Analysis
-
max time kernel
297s -
max time network
294s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
20/02/2024, 16:32
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2200 b2e.exe 4788 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4788 cpuminer-sse2.exe 4788 cpuminer-sse2.exe 4788 cpuminer-sse2.exe 4788 cpuminer-sse2.exe 4788 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/1792-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2200 1792 batexe.exe 73 PID 1792 wrote to memory of 2200 1792 batexe.exe 73 PID 1792 wrote to memory of 2200 1792 batexe.exe 73 PID 2200 wrote to memory of 2256 2200 b2e.exe 74 PID 2200 wrote to memory of 2256 2200 b2e.exe 74 PID 2200 wrote to memory of 2256 2200 b2e.exe 74 PID 2256 wrote to memory of 4788 2256 cmd.exe 77 PID 2256 wrote to memory of 4788 2256 cmd.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\2AE3.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\2AE3.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\2AE3.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\319A.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4788
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5f8b8395522e143cd5a4a83f96b33deb6
SHA1fa12190582f17447d4d4f5138c289f8f77157da9
SHA256575f88f2fc60c6b5427ad5308ce3c1a37f6e040e8ed0f1be85feb5d42c2b48d9
SHA5128ed92f8212812c372830f6172a0abc5ad841dc4706c1299bcf0904d3efef8b99b7a8fee41069fbd4cfd6e019d1417052f39e8a7b67a59a88c5cfdd0192ee5633
-
Filesize
2.2MB
MD5b20a7b1fb84d6bbbfc7659b99f720a41
SHA18dcb5fcd1f37363fae6312303408f512efdb871d
SHA25642baef2fb8b1a132cf8e92f4f71ac0f9cda1898458c7b90d6892e0f7433e7487
SHA51280d1a3d1882f77db4b94ff7fff0a8b7c38989109f06bfdb1e962dd95324828baf5db413db70391b4d8a21ef20c678f1237c8779037986c0eba57b5f7c00d2cc3
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
51KB
MD5b9cb1712de363a4b25b61b0326e8e3c5
SHA1796f0346cc1ca8ce8508ba377f14342bd539c9ff
SHA256181b6f7d1e0a77c9ee831c84f30091031df0a4e71e56e0ffa6d80b6a7e144e19
SHA51226e14b2975c6255fd638d1d8e245af62514347db8814672feb00aed907139d160d54a9c39b3d1d1af6cdfae2d43cd89e5c9df6cc428e454b175cbb5186fa1e0a
-
Filesize
31KB
MD5cf03dc7162f39d174112faf55f7eedca
SHA14132792327eda7562258e1cb4d782cec8f61b6bb
SHA2567fb646152d4a9bb3010f7a5431c891dd0251439fb9c97b6acfcf2bb26d347d35
SHA512f5d30fe0172f1e54de4102e21978031f7d2e7b39f5c2423cbfc0a0d1d1aa92daf9f2509cd11409b46fdabccddc6c8baa27425111998001101490e6b11d115f5a
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1KB
MD57afca165eb598c56e10ab965bb8846ac
SHA1ec4f2164d7fd2e3a9ef14f6de528a322173a9453
SHA256555ac9bea13abc8011c591542b66c78024aa8f18c80f5a0114d5200a8b17730f
SHA512d747e3aae86c96e7821538575d6d5a810125f584f80d4404b3dae3aea0afae5ddfd3b353b6cc7cc4bf40e30c1c2b2f88eacce19cab10e142ff9998a910f179cb
-
Filesize
14KB
MD557bc28e77ba7f02252d5d1c6ebeb7e33
SHA103d31966e052d14ff5f92d69ceacf8fc886e003c
SHA256094b3dcb3308d87ee8c065d27dc1e0ee818c68d37312bdbc03af9c88f20914aa
SHA512c11bdf493da9bac705cf4d31330ad4bfe2e93c5aa6c0812c47906645e441981880cd651ab20b53e0e9770053d8e3b5a7acdd515ec74f6e16a8c2cdccf49229d4
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.4MB
MD58c6b7d8ae34ce3d18f20a3ad3771558a
SHA125c34c29a20a34d1c1cc6a6eed0f6d3af096ef85
SHA256d959e03d2899ca2bb46b16f5681fcbb5074d2cc56df7e30e496b098f728bf157
SHA51231e07c7f4b93f06fe66ce10a7f98efd0c328bbd1a06d8ab4bfdde43394a4a682bef58d5a7ab1e57a4e447c4d511f6f03948fced3049f641e27a0dfa50b492add
-
Filesize
1.5MB
MD51c44365cd71a0923bdb2f3c9b222b75d
SHA15fd6a07d6ef1423978a628d9d68c7ca90f3b7a69
SHA256d72147dad57d054ca455b46af097089837a251f17b8157d17835fe9bf07927e7
SHA512e63427b9afe5facfc9aa74f0c5f2132fdc2db1bac4ee5a9e10ba33ca7ac604a85470a18ac273951616293c2d34237042ef8c714f74a7e39a4157817a8bfa80a5
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770