Analysis
-
max time kernel
296s -
max time network
302s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
21/02/2024, 06:45
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3060 b2e.exe 1568 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1568 cpuminer-sse2.exe 1568 cpuminer-sse2.exe 1568 cpuminer-sse2.exe 1568 cpuminer-sse2.exe 1568 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/3912-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3912 wrote to memory of 3060 3912 batexe.exe 72 PID 3912 wrote to memory of 3060 3912 batexe.exe 72 PID 3912 wrote to memory of 3060 3912 batexe.exe 72 PID 3060 wrote to memory of 2336 3060 b2e.exe 73 PID 3060 wrote to memory of 2336 3060 b2e.exe 73 PID 3060 wrote to memory of 2336 3060 b2e.exe 73 PID 2336 wrote to memory of 1568 2336 cmd.exe 76 PID 2336 wrote to memory of 1568 2336 cmd.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\D88.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\D88.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\D88.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1306.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1568
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.7MB
MD54eb41c99441f5ceac6b5c8ad06071f97
SHA1e576c647c0e02075973beeab4e4d16ff94bfbaee
SHA2562094d1a8d31a9b07b3664609f5248db0ce66d9904a569321a045a0d50d6ef5a3
SHA512b60cc3d4cd3922b61c0da829a7d1286273b64f76e0b56c294ab1242b1097031a32f71e33e6fc319264e410d113906bdd5885c63486a7551827051ff41726999c
-
Filesize
3.1MB
MD53669b4ed86e66a1075baa13cb478904a
SHA1f80d864d7a515303bb88c310d63ad3c4b5c0f59d
SHA2565fef94852e676d7e8a30485bb94124a5970ea4587cf75d5084d8e68a9000de9e
SHA512814963a0871539d4a1cfc03309b89fb2e251f50128588386fbffebc7d1c9a3c87f5633a1ffa154b0e0875ee6ea400588a67e4e34ee3e171690af6c479f3631f8
-
Filesize
783KB
MD5f46316c0f8fba5fb45e238f9428d3bcd
SHA1597d2139c03c6f9ab1b2d6d6eb336ef5b1d2dbdb
SHA256b06212a2264e720a43b0883bbcd6a55f58b8229dc7966d00039b0641edb477ca
SHA51200a3cf7bd22de23459f15ce6b523d6af6200f560211417c0922335b861c2ee5549738be3d73b3da9aa3b5924081f93fae8c1fde65fe73bebe80540bb6b2f9ae4
-
Filesize
645KB
MD58e8fc7d610896af2982e45d31702f9ac
SHA1d14906165ed4d11bda4016ce8884fae7a833870c
SHA256241cc08a2dace198f30bfb72e0eff4519314785270eeeb5c782ae6b4a3514fae
SHA5127d14d471849e4fff12f8f6be4ce643065c281b07e805e804e6d9e43e60d2f479de1989e6a046350fb53c1a8ab52f9230ea472b559da3d29cf07f9e942eb95a5e
-
Filesize
375KB
MD5fb1b36d54acc1e1d27e8d8e7b1594f5d
SHA131ef414445f5a5d804da8d3629ef100a08839dd6
SHA2565af9b320e09e7a02838466d6aba3f53555a247a38c2b73dfcee1ae395fe38701
SHA5120868470d5f022e14f2e7a62e082388eab5f1a0e3de55870711c2c4f7c9a1e6b2de3491da2237e4250fbac63531777550ea532a3101d7d8b6119eda4f6a022d20
-
Filesize
423KB
MD5e8fe4ea81e7e49c50a6c73513c2faae7
SHA130525812bedc1ba3f69f0b0c51e1a433ece78124
SHA256849536b4184adde9be7fdc1bb2c2dba4d0f7873e4cd1ff12e603cb97826e34aa
SHA512f67e6497b2fef413f9331d877d1620a8f636295656019d461732c4d159b73f6906fb81f5a3cfa40ed92b35ab5e485af3bdc2e210d33a2bc244d2a974cff05312
-
Filesize
647KB
MD53352d243a79689164e5944682575c8dc
SHA1b7562401ab69392d58fd36386c2132bac554bf5b
SHA25603a218d5d4b5f12aac9a59b19e08b7ee72ee468324f686f6fc2f8542dcb6e385
SHA512e3bca648a0097a21d8a2cf16072c015c7528fe48140348c1b89be59fe57b4636d365f34f9fb95119c12b30f72c06e218b95729a5ea6c2514c6297d3777935dc5
-
Filesize
481KB
MD5d440a06dd731ed67644bf90802099ded
SHA1ce28bc8afad43fc5ca8a5585425f2cbd3b12237c
SHA256d88b4e3fe5de01fcb6d80f788e50f34c96386c24aa857840cdd9455432c122c0
SHA51229f89376ff19d6b1a0c5dfe67e28332d3125c303d202c8a6988a1140705613baa17cc7a2020eea758cab504d5acbb0685bb0bdbe63296166367f608735d007f3
-
Filesize
517KB
MD5b03ab11334a6a8b10e93711fc5fdd4c8
SHA162021fc9afc115d2f86234bb4a4774bb2524c677
SHA2564c649398fd09ffb71ca5dfd51245d302cb43e76839cafab45269c9c8d4a46e55
SHA512f76009e314c58d08fa3aac51947829f5b43ea02dc967dab11b47e6e543f2ff2cbb8a08b2cf232993458d87002e4efb98544edb7066d37d4ba127b1e10235115a
-
Filesize
488KB
MD57b8442d599e379c24977f02b4d72b84b
SHA1a923e848fabd12ac38e001e4546ebf89048d7105
SHA2560ec6c26f9ed5e39e1a5033ea2599efcc3cf69edb0ab11aa30b2cbe41360c2861
SHA512fe1a68d4ff46fe758f064540f74b46847b9ae15d06ab7afc72da5ccfac2378c5913586736da8367710f0c8bb463b38b8ef33c88f1ebaba9ff50e0341feaa2083
-
Filesize
569KB
MD5d05fb83a6f9604f1afea0c6d7f505144
SHA123ef5d9add3b6a08408e1a941ce6b7153d730b6c
SHA256ecd1969a67e064e932f2585abe9576412be3669e96418775fc0747e5d927c66b
SHA5129ede23f717eed427d09f9191f2ee84aad31a09d81f58b8c39915c6f2d61218e039f6d3e5df331675293a3f3ad4f1e30a465d564f2ed0a2ae880ec5b396851cb7
-
Filesize
732KB
MD5c2ad6cd2631999cf229acee6e7cefad9
SHA1fd2b91223c2a296ce2388bce8cc215779cfb71ae
SHA2564e958a2d71d03a072e8de134cc297fd4c7b00ffe42eab44fe62e4ae845b09dc4
SHA512d5c2040ff0a8e8aa9878555efd87d169dd56824b808d745aac9ab49c90b7bf656c575958e464c017f8e164f97752d87ece2c6c84795bca12346a967f7dc22d07
-
Filesize
447KB
MD523f08708fb855c154645b8a20804eda3
SHA1af60be4dbc98a9e484a168173f09b34f6414799f
SHA256a007a44c74ad33a9460510bee510dde9c788c59be09d20dddcad15c411183c3f
SHA51280ae0e5cfe5e1e95593adfd22b1fbfeb92e7c6c69b33ee6bae9ee4fd908f1981164385525ee8fc43565ca0df6e94867336361006341c1eb18392857924252cbd