ba1293727b9b76
SHA5129fd45e6226592b13c339b28dca74dd4f6e4afb1808fb4cc5c4e424ce6443e353bcf155950ae4ef03046f577cf6a8966943baa2d626c99349be43cff2a9dd4f03
-
Filesize
508KB
MD537a8509e6fae4078f335bacab8a2a342
SHA1a54f4e81e79a80afb0b39a4cb77ccd5ddf630d0b
SHA25600a2f0334b67a1c2ac955540eda72434756c2325879071e5820ebd76c50bf711
SHA512581fe899476f4a4cc234860c0081187e99af9db717d34e6aff59d781729491363c596abd0b1321dd98890bf7b698990be8ca39a5380a07b3c2ef2c72d1e27476
-
Filesize
522KB
MD51d3c6f89a8455662a4a7d6829e83659b
SHA115670948c1c08b758de0f30941f5714ecd6c010c
SHA256b55929729731afef5bca7843d83fe23333262ad425f25a7e3c23ee974537dd3c
SHA5123b03b76909c849e334095a7640c96a9ce4de1b5f50a71d98cc09d89c44d6ab190a66caf71374afb5f1c0db01eedd6e63de70a4af9a49fa998ec0c9c19ce3f7ba
-
Filesize
214KB
MD5a6c28901d2be649c82c37db60281cec3
SHA19af803ad8fdb267d106a60f9bf2e340a1e552d44
SHA256f3d692431c4a7a6fba4ef0245038ff22a0bfadf5423c65f52b8adf6e6e4a6ab4
SHA5121308a5a1714ebf86c5fbe8921a600e8b94f62ae0736e52ec71957388f8ff3cbf734ee145cd8488047e0491f12107ea7c1e2e7b89ccaf1cc1a5099318a2388493
-
Filesize
639KB
MD5c90a59349da004ac741f9839f6f1f391
SHA1450a053b8732baf1d04f5f9bf46c6d045997447f
SHA2566ee8ba00df4c98f0e2f7b56057070d077e7edb046b314395de750b3fde6868b4
SHA51222f0bdee03963f11ec85a94da7ae94876d501aedf93bb5107beb8eaccfce2cdc551eadcb530e90daa61d92631d4a9f019e37a05b327b03221331c11a94ad6e24
-
Filesize
146KB
MD5cd3394b99421e305cdb22c6da21d2b87
SHA1f7c5311dab4bdf06cc0e703426fcf4d5e452e6ee
SHA2567edd33a5631d896343e5556482eb6f5902e0dfa924a109cade020d76405f641b
SHA512aff1ab9bf5f2fa37776bfb3e588816aaa5ddc07f7c382a1cbef2cc76a0af9a618c52f02259fdcd9fc0981d3bddb082f4de2c53984b072c704a6a77095679e063