Analysis
-
max time kernel
293s -
max time network
297s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
23/02/2024, 22:36
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1260 b2e.exe 3864 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3864 cpuminer-sse2.exe 3864 cpuminer-sse2.exe 3864 cpuminer-sse2.exe 3864 cpuminer-sse2.exe 3864 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/3288-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3288 wrote to memory of 1260 3288 batexe.exe 74 PID 3288 wrote to memory of 1260 3288 batexe.exe 74 PID 3288 wrote to memory of 1260 3288 batexe.exe 74 PID 1260 wrote to memory of 1180 1260 b2e.exe 76 PID 1260 wrote to memory of 1180 1260 b2e.exe 76 PID 1260 wrote to memory of 1180 1260 b2e.exe 76 PID 1180 wrote to memory of 3864 1180 cmd.exe 78 PID 1180 wrote to memory of 3864 1180 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\B287.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\B287.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\B287.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\B585.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3864
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5e7c031bbd85ebd18db9ae2e9f19d09db
SHA15fd9de099f3cd57c62c4e360fe541342f938de4d
SHA256ac090793130921d4553957db8feb746bba978992a780522d390a5f672583a094
SHA5124e2b470b0963b712d8b02249de892e4d12c502c94379204c69e6fa43424b987c5ec04ab68060876b02f5dcd5b6f1485faa6cd67a636fb378ba2efabc19b7bbd2
-
Filesize
2.9MB
MD5a35c9478517b12b8fb5bb53bd90f5bf1
SHA1f9097ef009d19afe9a0c0270fdb69d3f23e19199
SHA256e0e21e55814ec4462a4277ab3c51442f3eba22cef725fd290b9fb9cfbd734d5f
SHA512b1e41d3a03a0aa09a80dc800d4f900ae61fb5afd1b82114754d2b84f5efa990e04e50040e49a1100f0eb3c438fce23bf10eaa8c83508a8f6c264e887820bb4e1
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
837KB
MD5632fb8e5fa3514679f31cea76e3e49b9
SHA1ff13e0b2797ba3c0abeacb096d385cfbe061a543
SHA25681620f5208cae0920c0c94dcd44fbb0ae446c087d05a7565ca732c15e3dcf892
SHA5125a1fa774e9b743a20acc4ea9d3b333a55f736a9aab19e978d5849df569c71d98e08e00af50f562e23263b4ea92fabb70a21ed100f8614043c7cc078d8455da23
-
Filesize
939KB
MD5a9f61ab91480d5c5ccd55d02262d2863
SHA10921362e8039e290e4f1ad3d58e9491aaa0ccd90
SHA2565063f0f0632af214f907319b611c2d0eb40587c48f6225d6d0c4f0619e391ad8
SHA5120816c0b8d7b07bbeb6f0c720bc1197ecdddf617aa76728c20aa7b005b6589634d0e93e58bfa128284a1970d1149de6b7172caca7b83e6bea307d8c87dd9e28e5
-
Filesize
613KB
MD5ce4a95b713e4197ac8296ea22771a192
SHA11608e9cec310fb881f0686f2ffaa964d7645eb87
SHA25642baf67e119cd0095f9888927eb87b7ff26630a055cb7f158aa9c507e7773039
SHA5121ff30eba46a931f4c8344937a8f4b150a1290b652cd439b691d30e1deca68fe7ab0c62d14fb5985c02ea5419af60e35db54e6f79a98a6f7f9e11800c85053a8a
-
Filesize
1.1MB
MD50e6e1333858b8420770c02c85bf22b32
SHA14f97d364516e2bb87af0359769fb60397a68e65c
SHA256cc2555b03c8b0fe1fbc704f15a7774c3238d6f104a2e758ad57d405396ea16f0
SHA51278c12a2742a8fcbf09525a4e2d1dc3a30a8d79949f6c3cea3bd729a3c89cfde45e4147829a3c180bb410964c596cb13ea30a00addaa9d39bc82a91ed916557fc
-
Filesize
1011KB
MD5d567c14123891ec33ddda78b4724df6e
SHA1be38548c5e7a5fe1dbc0051645022b00f3569e16
SHA25601eb80777c2320976caa2801f9740ce72091d205767a73e066d3956797e0902a
SHA5122b43222c83fc3812382a697a2a4e6cb893a31b5ab27d1757f03ee82f25d3e34fe96e851efb0c557f3115f480e5869e230e73783eb12d927132412c70c6b93bc0
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
912KB
MD5d3abd251ce1acb4631720a419bd0f8ee
SHA140a6dff26c81a09d3451cf536d50dbc0e14e5e3a
SHA25656a014b18d354ce18bf8727d60465f852d29fa72f229ac9fbb56a212bd2168c4
SHA5121fe4cd9b68b1415f475bf73237420582b63da40552912142b8c72911a0b81ad8cba4fe0d07b5c990ca71f5c7c22161bbad6a61bf9f471b7f84d6f081d441c5ee
-
Filesize
744KB
MD524fab64d542d54196f29593d9df84615
SHA1c6648794db15a14d2c2b0a5bac8410330327322c
SHA25664fc8089429dd346f75b0eaafb5baa3bc985e19f7788953278d7a4695304f245
SHA51219d9e773a0f60ee146082d103c7babd074e0bc766a7b64b7d9e6898c9c1a57aa7e7dbe221c781078deaf42ab506aa93ed31cd220b56ffeea93906e4dc3ddee60
-
Filesize
798KB
MD57c526065af0aaf114a77e15e7528ba18
SHA11c579c1b4811ad5cb94e526d49c38791ae20d53e
SHA256dc6e20c32e01c11164576ec2c0f4c9df60ad3331e08d79fde187b3d071193c5d
SHA51279cb2063341cc0def8dc6ba29baea7dd943a46d8dccd6a023dbc5ba9bf8350a8c33ebc9dae7e5ac0b0429b2870693ab5464b166fbea95e4ae1937ef5437cde41
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770