Analysis
-
max time kernel
292s -
max time network
299s -
platform
windows10-1703_x64 -
resource
win10-20231215-ja -
resource tags
arch:x64arch:x86image:win10-20231215-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
12/02/2024, 07:53
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4428 b2e.exe 1396 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1396 cpuminer-sse2.exe 1396 cpuminer-sse2.exe 1396 cpuminer-sse2.exe 1396 cpuminer-sse2.exe 1396 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4700-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4700 wrote to memory of 4428 4700 batexe.exe 75 PID 4700 wrote to memory of 4428 4700 batexe.exe 75 PID 4700 wrote to memory of 4428 4700 batexe.exe 75 PID 4428 wrote to memory of 3076 4428 b2e.exe 76 PID 4428 wrote to memory of 3076 4428 b2e.exe 76 PID 4428 wrote to memory of 3076 4428 b2e.exe 76 PID 3076 wrote to memory of 1396 3076 cmd.exe 79 PID 3076 wrote to memory of 1396 3076 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\93C4.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\93C4.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\93C4.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\95B8.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1396
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD5a2ed949b75923c51b782d7b81dcdf802
SHA1dc9d85cdec1995721a08b9fc2e563be91eb971dd
SHA256851a8eff36d35c215f4df1c2555949fef3830e66afd0e9ea9f6170dd06a8fc15
SHA512e8ce9ad51bb52877b1fda61b283cc369cef2cc3fe366f2db1bdf90b5efe4f7f179956a8459b0e471c16836c629390044830b29379b0228b5262c4f5b755de35c
-
Filesize
3.7MB
MD5d32776b42aad5064a0599efdf3f6d967
SHA1347d98f0c64d9cf7fab8c944f688624166eb95c4
SHA2565e5b7a0308a04c6934f5332e6b0f3f8cd4e45093498281b22c80a7903ce2a21b
SHA51265c54d5e81edf8ed1478484df309610efa81cd6e6977cc43d03d8b36c24aa3aa6bf3b3f7256facd8b62a8729328b1c9c4706a678aac16d98a38c8ef0dc8a12d9
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
979KB
MD58a53f4610ba8ae77d01912ac6464c6e8
SHA1dfd753d2b486b54e63bb70fb9a658ddb548cb3b2
SHA256c8baf5196cae4c0715c2bd7a7867420e4bf15b9fdeab35243d97a1ffe7422f36
SHA512d0829af15359dcb4d7173ccec71e6a10d9bac9811073ad160dbf8c399aa31f281b92648cd032b50fa3b4a710f0c6f9b4190744d9589dcb6f6cf4e6bbaf499f97
-
Filesize
1.6MB
MD5d2538679953dab645cfd01cfc9be9d47
SHA144b1e29e5c19f96c8f3bb6f21ac4d7278c211269
SHA2565dbc9c0232a929d79117e5671b0f900b4ba5e5c415781311efa7a2faea167e85
SHA512abc5040fa8f84397e060fb64b4def5067cfd382b4aa9e9503e2f792cd6c21ade1b92105e7c4df2f1b0bc449e844e0737f6312a2cd09c6c8481a727a53303919a
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.3MB
MD5600a4017478648ae6b90ad361c3fd64f
SHA1d0858022e5df63f97244e7811059ade423d5583c
SHA256ef115d948b4cbfb3cfa820dd65efa8292e09f5d17ac2da59661e64141107ae22
SHA512f5eed60bed7786d31583d923a0dbe8e26a88e7a4c0874fc9ae7f6043fcb98dd419b7369c652cf3e50379a1763df4aba5646d0b6eae5b76bcebe2d3da4800aef9
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770
-
Filesize
810KB
MD58be6401ba03b0cb78e5213296babe05f
SHA1dec3fc48398b2a6d42f7c0896850112c2403a00f
SHA2563057bf29b74aa28bfe3fde202317a362e1de767c842e161a2f21fa9fa2e101fb
SHA5128cb6c04e2cee0b588e7e8ee5cb7c63ed889c680cf91288bbd2d9ab6bc54ff74406ab43cbcf3fa34c29669f5272ed55be0dfe2e2565d7422ed90819662d555727
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.5MB
MD5dfafb42431926ae514bf248e1027d919
SHA1362a51eae375c568536c4da04378ae7083dcf78c
SHA256cafe7f030ec6bae2c2fe81ec436a4377d3284de9d1227dd1f55b28197027c25c
SHA512a77fa849fe059e741e625b197252f7db612f97549d176a03df9768f25b28b8f926ada730e2e28f57f3967053a424c4a8a7ca36800c76aff0663aa144516da4e5
-
Filesize
1.4MB
MD5f31c7033a96094a50c7fe1a8c723c8da
SHA109cf2f8ba606efd7530c76d87241a32af8e89b05
SHA256f8fc9648e47608d067c76dd1104c48ebcf69f983d2514ae7048ca9f484d0638d
SHA5127afcb4edf7faac400ee4f683112f2fba6711b266b669f07ef1c5199cb56a293c4e3f05eb9ba96331e0452b9d07642503232e25603c0135cd95d2e46840f31794