Analysis
-
max time kernel
296s -
max time network
303s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
18/02/2024, 11:06
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2480 b2e.exe 3892 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3892 cpuminer-sse2.exe 3892 cpuminer-sse2.exe 3892 cpuminer-sse2.exe 3892 cpuminer-sse2.exe 3892 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/1596-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1596 wrote to memory of 2480 1596 batexe.exe 73 PID 1596 wrote to memory of 2480 1596 batexe.exe 73 PID 1596 wrote to memory of 2480 1596 batexe.exe 73 PID 2480 wrote to memory of 4448 2480 b2e.exe 74 PID 2480 wrote to memory of 4448 2480 b2e.exe 74 PID 2480 wrote to memory of 4448 2480 b2e.exe 74 PID 4448 wrote to memory of 3892 4448 cmd.exe 77 PID 4448 wrote to memory of 3892 4448 cmd.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\2778.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\2778.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\2778.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2CF7.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3892
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5f845d6b8c0beb43591f7ebc96344f81b
SHA15bcb9d96f6589b559060e11d6d5a0bf73d91c80e
SHA256841b8431f27f5e631d37c605530e6ce5430559c96fa9a6ddebc7e9dd63ad04b2
SHA5128de293211ad14117c9ecb797c78c738c91b691f3dc861401d537cc72c9ba05a40340c452938bd6d72bf400efa1fffb7bb387f204035697b8a229a29288d5d357
-
Filesize
1.2MB
MD505f6765e8266a1a7d81a80da7788444e
SHA1e7afd0bf0dce889a026f4233c6705907083e6e23
SHA2563256219f071d9bbeb2b3483abc7e647cbb550c0b74c415ace444bd8a334df9e8
SHA512417d266a6eae32d630cf1322d3ab78f8547b09254ba3b5e2e544a7fd294de819754ab2f104ba2f3cab59a1fcfe7b0ea6f622712736079b7eec12a242b914293c
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
748KB
MD5cea557a6d0cad6756f15c71309f10e4a
SHA143f7e187dae6a6f605046cac1f9feac875165977
SHA2566bb7ed466f9b228f14e5ed6321183949fc5e8437a6c176828fbaab889f55f7a7
SHA5125602325b3f94169b7b68b3dc18015f9f8d113fc934e57833323f762c5bdca4469b491108edca5779bc01d8c4ceab123b0fd2973558699b76b8b2f38771d805ea
-
Filesize
802KB
MD5c6dd761048d03a2a1a2893eac4561277
SHA1efd5abf6b4c7a73c8686ae76bbc3a5833ac9577e
SHA2562b8eaedea3ffea60a2fb2cdabfaa8abe1e7a988a8cd4757779ff038a664da189
SHA5122fed75930a08cc153d71daf9ebb021f3d6eb68b41243d0b65c548a19f66b1fbadbf5e099d0039f46bae414d1f83e5a3c98fa271df4e25f0a86a0bd9b08521f2a
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
558KB
MD5dfc2825f38edd8866965e0256f4ed652
SHA19b23e2629a64a12246675bb2544447df8d331bd5
SHA25699129350c03ce7ce46839afa786b58d612859aec3c501e51ff32f4986d4398b8
SHA51208a67e9f19e1b88006f4cca5bac806e186bb7bdd4ed345666606014c2be3d8b572b50f98986988736a5a4520b93b90c6d7f063dcc2334c3701962035173d1529
-
Filesize
1.0MB
MD53c5cfd3d7cbb099ea2767af47713024f
SHA1b2110d1c6ff0a7d57bb45a217e0c33f73813cebd
SHA256fb5673b1a5679af4db8a12cf4e204ba477258b3327ab0c36bfc122821428fa1c
SHA51279b6788342f716ee3d29a89aa1f972ba63efc83b79107a9d644ab732ad7e92e154d6c32a632794a278ce514b20dac4fffa99bc8cedf222bc97b7c946a69819eb
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770
-
Filesize
691KB
MD5df14be7b77a329f8f622b034181ff154
SHA1bf7769b46c3259a182733a6ad05a6db71e774b2c
SHA256456bcc3b0552a8c9e176c8e7755bf8e2140081731b1f6424653190971600e509
SHA512b34661ec0aba51947f83302501aba75d0bf421de8d297485f004a21989d4b737051726044d4d3032b9bdd6f291cd17084728c9af38291dd10cf258d7638baf55
-
Filesize
809KB
MD512b34a24c8e53c0b4264e8c06cff6967
SHA12c2ce52625389ce945333e3029967564c941671b
SHA256e9f90db0244581851771f77d8a66770ce6252d32a9fff5aa79cfaa8729ef7b97
SHA512670b1e7fdb1fe25c225fba9cb1081f10052dc078b7da0e8eddc17c42e695e9f8432550ee2d76fcdd7bafe578c8106881f50796656f06c875baa783fb5aeb160c
-
Filesize
909KB
MD52c3fb6441cfcf1cf227f7dd96d8c357f
SHA13fff1e71053cd2916605cdf926a85680bb85b165
SHA25640982ecde003f15cdfdf7e1698a26b5bf30f57370c9a4e558c85c2784e685fd4
SHA512b0b2dd980529c3014a469a8a111923b6311e379dbf443415a7ddbf3c758c482718180d5518cd1777fb6c287a98df97dd2f4f9493fa456265c271bccce25a1ca1
-
Filesize
899KB
MD515bf56ba4f21309e1bc1c7d5324e99d8
SHA1be4d7b3ff16f0859aea309d87c6544f3236dcbc0
SHA2567ab6290b386b5906b18fdc033adf5f9d689ed3279e0ba70d74b927f4982fbbb6
SHA512cf46106335e6205f25388c02d28a3b8adf1f63efd52b41b176b9ecaee09f83770c42c454776aa2a20639fb0b21c307a48ce032d6a458d98a4c02fbf94d570ef1
-
Filesize
558KB
MD55c59dec13adaec24b3f9413a119640eb
SHA11b91521b629133935369830ee096cf8fe8340e04
SHA256125724c454b7f09018715d4c42ae65bac8e9802127144c9908d082b01fd9a71a
SHA5125cb6f54c8a7b9fcce3c4340bfb497f76601fae2759c7e41ead48b35751b9685e48cb0079dd65d397e17739120f839a760173b39553ae9ca9c28cf6311169b1ec