Analysis
-
max time kernel
294s -
max time network
302s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
20/02/2024, 04:14
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 520 b2e.exe 4552 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4552 cpuminer-sse2.exe 4552 cpuminer-sse2.exe 4552 cpuminer-sse2.exe 4552 cpuminer-sse2.exe 4552 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/3648-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3648 wrote to memory of 520 3648 batexe.exe 73 PID 3648 wrote to memory of 520 3648 batexe.exe 73 PID 3648 wrote to memory of 520 3648 batexe.exe 73 PID 520 wrote to memory of 4600 520 b2e.exe 74 PID 520 wrote to memory of 4600 520 b2e.exe 74 PID 520 wrote to memory of 4600 520 b2e.exe 74 PID 4600 wrote to memory of 4552 4600 cmd.exe 77 PID 4600 wrote to memory of 4552 4600 cmd.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\C3AE.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\C3AE.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\C3AE.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\C7F3.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4552
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5b6a558633dc13e01c86f714214bdd894
SHA195921cb72467d2a69885d7987fa6990ed3756e81
SHA25685cd30b679653b5cc0ca0c6cb9e56e841122391168a2237121da79b28b9fd507
SHA512d55e570830a21e8ffe9d7a769576afce67fa05396d4450818bfa45132e1f10e5bf8f10026e9fa621f0451f8908d7c9bff9590f64a85d5048af173f5e529aa7c2
-
Filesize
1.9MB
MD5b5ae88e85e1084225ce0118ce701db12
SHA1d4b5002d16549f82c16ef027005c52a58ec9d8c9
SHA2560a02515a7262451015ed48e82191dfffcb03d31b76f1c8fca7ba337acfef9fe8
SHA5125dafba51677f3348a2f19eeaa82142c9aeacba7b4e4d3a6c28bfaba21622842b30086a3036979f16da7a241419ca4c47752cd58a0e42f7c68aada32f59c48e45
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.9MB
MD57c82f4ab3cfb00df2e37bba77d3f46c6
SHA1b0523afe45d24606d659a231203744b9aeb820f6
SHA256c64497084893f0504ee292b813f7f1a773c20e1ac424ef5710402bbac0882fa6
SHA5128392a6616e311b00b4a377285dbbdf7e95c654e26c89b78a92c50823bce60a98aeb34b8e772635799b900d9aec357b59f2542db857966c4d40e13b909eb964e6
-
Filesize
1.9MB
MD5b5ddba40044b467b13d71014879a5a92
SHA1af2172cae4768c8d8f4e60cf56f4b9eb6f9d5ebf
SHA2561cb5397db7bdbc7b8f8f2956e5da0765c5076ec47d120ee38285e2211afdeb8c
SHA512d95ce5e5efa9bc9124fee8c93c5a29042ffb7698ec618d57f2070d3ef2164671805233cb768d9ef3099b911cd1fb0be85df82a23b372b3bb543fdf9d1cec6fcc
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
2.2MB
MD5a4cc2fe5c8824a7618944d23c74c6876
SHA1bb7aee381a98b0417e366404273373833de2ca30
SHA25697984fec5c7ef26ef1c99715eb3fc42100cff6a67f13dd9170108e09e7c77998
SHA512469d056531a3371a765e1e8d7324b084750f2c664d6afad55cfbbafbe1cb82ae1635d4fce1c87270fab3b454b8f82ca3621686635005bc89c5e5f1569201d10d
-
Filesize
1.0MB
MD59b985c04854832087a9d802de011e7d5
SHA13058aa97d90214c8691d6372e0383c5af97ea20a
SHA2560fe4819a7c97e89e90cb3614aa4181450752ec82a75eb652f7c3a2dc61453d37
SHA51237156d0c8f4fc10370eb619879622f30bed7eef9e53fc1d7de5e6004d09e8be7f240e660c83e79fe761966b85a473bf29f499aac6c86399a337f194c5bda0feb
-
Filesize
1.4MB
MD5f4c4376088d466a500f1afe459f80752
SHA16b3b04d2fbd7b97bd5e05fd9b18cd356ff3b4849
SHA2568c673d9ba50ae0c6470b2f12c1323aa682df5db64e2cc1bc6b21abaf8bb553c7
SHA51228149d7caf10ea2b9513a2f2654c69256e4956b15f2e140abc67afdaa295d84301013a1f274d2f43ff85655a162cad9a6d83d562fbc7b83b475ef799c4cad422
-
Filesize
1.5MB
MD548006a7dc099929262547f6180f6aaf0
SHA19dd6ed493933f6767ab8c74045caf965012baa10
SHA256553d8c2e5626ae832031450a700b4c745eebc3f571111445219cf687cfb51d9f
SHA512de3f7ebf1f10f1c49333e549ddccc41afcd98a706e2532980bc521f8fe9229dcf7f587c8476dcaf6f84b016eff697c72993044ef1898b9037fae0e4b7fdad3f8
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770