Analysis
-
max time kernel
293s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20240221-ja -
resource tags
arch:x64arch:x86image:win10-20240221-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
22-02-2024 04:50
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1536 b2e.exe 1688 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1688 cpuminer-sse2.exe 1688 cpuminer-sse2.exe 1688 cpuminer-sse2.exe 1688 cpuminer-sse2.exe 1688 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/3060-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3060 wrote to memory of 1536 3060 batexe.exe 74 PID 3060 wrote to memory of 1536 3060 batexe.exe 74 PID 3060 wrote to memory of 1536 3060 batexe.exe 74 PID 1536 wrote to memory of 3196 1536 b2e.exe 75 PID 1536 wrote to memory of 3196 1536 b2e.exe 75 PID 1536 wrote to memory of 3196 1536 b2e.exe 75 PID 3196 wrote to memory of 1688 3196 cmd.exe 78 PID 3196 wrote to memory of 1688 3196 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\9460.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\9460.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\9460.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9654.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1688
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5762011b8cc59274ed0af7f58e2ab396f
SHA126b0a1b4faf307e2a4eb9c9d8c3e57ac81757fdc
SHA256e97d90514faa90aa652c4f7e0d5d452635b526e5e2c669aae63563030744f479
SHA5128de92db3fbcedc2907fb12759a24f6df798ffc418b3ae4c196ec6d637fa7f26873df6d50e2e3a79d977e67cb46b3c5011c4c220f43d12dd3f93b1e7634472b25
-
Filesize
1.9MB
MD53a9874cd7cc4b888bba52409b8ab2d58
SHA1265e96954efff438d3a9fe42eac73df71446b7b8
SHA256626bfd78cc21afc499cc06143745101d8d4ffce819f3949b60042f6f66521a47
SHA5125c0c157f5fad093a4295c3c8421e2d245372302c2a50244c10cf59ec5729617ff7a0db61fa0d21fc187a4b7fe1e355f4c3b740f63facf7c28bfd57df3e8a9367
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
611KB
MD550a3e682ce7eb3d9ff15ab2041fafe4b
SHA1276dbf53b4a58447d554e4d015b6d228737983e9
SHA256bee14ecbce67c8ae2b0dd38b6ef7d78510af037f64fe943f4e8160a0ed966717
SHA512ee6c11e137fb89f64c8e6b2039e4bfcd38e129fcb5f0008851001dc60126064f57a258c9b14b37b81c521e301c8ab3b0913b430dabd9ff847c2bb6c20cfade34
-
Filesize
1012KB
MD59c8a2729c95aef790e4ec05d86efc045
SHA1d1bc543f47bdc6dad3d62cb2256375f539727577
SHA256f29fa11b4e4ac6825ddf2f50d0f267412dd6f1178bda2c746e35cf49a69a2694
SHA51281bdbf629dc8ce6bbe8e33d8a508552e82a3367fa212746eff4c7c6383ec513b7e94a7b8b6f769c3c935de827fd468a23176b9838849feeea83f3e1cecdf17ff
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
497KB
MD5d107489016f59318fc3babe861b7b2c8
SHA1e26b765747cb153c6d81b2e0c4d1b3a34e298334
SHA2561a923b5426a0fbfb78322a8b0b2efa51b8b67136f6f6513d4d6ee1508dfe58be
SHA512c1e7602eea3200664e4939f34e21ad8c9f85938c5d96386aa0ac4149e57da14fd34b8011171074ee9571361d365e9233dcf50c767a6fe264cb0f3a4334137e02
-
Filesize
677KB
MD59493a1ecd6cc00bf1cc837783e146f90
SHA10ef4d7465e9049cce549533bcd73b365e0ab16c7
SHA256d45efd46079f8d35775755c12e8975a24ebf75526447a29f38f68ab343f59224
SHA512592d4a303c643ce7b5e1c7f92da29ab46efc4072478e33bb6bfd404f84c6916ca2c76d6a00e690d4871d0d531b45445affd126e888edc327cabd9fa6b3c603f1
-
Filesize
587KB
MD5b270a3b7e4c455659121bff97e2f0d7b
SHA1405cccb38b6eea1f52c2f0af30e8c8537a5dfdaa
SHA2562adb9106554e3b01586b53159f7edee2ad039ff19001a5006a47ecf905c2b1c0
SHA512cd74e7fa8acf45d3709ba8cca0ec86fa7503eaebc2f6bb278ab3e6c3768eb42b6a90bd19ac602c5ace55d4f2aad9136e9c4f6d92e6c77550565b8ddd032c16bb
-
Filesize
500KB
MD5e15aaed27475cbe4576009592b9ec0cf
SHA12ddd9f64addd20410eab0ab1a9bc18de0bfb5b2b
SHA2567755e131411b9f05ef39fdc1c1aafe02dea1d95558c5b93840718f506cb44f73
SHA5125c20b2c617dff5197380ddae985ccf19f8a1cdec42ac7ac2e09c2aa9c50290d0e92e070d6b33fbc4a4b4d5e19cda4dbb45edbf03f0f3822871704b3647f49ed2
-
Filesize
689KB
MD597a4d422bdd3bf3e6b53a681cddcb52a
SHA19fcaf468eab9862927dd66bd67f5821f5ff3e530
SHA256184f7f7642c92d8c7f837fe6872bbdce6b8cd437ca5e651b9370e0f1444ed93a
SHA51217037069b0758daf761b3c0eb0ea584d6a72b8120f7e5418fa5cabe0e1b20468b6da110956593303e7a9215815aaa35dea8fc8600f11b0e7439e532d83632914
-
Filesize
288KB
MD520f1e289daa9e0b49f4b2d463d0adc3e
SHA192f4c736f63c61cef994d1d48e117f71981a0e1b
SHA256bdd6e0fabdad9820e5855ea24ecd1f750ae29476b35f656f68a5252841df9fcf
SHA5126c7cf985bb1fb69b81c8b13840ca2e25111809965faba7159ecd7eb080c4cdc893d531ff65d7c53420e83600d504a12ab21b4c52af2df904802c97742c52bf99
-
Filesize
659KB
MD59e494e9a98741fd42cdefac0672f6b21
SHA121dcf1bed1c1a23c54a15e341db2fc49cf369bb3
SHA256f1905d5c4242306763141e90fd1cf3f43ccdbb48c4cccaa36ea0277be62f5238
SHA512b1c83dc56583e047e02637d4557528917b49f8e7022730513c91b4654b8ec9b0ef7056ed88e8253768ec58404a88cfbc8f0ac66e44b19d291c43fb085ee61879
-
Filesize
505KB
MD5226d163c0e2365573a5d9b35f55261fa
SHA1b6c2187f121d903a6c3092187540f0852d4a2020
SHA256ba656ffc1ebd1d05f230b1e8c77a1a2c374a6f80b12ff51a6896e621f3d44284
SHA512152535785be207740220531b5d82c99a5ff4121ace76bfb8da50295b8c57fd0c54111dfb805c6b1aed9123073b3c3e9daa7be3a253618f6acda2a891e10db7b9