Analysis
-
max time kernel
297s -
max time network
316s -
platform
windows10-1703_x64 -
resource
win10-20231215-ja -
resource tags
arch:x64arch:x86image:win10-20231215-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
12-02-2024 06:11
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3216 b2e.exe 2532 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2532 cpuminer-sse2.exe 2532 cpuminer-sse2.exe 2532 cpuminer-sse2.exe 2532 cpuminer-sse2.exe 2532 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4988-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4988 wrote to memory of 3216 4988 batexe.exe 73 PID 4988 wrote to memory of 3216 4988 batexe.exe 73 PID 4988 wrote to memory of 3216 4988 batexe.exe 73 PID 3216 wrote to memory of 3024 3216 b2e.exe 74 PID 3216 wrote to memory of 3024 3216 b2e.exe 74 PID 3216 wrote to memory of 3024 3216 b2e.exe 74 PID 3024 wrote to memory of 2532 3024 cmd.exe 77 PID 3024 wrote to memory of 2532 3024 cmd.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\D0BD.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\D0BD.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\D0BD.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\D5FD.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2532
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD591fa2a5c1d9ceeaa163a449e64fc8901
SHA1b015fd1d13ed7c95e7529d230ae3d23dbedf8abd
SHA2564787e3dd99c5f587f7586ac94058593094ff3cad7014d596a5a578a439863b71
SHA5120f5a074a607c340869ad82beebdc9879ef3648fdf96fafe712d5d29282c79655d76bb5c6abeb1974fc07a77eb78d58f0645c40f75f10eb985272c6e790a7f874
-
Filesize
43KB
MD57e52b4bc9b679e5dbfb43124783a7c23
SHA17894ad63a07e165fd75af77f3b99f0c20dc9c359
SHA256801b67170d8c4e68acec458b69e564efa82d7515cdbf4b3250a18e2ecc31744d
SHA512735ed27a95a61220e33484749b5584625055c307e1cb48c0415b83a0eeefc8e5cf847de38f25d8556665897dd98a38aa7570dfa47b1277e4dd355b0d7b0fc0e2
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
166KB
MD562df5e2af394e10694d575cefd308a0d
SHA15d7e0d3d894b6413ebd1b174c591f0b6a74fceae
SHA256205b5a3bae018c8c94eb5322f4f4f75a2d16b7a6f6e273da8a26110b47fe19e9
SHA512f3f26095962bd92d383973066c61895ed364ff2a05fbebc2e9d898772b1a660fe0a18586d5f266d0b7e6b1698c546733ab5ca6b92387003b60ef44aec8b4aa72
-
Filesize
118KB
MD5b565b9102ed29b8e848a9253d9099d60
SHA1bb8d767a3f37d1155f10faa81d2a500e2df30faa
SHA256ea17ccc14b0d67787689fcc560afb8614a52ad9db54f4fa27a67c66917f36e61
SHA512b2e79f9fa6a20fbf68b70f62114378e3ceba5a8f3ad2fb51993eb21ed68e75ab48e5066066c999673f469f9fc8878cff2b95270179a3d12706888f56f84470ab
-
Filesize
347KB
MD5b9f354142b07190f407e8d4a6580f335
SHA174e1e3a14e018563f2e28ee7f6f342a6b6ce08a2
SHA256c423537c9aaa3d6fb7176dd74e32728a7adb36746f33c50852aa1de1fedb4c62
SHA5126be032384c8f17b554da3b340ce2503bca5a20fd72e97b865571fb0781e83105fca533ccf6eaa49a34b03248b84dc181c45f51e54bac094ce5c09d2d089c0060
-
Filesize
154KB
MD5820a078ecc5dd8d673b389b7b4e19741
SHA18ea321ee7aa58768c154d75b894fe7abbc2689d9
SHA25647c276225641668a2aa084a93fb4dacc138324602693d7c93130083b74054fa9
SHA5127107d2acaddd4ef66b6e298cccca87f82f75f04ba72b2f1e9ac7bddc9f8e6bfb27ae140d378c213ceffd36f1cbec777d5c893bd7c69daaa9845435ca1285a323
-
Filesize
227KB
MD5ad4833d34bb31c3b49f1bb4b708f1331
SHA1d00e95d76f29d9bb958f640efdf2d2c3770dfec1
SHA2567148ed33b2f506008390ad43c123b8a5599e0ce19822f4e9172710555e858050
SHA512291b4c4e0bf5fb176800f6d838a5df532d11c6034884d0e22a2ef9f9f1cc4ef16b9cf5906ea5dde59e48756d992f6693e8325c29690e5f336bab67bff71e2cf4
-
Filesize
1KB
MD5d7c75b973084fc64536bef84775773ef
SHA14ba97a231c651cf0bb9f21c833d0e15d2c1057d3
SHA256de7e877c905b61a5c6c6d5a60040ee125a9222cc4dabc1398393785bcdb82983
SHA512e8c5afaa40f10c983ec4470ca3ebfcddd9d5ef4dcc61a4dee165ddfb63d878f9a9e56f74a447feb9337fa332fd94f057ec6de16622b030764aa78137e8a5a808
-
Filesize
163KB
MD5d68703a3933d967d5013186861e40316
SHA12875382ccb8a035052cc44ea4c62e82f3e961bda
SHA256aee71e4f57be7082a1bd53d20697c7acc91838586ce50df3b3b9410abf7b7f55
SHA512fc62be7b65aa89313c9ce080807f1841ec06cd740f003b5cb4bfb0dce0b63e02d7d226cb54053c6cb8cb7a228a578fdf1df1835735ea9e22a29e70b14a14451c
-
Filesize
146KB
MD54d869c991c5be915983af4a6a3e010dc
SHA1f8f1ee49d0166f185b38c1111061b26c5510b2d3
SHA25617e3c36f3230bf62824010dad075182e0a1e2c467c9da14cf3f5b7798efa2424
SHA51230873e18293e62f74a3ab076b7ea35bc6505ebc59ecb17699c551299e60b611a2bc0d1dfdef6c4f0fcef6f0c4f66e2805ee661c3b78a9501642caa65b41619dc
-
Filesize
75KB
MD535727d6c0029c830a5712b7178cd5102
SHA19a1c25803209db15a326780d5a1918d4d7de6478
SHA256fb495db597e25179a4ba110c2950a6258bd613daf30117cca9582d468fa64c55
SHA512f7a8ec83fe9c3da540b5ee066b741bbfe30f199b24feb46c1615351756861872df8262ef9c3b8af5ae395cacfec9bfb69b903afee5677596202a2c481c1adfc9
-
Filesize
247KB
MD5fc9130652ba9cf6c06d995ad89bb398d
SHA1b4585ccc398fe41751e55db4e96f8ea675a91c45
SHA256dc53619b81bdcb88c42fa8af9c4b4c6ba69c218cae788893e95656d1fc05013e
SHA512b278ccaa9ac9718a38411f8f0cb8a8e623c5d50eabe27e372a86cd2b283c956ddf9079c7cc76aac4e6d420c8bd0858f0cd1653e176830c7287f9c7a98e98a569