Analysis
-
max time kernel
295s -
max time network
299s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
17/02/2024, 10:28
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2944 b2e.exe 1784 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1784 cpuminer-sse2.exe 1784 cpuminer-sse2.exe 1784 cpuminer-sse2.exe 1784 cpuminer-sse2.exe 1784 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4728-4-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4728 wrote to memory of 2944 4728 batexe.exe 75 PID 4728 wrote to memory of 2944 4728 batexe.exe 75 PID 4728 wrote to memory of 2944 4728 batexe.exe 75 PID 2944 wrote to memory of 4628 2944 b2e.exe 76 PID 2944 wrote to memory of 4628 2944 b2e.exe 76 PID 2944 wrote to memory of 4628 2944 b2e.exe 76 PID 4628 wrote to memory of 1784 4628 cmd.exe 79 PID 4628 wrote to memory of 1784 4628 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\A1CE.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\A1CE.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\A1CE.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A393.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1784
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15.6MB
MD5c193d32eeb125de9223bf9bc0d10e49c
SHA11bae439da6d8fbc05f9a80d636d0c54ca7099669
SHA25646aceeb0b31e79f1ca5a5f4761482b281c95a510ff903bf8a88b5326232bf6ea
SHA512291f40e7fda84d58f9b14378109133070b6671aae16304674a92efc902c6c71bf42f8de43e26aeb79115cb36350581706b2530f173a472fe54a64e60bc1a1017
-
Filesize
19.4MB
MD5ccac1be82c812a5a3cc4976e53bcb1b8
SHA1e014196480ac9f18e7467569c1b1e91a4b1f9357
SHA256760cff559e69dd62ce7fbe4330087ff6388a3197c778b902d7b68627ad0f5af8
SHA5128afdf1eefe90faf9705d871d9815feccd9480e5b99f02b1948378c00d767b1b8e522f95aa2945e893453bcc2b16581d500d7c3503c5347dfe1a15f775eb25a17
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.2MB
MD5f1ca0e4f8c80894a61a5945f2fc27c61
SHA15d8469a5db2409fefd4dd907e3f4e21d888212d2
SHA25685a6a3bf0a70ef299bf81f721b492de7d5dc9a8f73a7157c6c41bd4d8bf2957e
SHA5121859c39c68c69f7d76e987b8593932f0a059fcb48d5be21bb8bb8649bcafcd4f1951043c70be114484650d08deaa1b90bd35510db7ee6a1af1cda75b6af9f3c1
-
Filesize
785KB
MD541afd29fb260e6ad022f9e9a16da189b
SHA1d8a17610bd5cef8323a96e66a55597760909bb87
SHA256c6050d997b65685bd9947de3b3db844a18199704a2b8353be9018c41d6c4ec48
SHA5127190417ad4882a11a850c1fa07ad95e40ea017162f45d02674779a77de47335a3449f55e77ef0b92815f34f7b7e93af35cd1298df9852fbc6bc52df33c14285e
-
Filesize
704KB
MD5903e2cfee96d720dd5200a922b637d07
SHA1f6d639d7b6bb586abcb5f97b1b212252ed6c85b2
SHA256443ef0fe0e5e9cff04e267b1bbbbc98b547e5bd38a853eb79d06a43a8e7d17f2
SHA512c9c357be28d1d97bd5255d88bc64255f452867407c3aa4c99b286913286780da1204691a0344514f070b8bad391980a88b165eb1e8e9ee97f77ef02eb85071c2
-
Filesize
851KB
MD5a2bb61a197fae623211775e09b21cfbc
SHA137efafeb56dc38da49460047443afe2e095c4aa4
SHA2561fb82fe8e7832b7764aeece55d09da2ee6f508e18423bca4550d0b05c15aaba0
SHA512fb336221fe093ee86ce83a9bce01f889cb6fb5746d2f206f1dcec749119c39bce82c0500b13b65208ede918b079327059a15db558b88b9f233ca468a0149413e
-
Filesize
704KB
MD5ceb1ee23d68e973e400b41e7324c71b6
SHA10ad5540864cf9bcbf52870ba72566625ca54e67a
SHA25666f2f5bd30986e28a4c43ed44264cc56f63bd7a3ecd6aeb5845ac7bcd724aeee
SHA51251ce4a101517339cb1f5c23fc953dde73f871cec2bde8ea5c9fad9376366d7b8aadaa8668ef2f7bf9d873e8817345e4e337a7a94c42c3ddf6a168377af060e9c
-
Filesize
832KB
MD59b527cc7775e3fefc75ebd6cf497b81b
SHA17405b4528854589bc404f55c0e591d2e534d8d63
SHA256eb4270d5203fe07ee63a7161093d69577ada5ad4ca659a6181d63953a69bca72
SHA5126471f61ebc78e6ab30cce7cb444c582a8a24cbcbff1a8cc3d22d20d299d53c6377127e76bcc2a1e2c9108cd65d6fb89d42ddf89b04140c8e225f5115984a4b85
-
Filesize
832KB
MD5d33f0e6bb5e8d2b9e111a90544790dc8
SHA1df4e81d22638d511e761744e886c33bc12096c48
SHA25640729edf62213c039a1818c9adb9478aa0284bb26dd071bd1ac4de1da2470048
SHA512ce4ebeae054117d4de8b3fe2403d95a6d819483269f851618958e864887e9b2f42fc9c893e1aa207dfa2d94900c8f4214a67796ddeb2a80ce655d69ec290d629
-
Filesize
640KB
MD51b7339cbcb5b756c15c05fe0cc6443f3
SHA1abdba01c4526a9bbbb7fd3853e09bce3cbb5287d
SHA2565fcf0fb116f77206758e3a669ec4fa52648fae431a5c2aa2d7ee69944142e019
SHA5127661b5e8413e74432a00089b1556b2f49e268b6b5c8cefd839cbe19074bffd138c18e8078627420f4082f579a9e3f8d02b199507ae36380b5375162a4d4ba439
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770