Analysis
-
max time kernel
297s -
max time network
306s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
18-02-2024 02:01
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2480 b2e.exe 3892 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3892 cpuminer-sse2.exe 3892 cpuminer-sse2.exe 3892 cpuminer-sse2.exe 3892 cpuminer-sse2.exe 3892 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/1596-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1596 wrote to memory of 2480 1596 batexe.exe 73 PID 1596 wrote to memory of 2480 1596 batexe.exe 73 PID 1596 wrote to memory of 2480 1596 batexe.exe 73 PID 2480 wrote to memory of 4448 2480 b2e.exe 74 PID 2480 wrote to memory of 4448 2480 b2e.exe 74 PID 2480 wrote to memory of 4448 2480 b2e.exe 74 PID 4448 wrote to memory of 3892 4448 cmd.exe 77 PID 4448 wrote to memory of 3892 4448 cmd.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\2788.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\2788.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\2788.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2F39.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3892
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5fe4bc2bb4397eea601e0fa6c45cc20c6
SHA135477fc0a38f9db357a70f9b0573537fca582a9b
SHA2568852fb3a8294753e6b088d458547feaf54685068ed6bc0dece93f608ab44afa7
SHA5123759f54232069d2efba631954ff86bbf5ef58a616e4e0109c9ad5fcd632ee97ddf169ebddbe58237dbee36951c8d2e176312abe4e142f636398bff8fc2973bbf
-
Filesize
1.2MB
MD505f6765e8266a1a7d81a80da7788444e
SHA1e7afd0bf0dce889a026f4233c6705907083e6e23
SHA2563256219f071d9bbeb2b3483abc7e647cbb550c0b74c415ace444bd8a334df9e8
SHA512417d266a6eae32d630cf1322d3ab78f8547b09254ba3b5e2e544a7fd294de819754ab2f104ba2f3cab59a1fcfe7b0ea6f622712736079b7eec12a242b914293c
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
782KB
MD5702d162f65bd4638d9b0cf38fd15c7aa
SHA11d16062c0f5ab7bb5575c3ced3a6034fa6043d01
SHA25652b8e0aaa1bb063500a42f52f0e06ef5dc1fb5b4c250beebff88fcdc06c0131d
SHA512b95326941cb4350f378a02a50a9e0a97a912773bf575dbda2877485e8682d75aae3c46de2c08f8fd9cfb0c59dbfc94d5e6b23045c3ac204e8a43502a83f5ff0c
-
Filesize
867KB
MD50790a9594f58997dfce4045dac95fb88
SHA1d02a1897aaf1e7eac3bbbd64236eea738f042a5b
SHA256a41c346795ab99aaa1e0f0408649a9df31c032606f54181c29e012f38be95013
SHA512be650051470545effaaeeb69e3e7a60d8997d562c4f3c02391170f2e52e7669c5e577ec3179ed44b25680d43116175938bd5f689eab0d0757983e32f670a7c0e
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.1MB
MD55f3b42ca2326f81966546503302f5578
SHA1b5e7e4347756bf73a14a741a03cdf813a7666411
SHA25667c502485ab7e623d3acb6e28f0ea5733f55858fef9a3f74f84da5f89438b972
SHA5125bc8f685cdbb638a16950afd1969016359799375e32711423a0c3a6dfbdfbf52109fb2dd4d510f9ed7a77fad2077f3b501d89562fb4621e9fb82ef0e960d5995
-
Filesize
675KB
MD5c9d34f09a8897b136f239ce4e4e9fcc2
SHA11dedc8d917f08a47ac656b4b810fb72a09f51671
SHA2569eee4adb21343719142a2c1e17821efdfbedd0bba2c414016ccfc32b08e7d88b
SHA5122ce28989b57fa8c4344fac676ad82fd56c5da746da201503cde44110c99698e86e8d561c388bcfb7213a6fc55440793dae6e4bff7b6feb5acbab7fc7132a283a
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770
-
Filesize
745KB
MD56929bb6622eddc46bf5512d6c0e398e1
SHA168fb7d86297fda623a6e33a8c17cef2a20b829d3
SHA2562e5c7c216fec033c09e0ae2c2f778740641ab94c97f30806e5c662bf5dff24d4
SHA512c47f4db1628e3834a91a6d4588488787fd6724a561dbbef682494c9b66e3b43d7d5459747303afce95b1aed02064a05531302270ae9fbca4363e6d50b5507671
-
Filesize
613KB
MD5abfde1e171218c2632984061e8e0dfcb
SHA1e7b780d6c864d64190d7d41104bc112a9e54949c
SHA256acd565e8ae5ba2d9a944aa50b4a50ae01798bff677cb2f7450fb28564f0dc719
SHA512fdb4c7a5a366a7b65b23fdadf5ef65ed5280b096eb45d09de5921860b11b5af85159d2edcf07bee50549f38af5b2be1bcbd6b93b90ee49d67f29fed0e027d45d
-
Filesize
560KB
MD59f6fc9050bac42620610a5076fc6eb73
SHA1647e35d34fea52cd43b8b1e4b4f21c7b97a0e553
SHA2568d6a7eb355eaf468d64a629e21606a830644d7837eca30b1ff6e2240a32a46bc
SHA5120dcf38a65a14f1a63e60f826c89317a5ba6aedfbf2a08c69ec9c2e4d3a76ab0457b3762f3b0610adb1c49d57bf41d3e407443dba844167d7d35035070abc0f27