Analysis
-
max time kernel
293s -
max time network
301s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
17/02/2024, 18:49
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 168 b2e.exe 4516 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4516 cpuminer-sse2.exe 4516 cpuminer-sse2.exe 4516 cpuminer-sse2.exe 4516 cpuminer-sse2.exe 4516 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4608-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4608 wrote to memory of 168 4608 batexe.exe 74 PID 4608 wrote to memory of 168 4608 batexe.exe 74 PID 4608 wrote to memory of 168 4608 batexe.exe 74 PID 168 wrote to memory of 1072 168 b2e.exe 75 PID 168 wrote to memory of 1072 168 b2e.exe 75 PID 168 wrote to memory of 1072 168 b2e.exe 75 PID 1072 wrote to memory of 4516 1072 cmd.exe 78 PID 1072 wrote to memory of 4516 1072 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\8D2C.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\8D2C.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\8D2C.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8ED2.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4516
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD5980f311c1f7750d81432f563838931fa
SHA19cea867412ac992d396f1d8b588d2c6af5b067c9
SHA2560453b7de27ef88e0383cabd357e8a954a55ab47c5d89eca48672a01c0d602f43
SHA512b2ec0da1748060aa7699fcce99bbe3088bd3e0472171b7137e6e2541eddfbcb3884cfa81f1d1ff5823e24411c16693cfcfd576c1e1b336656b8bc5bb2821a9e3
-
Filesize
4.8MB
MD5d16ce1aa1ff74448fe461bf6ce40d221
SHA104951039681ff20678f4cd0a6a5580b6df757500
SHA256b281ce9ed34d19d925bf794974d69982eda37206f530a3aea1409f7e8913f065
SHA5128e8e7c6a9ca9130afa314865b88a131a7b8b2621b9b78138847be9d912f711b5ef8557eb235f9795f893139fbeb8b596ed0de79b49b68c5fafddd7980d9f346c
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.7MB
MD52968dad2fb5179d7b81cb3e33fc31942
SHA137f695a5b9d41e7d04cc792a11ebefdedd46f4f9
SHA25666c916189a95b38886d1bdd7121e39ceec54853cdef5da3ae04595291eab4226
SHA5121387203142899fa02991d37053e8275c0244c10f3f9fb9ab66a128679ee4bf88206627158602c422e4acb41b5f0a5d2a7951c68e57e3ebedabb87f8cdeb2f726
-
Filesize
1.9MB
MD57ec0d94be3340f6d60c3b52500a58d31
SHA1940789420aaf57cd0adb537868b7fadcbf9484b7
SHA2566f0b5b70f2d673a2521f2732e1e106441e62ba04f5acca4294cf2067c23c240e
SHA51204ed245c644b0e4596fec2d0c8b22e95c5b7b5f373976ea0603d0d728059c83f7d60fdcdeb77799a7dbe9b5f575e6d1b2f0b5fbeb2468dfd43348c1a15314de1
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.9MB
MD5eec43a368f7c52dab52246033a2bf506
SHA19de906829aef06ae60bd305bad246448bd7d7b27
SHA2561385223e9291b45e32f2abd30f00bffe20b0a1d561858c7a2c8ea7f258e6d5c4
SHA51214fb689fb93eefa7c177da22012be016c0240bccb8d7d6aeb386f0cc5de699bbede2e6403bdef025617a46e4bff368e0a2418a82258020d724df6e2226486843
-
Filesize
1.8MB
MD520b7da6202364d560c81589418add42d
SHA1c001c6d96781de6c73f9bbeebc403993447a17ff
SHA25609511a3cd15673d532345a1efc5bf170a4cd7ca8f53a34ad6f99d0f50f7a5454
SHA5126275346cc4cfde894e2292064c537e1ef598f8cf6d0430a7d010fa3cba99fcc47c19cd334511921b7f5216a8681dafd46d8762ee8ac8c4afed43d0c524ae356f
-
Filesize
1.5MB
MD5b1a9c41ebe265a6b6b217dfeb7fd0363
SHA162b38ff488ce02fd62031782e81b2368d1e97bb5
SHA2566d484f8e9adac44fbbafe0451a53d9bc9d92250e3daa42faa9fd07c5afab2db3
SHA5126b492b634f1bd04441b7eb2ce4db11a728330d7594699fd951126fab660260609da8ac527f5b03ece8ebc639a34004e3e1b3d8edde27645873b8151a69ece1d7
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770