Analysis
-
max time kernel
293s -
max time network
303s -
platform
windows10-1703_x64 -
resource
win10-20231215-ja -
resource tags
arch:x64arch:x86image:win10-20231215-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
12/02/2024, 10:10
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3956 b2e.exe 1280 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1280 cpuminer-sse2.exe 1280 cpuminer-sse2.exe 1280 cpuminer-sse2.exe 1280 cpuminer-sse2.exe 1280 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/5004-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5004 wrote to memory of 3956 5004 batexe.exe 74 PID 5004 wrote to memory of 3956 5004 batexe.exe 74 PID 5004 wrote to memory of 3956 5004 batexe.exe 74 PID 3956 wrote to memory of 1736 3956 b2e.exe 75 PID 3956 wrote to memory of 1736 3956 b2e.exe 75 PID 3956 wrote to memory of 1736 3956 b2e.exe 75 PID 1736 wrote to memory of 1280 1736 cmd.exe 78 PID 1736 wrote to memory of 1280 1736 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\ECE0.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\ECE0.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\ECE0.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\F25F.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1280
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD53c0bec088d86bb620c8b42308d6098b3
SHA1f486f2b80f76da0966fb3ccbc33fb96a4f890835
SHA2561dfda8d76528af8231198a0ad4cbb09b05155c5e35f565ca78f81db527841d07
SHA512bc4a62dacaf7990d21cc1bc04412acdd80659371fb4205065e0e917885076be8615d766f6640683642603c1c0e551efde0236acb3d6a772dc1af263cb1627414
-
Filesize
1.1MB
MD5c8ddb9a1b99b955d28ce987616dc783a
SHA16a50a41aac042de84cbe5fe9cfa8ef171c1a15ba
SHA256d42d045c7eaec84a0576fa2d1e67566cd65686605e6f66217c2da6ec9faa060a
SHA5128804aa717bb5d9a88543175afd4ed3363ae6d1ff9846379f9bbfb7ff1b49cf0031fd6b1cbb0b1491a94d1158663021c8bf56c47050f3192b62a0c5bb5499d397
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
256KB
MD5e0c023f2dc80d8f2415830dcaf9b9e45
SHA19806d1f4bd0f76e044071f95f9210b09c2c09fd0
SHA256dc7de4210ed002ed6ab8340d21f999fd77ff9c1fe4361227ebbe3324b24009a0
SHA51276d594de32b07899a478e6b1fbe4a158492174439df3a65478b21135aea9695f47cd6b5006d1bb28398fb1b1f0e64f33e839ae16225fe755bcec4d25d3caf0ef
-
Filesize
192KB
MD5d73b46cd072058efc54c4b3885f47e13
SHA184771c2c4f5736ac08497737cba2a8634d9e9178
SHA2563f62bb203bdcca4e489401897e0558cf33ad6fe890a9987f90f5c3894b965b34
SHA512519c91b5b5a82c5a755d7d4295c040cfb6b0f029eb088a6bfc428db11e30d7f954ea6fd6de9b083d1781e1142737ea39572866ab5f669848dff7ef0ce34c79c7
-
Filesize
128KB
MD59746d1ac79c8b499d8b2224394581fa7
SHA136b1985eabfd8131ad9f2b7f69c903a3fce67629
SHA25677941fbe96e0c797e6cf5419ee32bd3fcee69629cba37750146656a660c37182
SHA51261a6174e2aced5b85cd614ad2f9d3da24c6b91e1fc04e10ff818222c4323cd043a59708bd35af0de84b004bf492fbc157d72907cd1e7ddf7082fc2a3563ef183
-
Filesize
64KB
MD56cccf65bd7d7ff5b53aeb882e15c462c
SHA1a9822b63ad70c6085ed1deda0fbe4bc5fe555f3d
SHA2561379cd6111c2c37cf16f2dd9b325118513e85c35543ba45e79deb504dd4c01d2
SHA512c174b5f8615131c2b86c57aee166744ee1fe02ff7c916195f2fde06684f467545a3fa4f88083335e2045d12727d774279dc8672ec352de3095b729aa5d1dedcb
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
153KB
MD59c1c67cb39dd1fe4f61f58a989647b3a
SHA1b1d4a2cbe94fc402df2ed7d5a623e7734e0fee0a
SHA2565691d29f4cdd2e9a4b59f568cfaa3bf6fb1420dd87434a14bbcf5ce2f41ce0c4
SHA512b3afd980d59dd67f28b8e48f56394203d2764efb1c5c2f3dac4c7b305fa8769cb6d8b4cc90b9994d2d4f9165a1049f8918a8acf481f1cc14276ebbc8601382f7
-
Filesize
8.9MB
MD5595a875880b1fb53ea8092997773b867
SHA1338ffaf21040e61b5e245a41a2137217b76e959a
SHA25633cbb68f7fd670b927535d57b6b3558053e027af991e556288856d4a510a6bed
SHA51248acb02021aeae717dfc1b09ef018466ab828a6170ccadeaa005c4326113679b7e1dad9c8b55357fd34f7de9c0fdc144f2a157f7e41b54542cff5f96278da536
-
Filesize
5.8MB
MD5b771ea3a37235814bc067c4db9aab0fe
SHA10e2d7fdcb291b71e076a3a852616d01406734506
SHA256f3e900ad7b7e98f5f647550f71627af7826ef6dc995661aa96c410af45062a72
SHA512096ea606412f0d9aa41eee104e766e2c86ee6c65d0af66e7dbcd47b3b909e71bde78bdc4d89d1c4fe2b9700b4cf9546858e48239bb971bd4fa248e8b66abdf2d
-
Filesize
42KB
MD561da3dda4e5628888964b1af36f949ff
SHA1ccab8f373c0a095beb3b59ffa677bac8946a5294
SHA2569f815d0e501ab587cc87083f0cd6ce3f272b4181ef110f8f4bcc52162df64f7f
SHA5129ad983ae20984ee6b46690573fbeda54071dac7ef71e01a016c4dcff68530ba21b3d7307fcd9a7ba7a53d283fa334d16647fbd5e5c3879d7540513648bfd5658