Analysis
-
max time kernel
295s -
max time network
305s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
20/02/2024, 12:17
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 684 b2e.exe 4664 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4664 cpuminer-sse2.exe 4664 cpuminer-sse2.exe 4664 cpuminer-sse2.exe 4664 cpuminer-sse2.exe 4664 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/3156-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3156 wrote to memory of 684 3156 batexe.exe 74 PID 3156 wrote to memory of 684 3156 batexe.exe 74 PID 3156 wrote to memory of 684 3156 batexe.exe 74 PID 684 wrote to memory of 2432 684 b2e.exe 75 PID 684 wrote to memory of 2432 684 b2e.exe 75 PID 684 wrote to memory of 2432 684 b2e.exe 75 PID 2432 wrote to memory of 4664 2432 cmd.exe 78 PID 2432 wrote to memory of 4664 2432 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\20E1.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\20E1.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\20E1.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\25A4.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4664
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD52485de59d953a11ab833d7dcd44a728d
SHA15114b4a01a6142b43ba5bbb8be0e14fc35b50298
SHA2566f5270c858b67722c1a82368aca08cbb995608a53ba5f33233ae404cb0dc47a5
SHA5129b603e1217f3b51c62b930f094c81bb7a8883ef1cf03a9c2ac50d7fded82a576524e2b3191d7ce57a1c10f53915fa72e503dccd1af0b5b491c78ef700d287be8
-
Filesize
1.9MB
MD50257dc4b50993fe834144f933f2b4890
SHA107b64612aafaba52e29fb458e1fa6ddd961645ed
SHA256953d6969e100c5f4a751c7df33a353d92fb018a7696b245516b69ff01bf63177
SHA512083396bddae4ce4d5d39c1aa4695f1698034fa99c4d3412af1e39ea54adb4c767c5236bd68d16ad456ffc8f20a54142afa764f41512a630b38b4909f2b5ecda8
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
741KB
MD5c0145e27f41844e9d970eef280013213
SHA1456f846b8a7c47d3c1668eddf2de8c3674f0f38e
SHA256ee812ba8e8b9eb293268b5e1f79a22fd2b0a730bfce2fd2858572c8a07637fe0
SHA512a7d5fb547c07f7669abceddeaa5f30f12feff66499862bbc1ba9cd95fe935d3e7e006eae1c57c0a8406f4534291307c127d56dd4f16d70b3043fed02128f4df5
-
Filesize
522KB
MD5439f892f4748f3a42b628c22131f7411
SHA1f6db4c58eef01c4be3aea2d1719902c004de757f
SHA256ffe686b3dcf63281199ac11ea2f04eb44a1f42b365fb9bbe5b9c66b821bb981f
SHA512234c023aff0b42fd9316a1cc3c8945ae8ae4e9cacf54af8e2fd9031b2c95063de7aaa131febe1ce83ed99c6730cbacd5a861eddd817ef72088417b1f353c8b18
-
Filesize
769KB
MD57c0fdd47119f65421dc93b929aeaabb2
SHA18de579a3b131256b0fd566e0c271ec9ce57b21ea
SHA25632de32f438622f2307b9d6eb1a7e1c48fa0ae3510da27b4c83d4b5428754edba
SHA512b7500e52d59da8af9d0aa1baf6fbff1dad95f64f6a0ff778d3d2a959b7aa651cb515fb9e0bb424291915314cfaf01f58e086ab02ea9d27a90db1da63d0ab1bc6
-
Filesize
770KB
MD57b38dab3e6a55af5aa8b01e4f06d7fcc
SHA11dbd22089b23ee108ab87296624a5b9acd791e9c
SHA256bac5763bacdcb1b8870b6ce8b8ab122a9da259ddecd01b68212fe401075f29b0
SHA5126151165caece59ef46c295a3de007dd583c5b1cc916ebf12bcd0677d1599036c2cd1c0ea353704552f6ee6d51386362804ecc11a44ed2fd492519531a83d73a1
-
Filesize
960KB
MD5f3707fd5b389e53285dfb3815a4785b8
SHA1788b2ac7be4acb28e804021893e11cdd44ee0784
SHA256f7ef0e3e60989fac5636e6e5a018b730b403b75889125b56c4d07d6279e94c94
SHA512f11d8577758db08f597987f525b4fc4c8c3f5181255f89281300968dc90fe4b298c322e3f531f768cd5014d116bb7161365c9d3fbaa76ab835405d8a1e231f26
-
Filesize
395KB
MD51800e66d52f4b191255b16e596b27639
SHA1fcfddecd7d49c66dcfd2342d4e5072ff601480fa
SHA256a95a63f41b368c8e58c8f4a4c395fc075989f78cf669d4393948aeb5fbd932d9
SHA512e675381b004edff7c4b4951186f7e8186791d58f60e21e94d762bda79768ac1a2f4ef2d6d36e4592a4e8306ab5e444a30316e78cff6f566a2d1648ed6e215033
-
Filesize
758KB
MD5965db4801e4fe9b6de24aac253fd969c
SHA11819d7ce7cac91cf6bb3e782afe14250f1cf7dc2
SHA25634f2c95e224d6cfa3f18d2cfe287718c10392f1003777545a3d29688561fb12f
SHA512dfdf9c1a32864947ff7701b69ffc7818c4c0008b3a6272de3c440da0504382cd2bd673b38992ac8a2433d849be6c1d1c0796f2e4bec7744dea6c08779b461a88
-
Filesize
574KB
MD52bdd59174eed8651399864101b4557fc
SHA1b0beb0d96668ae1e588a6b640a1c001235a74d27
SHA25649b4e5cc86a36c47f1068892c5586e9b83c7200c2212a01704eca175001567aa
SHA512b3895c10e7012d8cf09e71cfa2a714cdf2e25ad2af19d8a05a3a0a808ba5146a5451cfc5a3d1b02b873955f2f2ec166958c7811e11a6c925762b7e1f86a99c32
-
Filesize
505KB
MD548d67c354643a1d7126685b692501f05
SHA1b65336c79d03edc508772e816b2121ee78112ada
SHA256a1bc7e4138a82f34d3e4c5deec44d437fc48f2fb55ab850a750b6030ff6bde65
SHA512df529bf60d5d57e184be67c762bd960fe457f5821a452528f87f36b531bdb1e0578209ddd17fb5723f537bdcd0a2bc365ac73812f601d7931af3c1cb5a658159
-
Filesize
466KB
MD57ed5f936e2413333b174dd48d81b98f9
SHA1bb23a8ae2766aa9de235ee4f9d8d0875b0a744e2
SHA256341adbfe53de05f3b32770c7c0037dea762ae701e6de99cd3de7adabf4d9a861
SHA51282872937b0217e75e24bb80fccc3d025bcd6b8c27437071a059af91acf3f3e0208b0c14f95e0c6131efbbf4ab62d4291aedb98d87eac43477b3d7e3be618b86f
-
Filesize
514KB
MD5906d35f2e6c440a4e2c4fb483176a31d
SHA1dd17db3d19c4972e60d5ffa6350d4ad5a6530ca7
SHA256466f7acd339704a10f3fd43a020c14b6b427c693dd323f9e773205ec5fe4936d
SHA512eff3dbdca912785c710c2f40dc3a80136370a646f8d6cb1e5857c6d3ac4004f908294a7d18170bbe540bc70117429925556122bc168b5eb831a8e2280abcfe8a