Analysis
-
max time kernel
295s -
max time network
304s -
platform
windows10-1703_x64 -
resource
win10-20240221-ja -
resource tags
arch:x64arch:x86image:win10-20240221-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
21-02-2024 17:49
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2404 b2e.exe 2232 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2232 cpuminer-sse2.exe 2232 cpuminer-sse2.exe 2232 cpuminer-sse2.exe 2232 cpuminer-sse2.exe 2232 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/3540-4-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3540 wrote to memory of 2404 3540 batexe.exe 74 PID 3540 wrote to memory of 2404 3540 batexe.exe 74 PID 3540 wrote to memory of 2404 3540 batexe.exe 74 PID 2404 wrote to memory of 3544 2404 b2e.exe 75 PID 2404 wrote to memory of 3544 2404 b2e.exe 75 PID 2404 wrote to memory of 3544 2404 b2e.exe 75 PID 3544 wrote to memory of 2232 3544 cmd.exe 78 PID 3544 wrote to memory of 2232 3544 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\7B79.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\7B79.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\7B79.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7DFA.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2232
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.6MB
MD5d2713ce8cf1f36113cd3e2d8bb2a059a
SHA185feb79b4ea42ca55adeb0889d415be42cd091c5
SHA256d8da87835dd34a5c20345656fe31958c5a7680d42564137f189f1a0d04deeb73
SHA51225e6303d8c1cd4e44a5a1b2cabfe2fcc921587a4889cab2eaf70f0e52e6037621305a9332b41d227a7406b25a3054b23bc8ed0327a5f02e6058a2fa9e9d91b2e
-
Filesize
11.3MB
MD51265d469f6b184a27f0492b6100099a2
SHA1c70556aa1f914d0d75c7cd9d6c9de720e3bfbc19
SHA2562e15d6450441b42018efd8d97247b17a86fa13d04201e8b0c65886afa7920e66
SHA512647c4c2d45d418b4b10fe001fba1b641aa84c45f511c8f4e8a6bb6a5a693888a6d2afce625a7c5648b96918fdcd7701dc32ea2b492657734acb3eafb41f50588
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.9MB
MD5961cc38fbb4816d30dbaf883f44e8d61
SHA1f835395b707af685147d3f751e31477d9893a641
SHA256b3e66656c25557afc1a329d2ca5c046de269b3dda7db969a51885e68d8184d7a
SHA5125c492318d9f87bdff9020977055c167e4eef33b52fe936f481f5c37860cd2209b8c71dca000d218f7386246c40c84ba10cf120635664a69db1f8fc0c0c9d3191
-
Filesize
2.2MB
MD58439fda05f9fb61f13d80ccb22929f72
SHA1f2f551aa3337a2f1b79bb2bc594e7c87e3de194c
SHA2564aeba3212e1e31f16f2552c3af0ff4b3e86c1d6eb30b6d1ca0b47c0a5db75382
SHA512570428b48793a367b7432ce1b20a00333b235830723bd9ae81f86b93b320614f7a2d9831995c84a0672e1f7a2d849c1e679da0ef218d3a2bba07b87025f63bd3
-
Filesize
3.4MB
MD5c280cb57034f7c85dd63a952b5de60f3
SHA1f25e6d03734e4bc4b02184a25edb1265731ebb7a
SHA2562bfe171b03e787c996e51fbb88ee5744b368a8a56800fab2198bde2887f7d931
SHA51278e662e4d8ae1fbf86ce3287dddbcfd17115f0daac6cad763766efe142ef25c3f9a7c2eb10305636aa8f0d0c2392b57d5eed489044a248631f510a3a8a8ed42e
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
2.0MB
MD5b53e212423ce09a20a7f4461f9cd98a5
SHA14bc11ba3fc0436e26a676040847924cbf72664ea
SHA256e0fdc3d61e2ea8a984bc109aa7d3922d72c57cff0625d04f0b911ce6578326db
SHA51255a3adf1186d6d4ed68edab23832c314c93d92a16e9c1e354c64b791e2d1ac81cad52bf360bdbb50b01f1ca9fd6e545d885a56e6a96053827e41eb5f39d50187
-
Filesize
1.8MB
MD5ab2c2233ec3cc47dafc939e288e81ba8
SHA145a8dbc2372da16b50aa6ec9f4f265aa09bfe9fa
SHA256cfa1f2084c271f627dae3076753013ee6efbd4cb3e52fc990593f004abda93d1
SHA51283d31f0ee7ee2c6cbbcb915d645e997e4e8e7272550fb24cf60cc79a5534cf20850d2c944653dc16949b015c178e30e67d586d6317847e060010c1ed39f060e4
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770