Analysis
-
max time kernel
293s -
max time network
302s -
platform
windows10-1703_x64 -
resource
win10-20240221-ja -
resource tags
arch:x64arch:x86image:win10-20240221-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
23-02-2024 22:19
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4736 b2e.exe 3980 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3980 cpuminer-sse2.exe 3980 cpuminer-sse2.exe 3980 cpuminer-sse2.exe 3980 cpuminer-sse2.exe 3980 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/324-4-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 324 wrote to memory of 4736 324 batexe.exe 57 PID 324 wrote to memory of 4736 324 batexe.exe 57 PID 324 wrote to memory of 4736 324 batexe.exe 57 PID 4736 wrote to memory of 4484 4736 b2e.exe 67 PID 4736 wrote to memory of 4484 4736 b2e.exe 67 PID 4736 wrote to memory of 4484 4736 b2e.exe 67 PID 4484 wrote to memory of 3980 4484 cmd.exe 66 PID 4484 wrote to memory of 3980 4484 cmd.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Users\Admin\AppData\Local\Temp\72AF.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\72AF.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\72AF.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7445.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4484
-
-
-
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD51d85f4980d66fafb6b72210df9f1606d
SHA186b1e86ce3bd5af91dc13ebb9e87d42f0ef312b1
SHA256b9c06a303f6aaafa94c1fa96b39557c92626f2efc89b1f87f9734dd7f2bb4680
SHA51231cbffff31f5b1d729d742453ea2ae1adfef8390b545388effa3f02fe134f051d6a732945ae06704f53406d3f21fbff299a607eb0b56578fda01f8efa147e082
-
Filesize
284KB
MD5713b900b42f053639d244938c2f508bc
SHA10a77749d2d9e13ac1139c926443b6d1f5f2912a2
SHA25628ae360858b2ebd53a6584c6000826d0218c80c335f1ef8d2ddf8aaac9425b3c
SHA5126799b6e499fc18573c89ae5268ab6626b631a78de30bc277cf653eed43091f7c6426dc1a22dca597cd1fe08a3122aa63f0730fbd686134675c21298e0169d7cd
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
224KB
MD5e3ed797c3b4b65b6c52dfd1447bf03a5
SHA1b9bd6b75b8cf145134766f127a983094a634c016
SHA2569c1916a77b1f3d21801d9df9fc6e7dcfed8678389dfa31ef662d728c95f4a208
SHA512b075e03baa6405a94ffcdf23197bc25daa68d3b4061852c13d044eeeddcf59e5e0a7db0b414217e6f2ff7e7266cbd4213fc3cda11e4c174340a6e5fa4e485a25
-
Filesize
196KB
MD515ae6f8d48797bea68616c00df49fff1
SHA158fab1e07755bc6f3fdd444863bfa3e43f6a17b5
SHA25660f5d91e4b041d20bfcc0c4b09257774fc91ec0aa1a22ce0f1748baaae372149
SHA51240856cde5a95dad267ef46cd2181a13fe2a9c0d263e6919e9e4cf53ae9271b6fe3caeae7539b3b2f53d7e802d5cfa534c3886dca5612490e428421a8852ba5cb
-
Filesize
248KB
MD536e547190415aaa70f35f831f0b065e0
SHA17e5fbc3b5466071498a0cc407230d1cffd93fa16
SHA256b9446883d8a224d97e3263a5d781b72886292ec8787782cd1204f276555c3ca9
SHA5122409314bafede8a53de2fd047350f309ddcc6b5bf58011df0603d09326d66e58d8821b13e91336c9392610afc822cd092ec8a2484f6843fadb6edfe9137451c6
-
Filesize
114KB
MD56380344609686f48819d2f1b5bc1eb0d
SHA194089e390bee8f0c7e255d685b9e34af3f99e813
SHA256ad65d066a3c921511f243e0e50e232920e55cd1342180277cb7df9277db1527a
SHA512238820a2addb3877af4cd0b9a9be7aaabac06b8be15f0d7d505b966ac5c5fd689e22df94f55c70dddae3085f173c1b60033009d2c72f2ec2a87f6c76427d1525
-
Filesize
121KB
MD5cf90355d2bcee2bac0928428b4b26e01
SHA1f3f7d1fd9f998a240789ae5c5fa80cfb2731bdfe
SHA256e51576d0ad7228b74a6040f06e23762409cfb25f9cb8e1b681fd302529d2a0ed
SHA512e70d09849587b71277a9842f04b9febd20a751c39894121c63fdcf1301ec98c361fcc2a0024786c457c3694bf4bb7011227d4b4fc2640a4897c3c6ae5f4394ab
-
Filesize
115KB
MD5216cd9d4c041eb72d587d97d75b5b62d
SHA1287ccd6217dff5776b20155a22b637caee8b862d
SHA2568d016e15f676493a8e9a57accb074e65e765a55cb303a8d1e700ed42b9d217bc
SHA512b8cde49f295a12df6535c0b11b0554dc51fff3d02d99d8be794c094b6955c96cf982f7b8b5aefc0b0ea0085c1f7dc64e68a3bddfabb5da49d3e6ce4a4d7f419e
-
Filesize
193KB
MD5d9d69bc54f86ec9718a76a681cb9fc85
SHA1a8c6b815d951614f87f27ef375f4c66bb890cdb2
SHA256d885aac9338377fabcc713ffef20230a047bd3b4244218158b52a2f235867780
SHA512506cf10ad38d071e363dca4df37e7a4b627dc078d8f8bfa692c3aac8a6fa9ae127a4aa5af0f89b98e6567febac00e89dc52f85a07a55308a16e1b65f4ad91d40
-
Filesize
149KB
MD541db70bbfc32991180e315a83eaf72d3
SHA104aabdfa266eed057166613f16a888e7b1fbcb6a
SHA256cc577e773bfce3bd6a536ad9d20f9f385ef54d058f30d39f020e5d77c287fae8
SHA5123d9993317cd2ecbc20d8f8570c977497607c1688df166fbc778259752cf8a2d48d3b550cf272f4ed0ed68f776e549cdda0ad9249958de23d4b4626f0b83fb86a
-
Filesize
73KB
MD5421d30c2509df5d01aeb01d2bf56e988
SHA133239ec280114e06cb694991f9b0c93e7d87d728
SHA2562a15557a1d653e8e09b5365fc819acad4f6711b5ea0170f538db8647add715cd
SHA51230064faca0137f4bb86cbd227e8f7a9352e6328089a03ea6e1a41cd92f73711f6349a0b8f10f60f10ede8432b22574c6f5e1d2ba463c79f4b4c6adc5d8e45569
-
Filesize
216KB
MD5fecf4f1c85f172205a525e970444da06
SHA16f22b4d29bb88ca135448b1aa1ce1c2e92eee4a1
SHA25669e78f1618a1020e7610df819b79d0a79c055440fb87570babb092d67867df27
SHA51266e4dca4df0e9bc5d1fbf75dab17bd466d31015dd637e0612363291d2056df1132aedb048778b4adc0aa6396e80cd723ac408fef137925f3e50d8e1a8671a677
-
Filesize
130KB
MD575603a30b5f86a7bd3f6421c3a64d53f
SHA1a99d725d45f3e6ef980cd9f50faccbfc1c9e036c
SHA2566c2af27854730006ef18b150fb5de95defa6b741f1862e4475e53c3213afd343
SHA5123bd437cef183037e996bed8e21528c97a32eacde3141c78d83e89f95b93c5dac8b44c98bd09bbb4f6ffe575f9ce8081b75bb61d5e1cdbaffc4ae76453ec9b389