Analysis
-
max time kernel
294s -
max time network
292s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
20/02/2024, 04:14
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1224 b2e.exe 516 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 516 cpuminer-sse2.exe 516 cpuminer-sse2.exe 516 cpuminer-sse2.exe 516 cpuminer-sse2.exe 516 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/2180-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2180 wrote to memory of 1224 2180 batexe.exe 74 PID 2180 wrote to memory of 1224 2180 batexe.exe 74 PID 2180 wrote to memory of 1224 2180 batexe.exe 74 PID 1224 wrote to memory of 5112 1224 b2e.exe 75 PID 1224 wrote to memory of 5112 1224 b2e.exe 75 PID 1224 wrote to memory of 5112 1224 b2e.exe 75 PID 5112 wrote to memory of 516 5112 cmd.exe 78 PID 5112 wrote to memory of 516 5112 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\BC0C.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\BC0C.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\BC0C.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BE8D.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:516
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.9MB
MD5494aef58e5e7dd80f43fdee5f90435cd
SHA1f5047984316310491313c4da7dbccb139cdd1907
SHA256802e236d84848d05d2f1bdc138ca9625e99a2b1684d45bead7d0df40cca0a6c4
SHA512e9fb3d05b55cbed47ed29808307a629774506c8582865aae64899a55c244cdb1ed622189190319df3ad39474b14bd30379a3824fb4639082a4afa284716fb1fe
-
Filesize
6.2MB
MD54a327b7ca9cbdb49e169ad49b95e4c6e
SHA18faf3a97187084056b157e3a4f0a8760e96aed56
SHA2569d880a43136aa13054da95b37a10c8b44501635cbe1926e8bccf93519d5095bb
SHA51209cac7e835c1892544a71b2ffd625f51573d499cde0fe35b3c31d8ae8a0553486bea3fdc7e46fe60747e0ae3247a01d82b713f96f4c27ad2a68e945bf398e987
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.4MB
MD5f81c7325bd804cedeb292664363a4132
SHA17d83871d3528d9db031e52876d9b7bb26617b92e
SHA256e78f996f336e2d2815ee06e5ecb7b40553c8a8b337e71ecd774dec4dae94514a
SHA512cbd2b1b9e512ee038d0ec80928233141f2e4511c0b736e84e265621322d1fc5cecddfd3d0433714d108f9a7fc002b56fd9afa0dcff4b597723935079a008fe16
-
Filesize
1.3MB
MD51071a30b8d125c6675156cc05e645fe0
SHA1ea28e11d0f4799be9577e5657e6f977bb56ed2c3
SHA25656e5d680822d2df7f274b712163e96af9e1bd851c26f4bcbd72df3dca3603add
SHA512b96ebb6c120bd738ae16990988c5722baf540e050187675c3c61758eb2c08a9c879f760e63ccfc2121851d7151947ee37b07c3c74413857a6a0c0da547d5ab4f
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.4MB
MD51d72c734a0a7371e376a4a1460a49f7b
SHA15b93fa2170b101eaea57668e06664fd96993cb99
SHA256e811d4e1037b3c3454b339e025c32e7c9cf443bba772304c15457d03f743f1ff
SHA5123852eeeefc3b00133bc521ed331ca3595b78d25987ff9332d94f94d43f189498541e58813e6f2b420a7cc14666f4b1ded150b4f3cb3b0de3f9e5e8b8f3de45cd
-
Filesize
485KB
MD5dd8bcf6a3da553f37dde2e5155818077
SHA192aa0f06afbf10f01475d549ce0571346f369d74
SHA2564bd6d4358cf5d014602a728cd2eb08b7b56990e33d0983695f73329ef6bd88fd
SHA5127194e8256492dff14bf470c0cec6401e92845686b341fbf8171526adfd05bfaec3d59605f445db3879fd461c702463d40c07f15083eb2c3846ee5a897bf9d172
-
Filesize
1.1MB
MD51b13c3c1d872950c05d5fb80a1632131
SHA11b17cebc9a607d44944dfc52ce7402e0da3d0793
SHA25689cf04f8796326d55471b5e6553d6abecaf26a52f9efa0b0d84a57f11d789a97
SHA512dff4917ebb8b1b434a4782e643c053219c827e4e9bd5d3969171da47f9a27a925d8c33e418b3d83430cb49433f73c20c257e0fb71a2c6de1998bbf61e3e1cc75
-
Filesize
1.2MB
MD54ff38c30ac58e111003efc02a7e2a509
SHA1e8aa835fb1e833a267fd71de8a2c547e8e1e3dec
SHA2568e3eb4a98ca5c1e422e2a3dca268929f85c681385f5605f32ea90bfadde011ab
SHA51296d6f78deb371d42ce05be67844c500d2b19ac2012e3ef1ab84992e60e91f8dca69151adf1924d808dc41ad5e99a0465a3445df3e06ac67dcd2834aa414d3daa
-
Filesize
640KB
MD54ff6a857c959222fad49ff3e14adf404
SHA15f0bfe1941d6ad74fd3c6cda0dcfc7376092ed1a
SHA256c1d2a81f6172465878db699289e167c609ca7c3b2888367bb6b4c38e59b9f812
SHA51202074dd7023a1eb9653df317fa834597774127bbde8604399fd2f08be64aa0856feac9757a2d16504a4c2dda50daf5e0daab8bc61259faa0e12b01ba7502fbcd
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770