Analysis
-
max time kernel
293s -
max time network
294s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
21/02/2024, 04:55
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4804 b2e.exe 4848 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4848 cpuminer-sse2.exe 4848 cpuminer-sse2.exe 4848 cpuminer-sse2.exe 4848 cpuminer-sse2.exe 4848 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/872-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 872 wrote to memory of 4804 872 batexe.exe 76 PID 872 wrote to memory of 4804 872 batexe.exe 76 PID 872 wrote to memory of 4804 872 batexe.exe 76 PID 4804 wrote to memory of 4340 4804 b2e.exe 77 PID 4804 wrote to memory of 4340 4804 b2e.exe 77 PID 4804 wrote to memory of 4340 4804 b2e.exe 77 PID 4340 wrote to memory of 4848 4340 cmd.exe 80 PID 4340 wrote to memory of 4848 4340 cmd.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\98A6.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\98A6.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\98A6.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9AC9.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4848
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.8MB
MD5b18112e281e13cb33d879005068e4ee4
SHA198a617521104c95a0641e94a7f3a1b87c7ed92f9
SHA2560cee6457ac7b6f692044cd56a8e60d320ab387e49501ee3e34a1f0bfd162b47b
SHA5129c76b479845451e801f2ea363d72d6bfe05c57da9766661fd319136186191ced340664e8895503156860256fe1046ec870a439489cabb28bded23d7a638c75d5
-
Filesize
5.5MB
MD5ee1d005b914e2fe139810b77a48e345a
SHA166f210cee1793048e320e550944c8d0dbbcc0ccf
SHA25685d09def463142c31ad2a1521b46122dc59e6f7d5e2eec1466cbc118a8870c11
SHA512309afc5d41cb682e9d3b4a267ae75a8ce6a69c3a295af08c99831a4fe8d6138808daa3cf936a484cacaf82f43761bc4444bdea54dff796c90ebd8a30a78ee856
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.7MB
MD5665e0327f7261623fa741cda77fa272a
SHA157fd2950fd4645598785b0f473a75d133bb42367
SHA256a6de9063eb10cac92d6b987bde9977187925ef9ec0cc1ff461f0d64aeea83138
SHA512b5ac2fe1aeaf89d27806d9b638feb8dbb24c0d1381306537ef59326d7b226b6654047ab1aeedbc7680821fb7d4c65a0b2aa1bf75d0a86f1e1db00b545f0ca056
-
Filesize
2.1MB
MD59ece4d1c669433e58735a84650d77eef
SHA14178b0463146fafa7ed17a8a254e6f2cac2b9ac0
SHA25613a0c506b4081f41d30b8e671745ec60e929bd65d8961f07397cc0d42e6a7afa
SHA5120f17bed984c224ddd9660444a70f889b7d21fe1d0514a688fb4db51f817a56e536dd40a21425e139f3e3bd13998e4a0c26532dddcb2483f8ecdbb56ad07c8fbd
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.8MB
MD5dc8b930f8951049dda843515d036884a
SHA1694268dc9c827be782d6ee872841848d06e4e1d8
SHA2564e7ab4bdb0af15adb6028b6a5a44c63a6a3cc7d0cc6e9624d9c3f432784feb54
SHA512f83b32dc45c46ee417901cef0ef12664d584a282911f84ebb6e8a248214f2f15dd9f9f9c94cdb1e00435dc2db2b3177db3e7dca0ee29941e9906d16a3b1aada9
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.9MB
MD51617131fdd0b29d9d6f2ce1fd7af0601
SHA13daf4801490d6730774effcd869898844ecb8382
SHA2568ba811fea6411cdac3d1b82986c5caa8bf38f5caa7094a128297974dd5386a1a
SHA512e85b94d1fd8ecc69bb812ff74717f6b42e8bee1e9106a114ea3089cccecf4cb680bf90997fe08133f7182b03d5f068b4d9058ac52f75c1c0869cde0ae6b6937c
-
Filesize
1.9MB
MD577c74e0a31e537480970d3df9da2b834
SHA1577192a45be1b30d81dd8f385a7dffa0a28bbac7
SHA256da0119af3876b862208cf2c945c59a7c9290ec5bc370d5b01a1123524ace2385
SHA512462506a63e7e77e09134c20ed4aea0e1e086bba259aff699d879c7b1abffa7edb1a0bb48df1ca4a0bda7ab2f7b1a15b9f19425e773466ba97ceb8e0e4b3fd663
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770