Analysis
-
max time kernel
292s -
max time network
306s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
19/02/2024, 16:16
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1260 b2e.exe 3864 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3864 cpuminer-sse2.exe 3864 cpuminer-sse2.exe 3864 cpuminer-sse2.exe 3864 cpuminer-sse2.exe 3864 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/2940-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2940 wrote to memory of 1260 2940 batexe.exe 74 PID 2940 wrote to memory of 1260 2940 batexe.exe 74 PID 2940 wrote to memory of 1260 2940 batexe.exe 74 PID 1260 wrote to memory of 1180 1260 b2e.exe 75 PID 1260 wrote to memory of 1180 1260 b2e.exe 75 PID 1260 wrote to memory of 1180 1260 b2e.exe 75 PID 1180 wrote to memory of 3864 1180 cmd.exe 78 PID 1180 wrote to memory of 3864 1180 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\B314.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\B314.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\B314.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\B611.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3864
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD596b0601b9c40a456a8910d012a396ef9
SHA115899fb333d0cf0aab7ac683c48caf988aa3704f
SHA256d81c0693508cae14372d124aa1dd23ddc03435af1129ca9b467e5fbcab61e8ac
SHA512e135e6943e17b509404b5c2afd7f22cb7c8e641704a1cc092aa7562ef88b4a95daa87e44ec1a88a743e0f6b1536b73dbb26a68565c45bf34bdfd3262aaaea1d1
-
Filesize
2.5MB
MD5694dcd603323658fa3e5b8353d1ae9d0
SHA16dcdebe88ee35557469d41f586b0c220491670b5
SHA25637a21b3b278a9cfb711e60f0f0db9af1e1ae7974206796ee29f9ee5fa63cb81e
SHA51252db9ee9dab23449cfc2a7d25fcfe8b9b690c21664a81c3b9c9555452537154d65b37608f18e158c0fef98c99803a4f0c9370df20f4a9fdf3cee5d55e862ed9b
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
327KB
MD59f74c95af5bd856dacad3e121ba0dab9
SHA1bdf1396c2a8a685625ce88149524257b9b9075e9
SHA2564fce16666b7c133100dbfc10007681fff76401afd1edcd6bc5d0071d0a79f9ab
SHA51248917255eb2c6ca8b951e0a7a6a94210f0648c30dd468ac3b44b00b21cc8fee3acc1453b4dbb85489c3ebe681c5176d4945b97603e0ff813f4bed4512a54ffdf
-
Filesize
628KB
MD526d9e1fd5207c3d00408325fe15841f2
SHA177fcce84c0de8cd95cf993a8cb22f48b763a0b72
SHA2568e9c6d5511c7e988617a634d76af2cfd339613a563b061bcc6149ef088a3a74a
SHA512c64ffcd8d57114195f9a69a536980b58c63aa1598a12e21ccd924da0be354d8f5a1fdf8e0d01d24f9be5c7fb0d38edeca8a8aed8ae96698ae52782b04319b947
-
Filesize
163KB
MD5ff56b2613d4184437915b0ff8699007a
SHA1e768e7e607f25dcd5bc49fe4801586216d5a61bc
SHA256fbadc779218d8e154040e9f68eb89cabef954ec4a7bdf02763a3417fe0b8351c
SHA512a6a91d6071461dde105ecb2f2c6623bd8f4e86f39993762dba16cc949e32cc114626ab509c31243c39eea786ffd7a599a27cf370401648975a5bd158b5ac565d
-
Filesize
346KB
MD54ae0b6f8b873cdf35821036ad4aa51a7
SHA160696fdf2279cbd84803a8585ba4667876e794d1
SHA256bb602415f5125a2d83d1fa9f5b8394abf120e8bef327de5830cf7b8a7732690c
SHA512a5e686692c4a7532e9f2748c5b29fc29f3cda014184f4f05baa35904d2d6d19ab9933ba8794f457bed41a1aec4568156fee0b641e354a081ea709d659e5526ee
-
Filesize
269KB
MD50a4045ad399e6d78f25015747eb3e2cf
SHA1660a68f6c3fd92568127cf6ea2ca8fb0db859ea4
SHA256554760cea2efb60dd2892644d917f0a1a894abc3f61f78f52b1140750991a8d0
SHA512f3b8df396e52ac2476f340bc5e3d553a48d3d71394b2adce3dc5162b5aeeea25e3d9e0d21c486b4f5a2258a7b719869629a3d96511eafbb855779433b7275f3f
-
Filesize
156KB
MD5113ee45d2eb40c97206c7d1e43c10312
SHA1087d93ea7802ebaa619df0ce6fdf38c7205a2f2b
SHA256d4238ea56d4c7a10729313b22b3810bb3b7e639555daf8a04aea81060f09a9e6
SHA5121acf32619e56e4a8c331729a4578af4ff606749e4ecc83a2736ae9f1d597d051bf03fc928af93c1490bc93af098916b4206bf384bcfadbf3954dd5571f09f428
-
Filesize
160KB
MD5d179aa9a715d4c534d83ae134fbe0c7e
SHA154f7131bcb7a59c8ac04b8126e2a4c295c276b48
SHA256f799cfc7457436bb960e3c9dbae5e3869eced5199098d1894d791c5b7b6370a5
SHA5122ee1c415416d7197ef97b2046c7384186ed5166927ebcb4ce7a5703ff82ac2e0bcfc7fa65ddcf1882ca1cb2b030af86a16137c1b174075977528873802e6cb43
-
Filesize
556KB
MD50e6b128e86b083c324f7cb77d44f000c
SHA1c399076ab702e0e80e33d83601cbf83e7529155c
SHA2567fdf3f06486a9c223a24db26e9867a5ed2832ccfa6a6a9f8c76c355965cbaf71
SHA51281299e4cfc5d3efa09634e3ada6bdf447c8cc352c86d7f5b96012fef219d74a5b0ec0d8c30ea12807d24b045223fc4fb4324e543ea7eac9b1342e5c9c898ea11
-
Filesize
250KB
MD5143117b609e2e60abbc70229adbc9e7b
SHA10f2c4be38dfe7fd39961f1b2d12767ed1f665cfb
SHA256519804cfed26e927ee5a607a263398b3bae57866f48e63779eda9678ed5d14d9
SHA51236551e5e6c1b1cb52be2028d8fd0f248a71757e4115a93c7ef5bc09237626d13c1a13e30a313174f3a54869753bb7a321d79d054dd323b2d85b2048898427ec3
-
Filesize
273KB
MD508b33154621ce579d74499f6297cd354
SHA13f77ff22ef4db2f67b952175b66185894b570d56
SHA25618691db5e4def0497e1eb0efcfff02b992bf377f93b16217c429cddb59d2c3d8
SHA5125f64f6a08577b9a6ef1214e1f04a0eb33295f398612d84f141ead81ad7957d1e30f5e6bab7a23c8b734bdd716ba581fedfaa9b8899c545ecc765295767f55e29
-
Filesize
71KB
MD5c2281083855dc5e0d99ace6099c55d44
SHA1064ef501a25861b7e46539a83e229d536da0dc24
SHA2561e6f72ef734f03b827cc9765509bfe027fc94ad7849dc3c450df025cdd99ee65
SHA512d94fc4144e40f3666499eb24551aa0769a388603873c795455ce4a2bfbd9227ec14a3856c9e62ea0113112099682978d2e44e1e711d4d56ee9b057f1145ee974