Analysis
-
max time kernel
294s -
max time network
298s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
21-02-2024 10:57
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3372 b2e.exe 5096 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 5096 cpuminer-sse2.exe 5096 cpuminer-sse2.exe 5096 cpuminer-sse2.exe 5096 cpuminer-sse2.exe 5096 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/2876-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2876 wrote to memory of 3372 2876 batexe.exe 74 PID 2876 wrote to memory of 3372 2876 batexe.exe 74 PID 2876 wrote to memory of 3372 2876 batexe.exe 74 PID 3372 wrote to memory of 1836 3372 b2e.exe 75 PID 3372 wrote to memory of 1836 3372 b2e.exe 75 PID 3372 wrote to memory of 1836 3372 b2e.exe 75 PID 1836 wrote to memory of 5096 1836 cmd.exe 78 PID 1836 wrote to memory of 5096 1836 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\9981.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\9981.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\9981.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9B36.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5096
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.1MB
MD50bb027e79fd3a3a15231fc456af0996d
SHA176bbfdeb6472a8dd30c672043c58a4c9c74062fd
SHA256ab1029dc04f8c8125f4fe23a1a12ee4ea0812d4ceb2aebab13907ffc2791e693
SHA5121409bea5af0220f3462be616afe8dd5849e945fedcbeb738d70e60820ac04f9df1215717d65bd84c3beeeb560447eefdd43743e1792e6709d726d645979146b6
-
Filesize
12.7MB
MD59b9f582d50b55bfe99f9e47cc712cfff
SHA165ae5afc6f875c854c21a9a531f46b28c6ab4555
SHA2562bdf69a46da83947ec182681c954a5201ecec4ff06371ba93d1ab616329ce0e4
SHA512c56144bdf9f45a78f773e844e8415e2424f899e10516f9edb65b4eaf9c2e4bad24b66082c5d519442fb388fb6dd9da1ff08bf25e958367735c2529bf4ecb428e
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
832KB
MD543dd8ab1a0fd7f177db516faa81a9635
SHA166a8b6940797f3396a4f1a6deafca1fda5bffcdd
SHA256d4b58fa7e09511b58f312b57e2067823a7f31ff5cd6369cbf5ef3667c27b60ea
SHA512064753e38fb6e2d64a8ce067a52c24b55eb11cf714a534f3557a0e2bd2f5fba16030d8496c7787f4b272ae6a696f4b017d99771488832d12711a7158c927f772
-
Filesize
1.6MB
MD551a57c612d315cd4202df8e75c1013da
SHA1e58bc6db0f4c9dd680e300cdc660210316ebcf19
SHA2567652861f498ad81f347beb2197d0ecd193ddf5645d018e533e840c0765b22b8f
SHA512cb9b55ca097de0bbec9360f7450cceee0d7c307feb81f59ef0b6caada1cf2862d494a52e3c8eb33a8d894be076298433dbe83ff936feea953c560accfcadb675
-
Filesize
832KB
MD59b527cc7775e3fefc75ebd6cf497b81b
SHA17405b4528854589bc404f55c0e591d2e534d8d63
SHA256eb4270d5203fe07ee63a7161093d69577ada5ad4ca659a6181d63953a69bca72
SHA5126471f61ebc78e6ab30cce7cb444c582a8a24cbcbff1a8cc3d22d20d299d53c6377127e76bcc2a1e2c9108cd65d6fb89d42ddf89b04140c8e225f5115984a4b85
-
Filesize
1.2MB
MD568359ef53ff86ff50c8e6256d0593d50
SHA14267ab22202b6a0fdd31506082dbd91f8f276e9b
SHA256448b2a19e60e06bc0a90a228193021f8fb8bdb77098b70f267fa8fb403ace80f
SHA5126c1f4be78191e76c4deddebb97c58326b8c03ad4af5d69fcd7a5db6e7253a9355d248fb08d53ae3ae4a5dc5ac08b23de807c5999c2eb903ffe5852e6217e4470
-
Filesize
1.2MB
MD589e8278b8485a299cd9dd900f7ed572f
SHA1d6f764d1d98c9970428e4c8666b0577a27e24499
SHA2566d2277a07639b4960bfbf03d1b81623ff5ca7323dda87fe1e2aabdda6be4f7d3
SHA5124f3fd13c2adae5cd61fd906f9ee81585692c794b68b4f886b2530a1e759e0854e4ef28f3e881f3c4552b60565003e0e5025be57f131d70b6c392e1041e5fff40
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
640KB
MD51bff0defeeb9f4bc5cf01e916a8d1379
SHA1bdb668928be0a339e01e3aeeac813fd26b44b950
SHA256d7f49e1dd346940049b753b856759608013f611624432c7ea57b0872239d35c0
SHA512edb3e22bb4d6f3376d73ccd538a61292c5a086fc8ef9b8038b663c93d9ec991bdca297e3c6febb9d18fd16f5304e4fa532d603c68739598f4b65af320ffb3878
-
Filesize
833KB
MD55d2fe1c2df7ff70d606e691587169e47
SHA189668531e37a9cfdb5bf8a354d89df9e283d3179
SHA25679a91c80442526fe3f8b1ccfbda87bfa4da6ddc6944fdaa5dc699b7b629fcc93
SHA512f6d626f5196bef03cf997df7b7737fc3e411ecb509d904d1bfe111df6d1ce7b18901ed0a6077b0bd58962afd46e89537f15e2173f143f45856c6c96041d46ae0
-
Filesize
641KB
MD54d1902e0a5a030ca3c2243ef2db428ea
SHA1b11091156e3bf657a4b809176e43c86927edd6a9
SHA2568aca7253c1614cf4a174f18da7ff5d04f6c61f8fce069a6013ad288ea37aac42
SHA512a341cb5acf319de5f2d0ca8a7f5727fd32cdf0547993eaf56c0ac0e78ff52b13fe11ddb2f47834ddae7143dc8a48a6fadb9ca6287755ee5080b849187a3bb9a6
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770