Analysis
-
max time kernel
296s -
max time network
303s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
20-02-2024 04:41
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231222-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4784 b2e.exe 4392 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4392 cpuminer-sse2.exe 4392 cpuminer-sse2.exe 4392 cpuminer-sse2.exe 4392 cpuminer-sse2.exe 4392 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4696-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4696 wrote to memory of 4784 4696 batexe.exe 75 PID 4696 wrote to memory of 4784 4696 batexe.exe 75 PID 4696 wrote to memory of 4784 4696 batexe.exe 75 PID 4784 wrote to memory of 228 4784 b2e.exe 76 PID 4784 wrote to memory of 228 4784 b2e.exe 76 PID 4784 wrote to memory of 228 4784 b2e.exe 76 PID 228 wrote to memory of 4392 228 cmd.exe 79 PID 228 wrote to memory of 4392 228 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\CBD.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\CBD.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\CBD.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\13D1.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4392
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.7MB
MD57977a9e47f5373ec08c5fe1f73399b8d
SHA1420cf28ea15c3f2bc6ccc922382fd5c584a4e6ac
SHA2561d3837adc76ccfa8a9fe1c01410acd00e3e0695ebd657b77a70dab6ff6221743
SHA512f545aadb2031370e396982e6625d9b00532e4d958cc4a942a667ea990bdc94653e48919f1df44d285ceff05266b866e7d76c2d70964a8527f1cb8d35a8d2f9c3
-
Filesize
3.2MB
MD54495475d79f134b6bfca15b468335474
SHA177b41b4d08baeee4843f17c742c0017eb7573d75
SHA2566383be467a85e17511d6b7a0e5f498385aba68bf4120f2dc92fc33ce8bd74fd7
SHA5124ce296db6869c2b5e91b1f539f92e68db8cd7d255e3184dad04292457c3d24e28c62044e4cbaa8e76f048bb0b132ef09af3b8aaa94ce420faaa56f3c30c4f17a
-
Filesize
1.5MB
MD5eb9e2986ae19dc1c154766cfc51730c9
SHA1bbcc5ed61f0ce7f304516ba8d3a18bdb5d07ae11
SHA25693f5765395826e491f24cefa705d7d7749a044f0527139f4b4ec5e103e81bff1
SHA512433a96a3c63473ae654ec1f1c3ea751db932df2ddd98d7f08811f292c9e810f61aabb00cf0fd7518c189a2edfd5fad61bcfdef5add0844ad4b4713cfa6690fa8
-
Filesize
847KB
MD55ceeb028a53e867bd75e54650c6339a9
SHA124b84bef8ea6c3f4abaf6b5b5ea6ce0b8cfc4e46
SHA2565c6590744decb00636813700f607ad10a50c4247c2744c7e18d04c0f639a8435
SHA5125d753bf8ae12fecb513c6f287f84f1deec9d5067a27abe54ead0cc2dcdb9ea456d2ff55c5f935bdf4450adb1f872e3bd97e0cafa9a02900ddbce3863cd65a05a
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
859KB
MD5df02c26456ef7afeb5b122f2939c4466
SHA163641f7bf60958c79505255ea5b0f6dfbb3bcab8
SHA256818828db13c4bbb29615ce57d93ab24ea5114e5e1c08a17920544a89ebabc42c
SHA5123cb85e9199f440a3f7b7fc40148a25671acbfe4c0072b11ec24ffa3595b551ccdcbfd8d8ae0ae27ac377319a8b9e994f5a99484f95d35cd385cd3432df4a1190
-
Filesize
929KB
MD58c52c64e26b5904e5d5132319d9ec54d
SHA164798ed2e2dfc8c5d0a5c1e95693a99640000de6
SHA256648f92fc14ab4bfce05e0f1346c1a700a10a5eafbf3fd7cb1f4f2770e9f2a930
SHA512768d3634294b1b80acd984c5e16491970677d1113d7b2471c4f79b6d55c88e10cdba3c7702bf3b5187da96371be8c79cc53d223b2a7127c83380a0698262632b
-
Filesize
516KB
MD599d1401027be2fdf7f70d479eaaac6ae
SHA1a13b9c2c891efaec943092a75c9055ccd850cf12
SHA256b86f08aac03c2719b113ae9c618d23977c16e81a8f0e1de1cde708cdd8067f23
SHA512cc2c2f9de3e6f975b90d9eca24306f8cb0bbe1f95d525e27c4405ef2027dbab1470e2ac0d7cc227b6b4bd4e29a587185a9b0aa1ac6e754f4881678d6b9b3fb57
-
Filesize
771KB
MD5fb051de11ef75ed1f79005198f821776
SHA17ff3f4cb7b68871e0cb09b2e16c74dde9ffafc25
SHA25688b70d0e66f3de53b285185f36b4da7147696ba62404442c8b34cd95715c915d
SHA51235932280012f56f7a176c33abe5ccf23ddafb6f08f338406f13e75c8b8e20ff17c2497f5452852ed4ecb7ae3557aeb12fb9c28ef254be688b71ea34df4dbb373
-
Filesize
731KB
MD5ab73c10acdddf650b8b1eafc6ae606d1
SHA1c418075d2c892ab74faa63167028c50610da8be9
SHA256c8560ca3ecbe539a38c5db9691c7ba5a434ecb7840e2c86442a5ef164431221c
SHA5125b511730f21282738d47c2dd14f9d06c95450921ad333e916f5c9a08f3c92eca90421efca47f1dd89f4937172a41d03eb1d8ffabe4e0a756c78c4b2b93c2e3ee
-
Filesize
820KB
MD5833b8bd6e9dddced0295303cf59ad57c
SHA102a2efe73a384077e9cd783d8a85e891666c2622
SHA25636d26d63f9fadac2223580ccc30dec836d61ca568263ba188fec93d41cd59190
SHA5120735618d016c5f19dba168216c4f48de993254497076bd0c1ca02bd49057cf2a53ed09d5339c60a11428cb61990d8308e835edc61f781b088eb58754825d8ff5
-
Filesize
540KB
MD592beadf5fff5998d1b3903986bbaf557
SHA12fb1d252d111b0fbb9127d12798e85182e963a34
SHA2566c7c842c3587ae5f5106172f1a8eaf82d48c0611a90d32d44a92933e599f54b9
SHA5120795ff0564fb9900d9a2e32bff6dd6509a86bfa82fd69cbf149b9a5e6d5465faa68aeba045cd1fcff1e6b8fab7789beddce42e5d3d2501e9e7d37470ded02f21
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770