Analysis
-
max time kernel
295s -
max time network
305s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
17/02/2024, 10:52
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2320 b2e.exe 2328 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2328 cpuminer-sse2.exe 2328 cpuminer-sse2.exe 2328 cpuminer-sse2.exe 2328 cpuminer-sse2.exe 2328 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4624-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4624 wrote to memory of 2320 4624 batexe.exe 74 PID 4624 wrote to memory of 2320 4624 batexe.exe 74 PID 4624 wrote to memory of 2320 4624 batexe.exe 74 PID 2320 wrote to memory of 2268 2320 b2e.exe 75 PID 2320 wrote to memory of 2268 2320 b2e.exe 75 PID 2320 wrote to memory of 2268 2320 b2e.exe 75 PID 2268 wrote to memory of 2328 2268 cmd.exe 78 PID 2268 wrote to memory of 2328 2268 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\219C.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\219C.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\219C.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\272A.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2328
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD518c91665349cf71648d4af5d21843ea9
SHA16be582f8587a42e96d73bf174cb6d6345761c192
SHA256979d6a944f61f2cde2dea724ce5e0297005602c15fbbbcb917540ec1b1f3f937
SHA512544d110b9bde470b9411a91f9195bf5e6914c1e5c59ec4485be08acaecd0e519d1c932181cf5a76d5241dedc362beb56f2fb407d808d554e43d408b34a621d48
-
Filesize
768KB
MD541acb3c7c35169437c8e50c36e39f5a5
SHA16b7a95c8fb404247edb7430b46e931495eeba0d1
SHA25677003c5f07279f31ace3879feb99ce0568a05bc7bc56ecd5707bc0581cb6016a
SHA512670b258078f3ccd9e3e710a994d95d406094dab87b4e4e11e3b312a7883631877ea896bc53150cb8b9bb8a0500df129005973212fce0541978df505edbe7d145
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
237KB
MD57e58ca6784941364e721b37cf5ac0e64
SHA136d465f60ba3b2b89f6cd1532897cd60d4626446
SHA2566a34d01c1490566ea461f596e4e316687ec29839a4c9a5167bf62d24e0ac3ffc
SHA5122881c5b50d9dc2114171c81731ff652881c952eecbccedb6c4a32677ee0fb8d66941dcfb4f508536e998c13f4f6ab5cc4de2fd03d0b6047f37bf682620f01a6e
-
Filesize
310KB
MD58b8b8bd377b57a24eba2a3e70dd1f115
SHA13948ef71a1a8f54f59fe9bdf07628e88326ce5dd
SHA25615dfe5e664f32cea3baaa028e4d04e91dae4e9a496c0ca22be39f407ab8569dc
SHA51253e65c9607f9557ecee138ed5fc63879b38256d29e1f6ba53f4594af018e3db9bf87cf15b4d54fe8e153757c8445252243d3dec28d67271e7d6d0a72f101e78b
-
Filesize
291KB
MD5ecf14c4e693bd9b7552933850b17eb01
SHA19bdc0ede5ba03ba859d303424cc843dd10bb6656
SHA25661e491c41226871ee68218a01f11e332fe5065dbee8064cd8bb22094cda81c40
SHA512ab1edd505def7a8980d14b9293e03c6c5c622139457fac5451edb2fde56e27a59e34cf0440731c3c3ef73a486d54090ef7f2032d9d4ace0ec0e8e18119fc70ca
-
Filesize
171KB
MD5221673994de533c333a1ed531ae890f9
SHA1d05c9f915a780cca4579d53586b330c600ea36ee
SHA2562dc090746ef2a5a819141fcbeeb839ca4f6c21e4a940dd99839e57daa6fcbc1e
SHA5121f682ef0561d3e2f3987cbbcab03a60feb54776edfcd4563d5983d5b288b4a5534277ee5b43930951f87e6c59b769bc00883c367b26eb371c79d212c14908d92
-
Filesize
388KB
MD5e126b1e726862be019fd6216ebdc8398
SHA127eeee1d6e7feee7b38ec295d78d151f818b6338
SHA256ba6b0fbfebf4911e22bbe8aa35d533434ec2f51d9ae90aeaea8564ea8e649749
SHA512ce2b4e8044316488e4cb58413e5e4ebc6aff3b4910885a2c4e3718f7372e8ea55077a63520b5de70c0b564aba019dae4d7ccd9a5cd199772dc5359e492a1af3a
-
Filesize
227KB
MD5f90cafb471033191d208df3b184fa5bf
SHA1869f51232a1f118ca708546a66a0ab80a3f5da53
SHA256806b7a24b1e584dee567297157e00d725bd3835af4738b2711ba5878beca9a12
SHA51296331fbf507b02f7f910cb952740c2dfd44ee648d1ca1c3a914efcea4037cae3d86394bdf2378bdcf4ce3e0e8e9e588b174b4a9e70041a257137b676796a0a90
-
Filesize
301KB
MD5c3d3da317a5a49bf6feac8223fc3f9d0
SHA13f10ae62bc73d61dacdf9f0d309a990226a2cad9
SHA256a89830bc9a013c0568849aecea930c4e4d200ff2d546a9cc43207dbc8c273ff1
SHA5121ffb1f8381fb51f48a82990574e8241173ed84c90f437a92581eeb66ea408b4dc0b0e8d6807f8134b0cc93427672f93611820df1501d7f769a02148d54f490a4
-
Filesize
336KB
MD5f49d3141cc2c86c874331ddbd8143c54
SHA16c94ea249d1514a3bf59371bde7736d5f6751a60
SHA256cbcb32c9cdbb22ab3f0c53678be8aefeef0fc0a8d41ec32514b36e02cbba356a
SHA5129ca6a7dd87e2ab683c220e1fa0f6948fc8ba49417a40fad24e000692abee23d72fc7c20e1da96032233ce161f5d596dde95ae53c617f3d52bb3978cf1e6e2389
-
Filesize
290KB
MD543c8f7c9166496719eeb9d34ad9c610b
SHA1d719fdfa26a40d9d1bbdb2cbfab434f1f0c391b6
SHA256118124de3205c8f0c5ccfb12fdc6659f2f9b6c90156181716d26b57cc17db8fe
SHA512d5dd26364334455aea85c954d5b8840a0adf361a7e30f6c85e9abfc22d7c4352f59d82e373bef5bbe75e0dcd5b7df0bf18ed83fec1831752c0a7251d33dd45d1
-
Filesize
180KB
MD53fafe4a38ebcf22dc240128693d37a7b
SHA1d627bd76b2c89ddadf30bdbe7c490e6f94a2d4e2
SHA25649174ff01d8f4a21945d4c5e6afa1b51e77872f5a2771d3aba1fd4474c35a7ba
SHA5125b0c06571b99ee2c6ca55137921a67a881001c7b3c80e0dcf92c698b5275225a4064544777a5bbf2923a2d482e06e0e2794af6d870df32a5e514d0c630bbbf35
-
Filesize
141KB
MD51b3ad9232453f04fe70081634f6a888c
SHA140dff190de9f5d2d18c9588ff04790d9ab801924
SHA256137021a09fa7876b08a372aa47f5fc326668efbaeaad8274b6f3bd0edfad1106
SHA5121bb208d185cea0368f2b3d12ac4ce543ba2faaf379d6a8a41c58e3d76ddd1c64d39c3b237193f295ea5d5122956a6ceaca2de1db438b94c647ea5974548a067f