Analysis
-
max time kernel
297s -
max time network
305s -
platform
windows10-1703_x64 -
resource
win10-20231215-ja -
resource tags
arch:x64arch:x86image:win10-20231215-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
12/02/2024, 14:13
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3692 b2e.exe 3032 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3032 cpuminer-sse2.exe 3032 cpuminer-sse2.exe 3032 cpuminer-sse2.exe 3032 cpuminer-sse2.exe 3032 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4572-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4572 wrote to memory of 3692 4572 batexe.exe 74 PID 4572 wrote to memory of 3692 4572 batexe.exe 74 PID 4572 wrote to memory of 3692 4572 batexe.exe 74 PID 3692 wrote to memory of 1224 3692 b2e.exe 75 PID 3692 wrote to memory of 1224 3692 b2e.exe 75 PID 3692 wrote to memory of 1224 3692 b2e.exe 75 PID 1224 wrote to memory of 3032 1224 cmd.exe 78 PID 1224 wrote to memory of 3032 1224 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\B7F6.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\B7F6.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\B7F6.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BD06.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3032
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5272c54a9b6cdfa558e23cc257343048a
SHA17f26d86cf2a3625ce3e70c9cfc9b0cc075b8d5aa
SHA2561d7e7ea2934d091cb7ab81c31e31b4015e05a9f86b213f9d78b0297c88fb3415
SHA5125139de29262ba7091e5ab0529232912aea9ca34fdeb16165021d3ccaba1d351abc59f2130eaa6af8c3c0510db5f649095f7043ea837267dc9eb4ce0169fa18ba
-
Filesize
5.2MB
MD513015dfa459e1048325f8581f5d46054
SHA16f6984c9d862d72be22acfca329d88e5544ff4ba
SHA2565ba4ce2c5f0c79c07e41fbeb186521335ae060de242c49ce54feb64ff973a696
SHA51246ef05875d1a71097f80d15a5f4db2e9d1447b5505265eca3c17972fd6974afd15387b045856a26f799fd7d2009ae250a11083fcda1ff864fd2fdc1be5002695
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
128KB
MD587bb74a6790018700645a8310bb9a32a
SHA1b0e3e91efa12e0df5ed4538d3b549ab5d9f6c16b
SHA256ee6a846f1dcf082d5216bf314e65e1428af13ce54dfaaeb371d1c54f330c5298
SHA512702e12a0858a1dd987d6a761f0ddc88fee9bce38be3d71f8c9be3fecc8cc6e88763967140f83caf4f2e10109ab95b811bb70bc70ff0b5cce8f0f32713ad3683b
-
Filesize
192KB
MD501f228e3eadcf394f8e57348314c7104
SHA171571d5d327678688e7c77f19509a17781ae17d0
SHA256c38983cab3c0de4a73e61d6ed2abcee2567becbfca4b1714d3b03389556880f6
SHA512eb40b33112cf913383b22dbf4d2977e4c8cee5123620efea1b10d0e5e5d1495e37b12c5f2da0cc778af2044d6f7667ed7b009c019f7e03cdf5f060623f4ce9e3
-
Filesize
183KB
MD5ecbb36ac88c846426729ef66d12e0b89
SHA1827110074daa9a507c7cdaf6e175636df1c7d23a
SHA256acaf877e3a60f37550533be2e7b0722ee20224c4a6a147b58dc861a774fcb38d
SHA512031a27f2d9f64fd340083b7ef064fe1128ce6e7ad72d77d5ae34161d1f4e8c71256ccf3db96db63355b596f00a4cc8c18bf34dd96a49c64c1e3852a7dd02a7fc
-
Filesize
128KB
MD59746d1ac79c8b499d8b2224394581fa7
SHA136b1985eabfd8131ad9f2b7f69c903a3fce67629
SHA25677941fbe96e0c797e6cf5419ee32bd3fcee69629cba37750146656a660c37182
SHA51261a6174e2aced5b85cd614ad2f9d3da24c6b91e1fc04e10ff818222c4323cd043a59708bd35af0de84b004bf492fbc157d72907cd1e7ddf7082fc2a3563ef183
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
128KB
MD548c422e815911804d8322f84e605438f
SHA1b577cb4575fdf07ead63d0f9831833f4f30788e9
SHA2563247538f008c10c405b77c7a1ff636bd7f7e72b0cf4b5990870c157958b4e6ea
SHA5120278d1c8a8bb02bb70bac382c89481451ddd147f2b195fed3cf1105524358a04703be54186e138d0e1f1423441e694cd292eb890cfe66bc421eb160821548f8c
-
Filesize
5.7MB
MD50a3f07b50e7f20838f25d9b5a094194f
SHA10b451571bc01f21802d2274ff10d6fc39a087a7d
SHA2565862dec937571372b81552aa73b178ca947252afd130d072dae3a7daca76c21c
SHA5125e9bd1165b96bb5910ccdb7aa02942ac8f73cd388ac510cd1f933c276fd482dbdb82fc22b1d2b779b0751f82f2e2581925fdb58ce4cff26114d119b4b16c6810
-
Filesize
7.3MB
MD560a481afeeba7a789b8c1ec153c25d63
SHA1903a0678353e4bb523804fda16b44b8c180752fe
SHA256e5307b3f48a86ad9663bb8e4e5caf83b2fde1536bfc40a39655f6436a8329990
SHA512251a44d4cd45c667bb531045ab47d3a467212edb0a93a5d65a9b434861edbc6da5bf5a93518572b9624cc357510aeb4cdd7684e6566605d2e00c591d4577b62f
-
Filesize
128KB
MD58d949f4e279a9a80f50d7c2e0c7bff36
SHA192e29300716211895b2d8cd4cf010452f0132152
SHA2562e87614d15e62262c8b0a0c65e302b15e971b591469f3c679e7e516934cf621f
SHA51236565dc0a3290ac8c5e0fd0a2756764ce8e49a7ef52a437caad549c7ea1ac3ac7dfe05cd4951ed6b17051768fd9733c94365d85832092c429b0b74ab62a338fb