Analysis
-
max time kernel
296s -
max time network
299s -
platform
windows10-1703_x64 -
resource
win10-20231215-ja -
resource tags
arch:x64arch:x86image:win10-20231215-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
12/02/2024, 07:35
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 648 b2e.exe 3304 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3304 cpuminer-sse2.exe 3304 cpuminer-sse2.exe 3304 cpuminer-sse2.exe 3304 cpuminer-sse2.exe 3304 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4256-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4256 wrote to memory of 648 4256 batexe.exe 74 PID 4256 wrote to memory of 648 4256 batexe.exe 74 PID 4256 wrote to memory of 648 4256 batexe.exe 74 PID 648 wrote to memory of 4860 648 b2e.exe 75 PID 648 wrote to memory of 4860 648 b2e.exe 75 PID 648 wrote to memory of 4860 648 b2e.exe 75 PID 4860 wrote to memory of 3304 4860 cmd.exe 78 PID 4860 wrote to memory of 3304 4860 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\1335.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\1335.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\1335.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\19AD.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3304
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5db5c09852a9dce74cc260d402b8487bb
SHA17f53cb14088c23cb2140e52b245535100dfbea85
SHA256e7a5f75e6901b233b87b806134d5bea194e44705f263f86f471c89fd16d9e262
SHA51283f204c1b641a7c4e33b91cad2fe52c450637ff5653a8d98709d728f7930e9a9e13ceb974c2cf8e622f5ded0766ec86ca01684e3af80f6fd00100c27f36df133
-
Filesize
2.5MB
MD5036497c24473beb8f8d9c1212358ce98
SHA1f7c4570c19b506d7d59b05bc264c6009b193aff7
SHA2564c4fa0ace372c5556c189efdf8aa36f3335d0cc94397c7f26f029cfa517f471a
SHA5127b15dac4c0c30e115f1f9cac684b6b1bf7797515b0b88b4ecf3107910a1f062cdc4280ef9aeb80274d3d9750b5f4ae55177302bfcfd71f801155f1ee80d950e1
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
738KB
MD587e34e3a5b6ebe1904186e7f860bbfad
SHA1d4ee74cd16566aa3b422fc9e16cf025643704994
SHA2566bacad1f1192b820440be5f0fe01b96d0e84f5aaf0c1582e06088cbede37b9c4
SHA512a6c902fd1cf464c60781b5fbf28ae6c4f2a5c85eaab620ffd85e372c267a2bf2556b196d378456da40f46c94bc04ec2e7731727c19ac45a60856e03f9e3bd267
-
Filesize
748KB
MD565ae21bfbd0d0221306ff7fddd58f46c
SHA1aec89bebd4656c3f379a5eb6c83feda4c26c06d5
SHA256906d7e2a1972e71e061b1ecc9ff54b67719c90bedf34a4caf3a34c10749ed1d6
SHA512dabcd98c4a869c510542c50fe22b0aff7f0c4ed18878313b16ee28b247f2aee93fceda2fe5470bb18a59356d5c7e1b6f5098566e7c8403de5a711859f4d25d1c
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
704KB
MD5ecb92b50b30e6492a14b6102ca1fd4c2
SHA1758fa80d1b674ecda5468717ea7cb2387ab0cefb
SHA256aaba52604f8cb66beb3009e0aee922fba6138175039bc2d0756958144a7dfac2
SHA5128c276fc78bac795fe9694712764e920e5fda7452ecfbecc938b50321a08d5d6c6d5b747fefe2f59240f8ecfc19b24e5f39bc45cd8d0845590429ed1327b39690
-
Filesize
1.2MB
MD5886af5c6664aa8e7199c984cfbaf11f7
SHA18b1b50dc288cbfcf980730bde3b2c6e4968bff31
SHA256d79df4eb040b567c5fd7fa83a7a74fbe99e4e5653626e0e81b99f1c2d863b288
SHA512ae353750c1ba13b776c90151f93028f4abe472ceb0a9cf2037eec1c620716d5aa911c6dd4586c9e4b70f70ad7b0e616bd29e3823c2d5a413c14ab419aed08be2
-
Filesize
829KB
MD5bbc3f478d40c5aaebc525f006c445559
SHA1e14639b946d34436364e258b3c88374a4be34334
SHA2563cfdb715fdc561445b0395f279f5acb9f8ef31ac81bc53d6c4c8f3c4d9d50c82
SHA51221ecdf8ea94a38a038962288709118799f130908e6c3798d0d800ea96c0afa0c3f9c025325280c7da500ba3722f5c2e829f3d46c2db97d4c70fe09304f065b6e
-
Filesize
891KB
MD53fce08d92bcec7620d0dcb46838bdf18
SHA1944d343bf6ecd021f6b787dd7b3fdb7c829c215b
SHA2569f3f0f616b36fb896e84a8fccb50a4386b65752580f43c2e100f1d6e2034732e
SHA512143be6368864c1a9a4b48c476d3b88b93c30ade0c74a607032c19dc6d937f4df200c9df0b36601e0b4973166d5695b0c3a1c05a3455ad3b5b563cddc644ecd1d
-
Filesize
1.1MB
MD5f6b1e0bb10a6948763ae0f8a07849ae9
SHA11ab24e0cc9b38e80081d61ff1a9ccfbb3110b5f2
SHA256d0d32666aa761d4b86587a084a744b29ec0b82a20e7de072a44a8b061ab10baa
SHA512900721794f11c3d9f542aff0e1ff324ff74c8c8f16316846add4205cbc5e872986452264b5bbea3132e563993692e4a7811e08ce1f18359a95b9c9c066cfccc4
-
Filesize
769KB
MD593e1e297d7b017bb7d18ea617fc82fcf
SHA174002734bdef9f3231647355aa8be6dd0f7423f5
SHA25666b9cec1103a321b0567c31717ae1109e7baf15d303f939f90effc74548a2da1
SHA5127f89996a8d850a016973004f958794c48a5219ae6a3ca38e5232421a751209a79f5ae575199cd488fb5db91966d9d05fdfc7d4fd90a3e072367b0972f33083be
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770