Analysis
-
max time kernel
292s -
max time network
299s -
platform
windows10-1703_x64 -
resource
win10-20240221-ja -
resource tags
arch:x64arch:x86image:win10-20240221-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
22/02/2024, 04:11
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2160 b2e.exe 4604 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4604 cpuminer-sse2.exe 4604 cpuminer-sse2.exe 4604 cpuminer-sse2.exe 4604 cpuminer-sse2.exe 4604 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/2304-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2160 2304 batexe.exe 74 PID 2304 wrote to memory of 2160 2304 batexe.exe 74 PID 2304 wrote to memory of 2160 2304 batexe.exe 74 PID 2160 wrote to memory of 3740 2160 b2e.exe 75 PID 2160 wrote to memory of 3740 2160 b2e.exe 75 PID 2160 wrote to memory of 3740 2160 b2e.exe 75 PID 3740 wrote to memory of 4604 3740 cmd.exe 78 PID 3740 wrote to memory of 4604 3740 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\8993.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\8993.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\8993.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8B58.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4604
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179KB
MD5699c0c181128f71a0cd6c257b040507c
SHA1d7e55ebb9043de1953eed37115263dff79dffb80
SHA2564a36c9c81236703e87669deb9d156935107b3ff7175213495a7c3a2c0711a7f6
SHA5121f67d7ca53a5ef3ab49603c9bfee7c99bf24f6cd3954466602d6db864d93f60ed713e4eca6f10ea9ac16675f6ab4fcfd903c5fc657ccbf85b47a85b761a4440b
-
Filesize
2.6MB
MD5fe22b1470617301e5fe99a077290884b
SHA1983f6ba67c0cc4b0c32bf9c86b4c19f079dc0e94
SHA256805d8ff57c60a8e07ef52c4488655a29874a90f21c5ec7d74b3306f46d19c84c
SHA51238768f5e04bd296e004f7c4fbfde41778697394831299462da8b689dea5d114a6082cd7e45a45fe757f60490239a241c29b2bf518cdb5db9f169ab1878e83400
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.2MB
MD5a4e18922ad1567f363eb143ca840be36
SHA19e9d4be683414e5c90097c42f29e87b054d60b3e
SHA2565be2921dc6b3b2b6c4509f6ad297f2f88b537a3f5ffc4e56f35c7d2a7cc9b008
SHA512485c8e3781a851c9e1f0c17926db0d80c26a14b460aae2d87d359dbe01349b11246da0b13624de352bdc72a00d0ce16aaecac61086e3342faf14993282842fdd
-
Filesize
1.3MB
MD5089968c960877fedb9b1ec24f6f586f4
SHA146acd634a39a1cb825ba073daf06b07bbf1cdbde
SHA256ea785552f9419d508f74634e7934201b20e0a2f84c10cf13427305ec22586a5f
SHA5120c17edc468cd78ae513cf8df11d93bc81c780c15a19608821aeca68e8bf6386e42b7404218ce914773063eb2e25b799646b369c6137368024bdc3442eb29b0c1
-
Filesize
927KB
MD52b578d5db8133b77c9f8506766642cc7
SHA1b7fc4eb1345dca27018e55bc992b77981ae0332c
SHA2564695afbc331714cd2b030e8ca7a17200f99817c615be84de0bbfaa9861ef1539
SHA512873fb74878b9f4afa5299a605b876b17582299f747cecc374c00c72a11da2e2b0b04c3c169984bfb091d4a2c653668ee307e3595d050016d5c6d6966b231b400
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.5MB
MD5186a56f42ecc36d4313358f9b060e046
SHA1b10236d7ce369cf221d2873472ab5c5303d5223b
SHA256f34b9d587a09b1e605eaefdb1952413e0f2f4dc29de22efd78f6217d7d192679
SHA51228447014df6cc77e9e9da477e5b58b85a4c06d0c0c38b6927bbd8c213ffdcb90b3d55fa6c91859d942ec50ec4ff46a55ddd207feddc2cc97a15f748a6782148a
-
Filesize
1.2MB
MD56b7343366a547101a32ef5209b751931
SHA158c195922a795a5a63c2da5ba9fdab808bd3c007
SHA256bcd650cdcc6e3d55344160eca6a510230d12fa6d27fb6fe4ed2883e29231f467
SHA51201ba6bdfa100992fd6d881592efce0dde6b8e135e2833ba1ed0501689a4cf4be49ff69c7232cfb13a59e1297f3169e253db084ce939553f315bc91649543fab9
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770