Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23/02/2024, 12:56
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-en
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2196 b2e.exe -
Loads dropped DLL 5 IoCs
pid Process 3028 batexe.exe 3028 batexe.exe 2004 WerFault.exe 2004 WerFault.exe 2004 WerFault.exe -
resource yara_rule behavioral1/memory/3028-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2004 2196 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2196 3028 batexe.exe 28 PID 3028 wrote to memory of 2196 3028 batexe.exe 28 PID 3028 wrote to memory of 2196 3028 batexe.exe 28 PID 3028 wrote to memory of 2196 3028 batexe.exe 28 PID 2196 wrote to memory of 2004 2196 b2e.exe 29 PID 2196 wrote to memory of 2004 2196 b2e.exe 29 PID 2196 wrote to memory of 2004 2196 b2e.exe 29 PID 2196 wrote to memory of 2004 2196 b2e.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\1822.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\1822.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\1822.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 1243⤵
- Loads dropped DLL
- Program crash
PID:2004
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD52a58aa86deac2c99323c788735dd53af
SHA1eeac6b8cceb22a47daa1590f4dbae8e3c7c27c92
SHA256fbd061c4d55ef74a2b1fbefa8f244ffb9e63df4a7f16083d7a9920fee83a0305
SHA51222598586f1fc5ef20ddc7f840402716a660917caa0f26628eb943928d458688f698e66094d3cf2cd6865baa1b32ba61d1e05103abfafe98e72d30668a6b7ec57
-
Filesize
3.2MB
MD52db036d5c6ee14a03989ebdb7c3483ec
SHA1b8a77fdc5a2827ded07b83dca5dff3273280381c
SHA2562366fb0aa688f6c642f2fe33b1dcbd61e1af46f657a46704ccf46b471e1a628e
SHA512a3c45337094c2a0c4f3e07237518e463b3dc927b1be9e764bc96b1e687e1bf3314daf4a9eb67edb5951101a6836491bf35fa767019a18b37d83d599d02df2900
-
Filesize
2.7MB
MD5841d8b14bbc14ee87605e6b63b63b3d8
SHA110bf4c0504741a180ce89fef22f99a1a48cae55b
SHA25681887652cde8eeae0cad9cfdf2f9cd62bb5a592f77a9586a5152fd9e51390866
SHA5127efbcc59fdf2b09f493abc09f59c81a4cfb31424171d12a741416bb76627843d05c446ef9709ef7f916b050d6000bfb5523e3ac7bc062c117b2e95b496b43a3b
-
Filesize
3.0MB
MD5df051cdd1a1f76131849f9d8b32ba161
SHA1c4354ec67591093c3f02c987ecd4d4c8781457bd
SHA25628f3e879833c4d7ecdf7952ad39f2212dd3a1091f5b86ae3cc4ed3f901b852b0
SHA5128e8f3a49523240415b8955e59bc0155c799eaf0c59390e830260d04cf3036bcb75692fa0ef48feadd3a3a46a4102886139cba8aec5a314fd669009560e78c5d6
-
Filesize
2.2MB
MD5639aeac55d9fe73567b44e71f6f252e1
SHA13f6b261304f9f500007f683fc0e636988a41595f
SHA2562b4638015cbe5d0333bd7e51400cbcbcc06a3f798d5bf2e1f6bf457dce874317
SHA512850ee6033466ba44af874d459d309b8909da50e505dec9963725ffd074d7fdef9f8a4159da095a1b5bee9c4ab2398009e76cf3972e3cb18e85a326aa2a65b63e
-
Filesize
3.5MB
MD5cd08cc0d068680357557c1551f50af31
SHA15e27c82cccfb51a3803a99bbb48043304060557c
SHA256aef0b2dbd0f3661faf795b10cd1f35f73467223b89ce4d993b082ff987b2d306
SHA51221649db8832f443f814add680d9963931a88d8a0e316c098b8cd0b4840e721c0ce4f42b5802b9b71a83f6409f54b5b43c7584de40f0a29350f5238d62c026643
-
Filesize
3.5MB
MD521c37319ac98393caae0e01eddfbfc92
SHA1e17042e87fd11b4a0a7a6069c9e26f608d343f4c
SHA256412d0ce621a83907a1cb0b7b92a7e6564048e290a5efbd40745f749b09a9d6e8
SHA5129953d5e4fae2349f7041251a748d909ea920162ec282f7a00f2839951351381c7fc4c8bf0c24752b3bc6a0e206d6cacce7a02b43b33d815dab85cdbdef54987f