Analysis
-
max time kernel
295s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20240221-ja -
resource tags
arch:x64arch:x86image:win10-20240221-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
23/02/2024, 16:14
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1412 b2e.exe 2468 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2468 cpuminer-sse2.exe 2468 cpuminer-sse2.exe 2468 cpuminer-sse2.exe 2468 cpuminer-sse2.exe 2468 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4812-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4812 wrote to memory of 1412 4812 batexe.exe 75 PID 4812 wrote to memory of 1412 4812 batexe.exe 75 PID 4812 wrote to memory of 1412 4812 batexe.exe 75 PID 1412 wrote to memory of 4504 1412 b2e.exe 76 PID 1412 wrote to memory of 4504 1412 b2e.exe 76 PID 1412 wrote to memory of 4504 1412 b2e.exe 76 PID 4504 wrote to memory of 2468 4504 cmd.exe 79 PID 4504 wrote to memory of 2468 4504 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\700.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\700.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\700.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\E34.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2468
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD59317cafb85becd9011ca213e7be3a2bc
SHA11c84c389734da0532809700191b96dc61527e382
SHA256644eb7fd5f540a11f942d00b2233e715a40b8548294924fc054db1e08b293090
SHA51265120a9f1410f4b9350788c5898557be3d3b195f03b3425895748764fc052048f38998bb455cef4f25f748c696821a9a4622c8f09f6ae4603dcd6882be451684
-
Filesize
1.7MB
MD52e783098f55dece12f8dc2fa96a5760a
SHA17b0786bb33c5e67858e599f929ccd89888d9f34e
SHA256cfdb3c7af24a0e6198add235131e2913f404a6a2e60c9f8a9253b29e61500850
SHA512e20e12b96ecfc727f7c3c3a8afb4f1af0693713d66d927995a79ba7649b401d8b11c713c5e5f3ee0ccad56e9fc84482e585e014e37863dd145e77f71b54c2da0
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
311KB
MD5727f96544b80b2a7bbd927b5625b4130
SHA1558a24e246764fe2934a9a16d00aea8fa591e068
SHA256bdb65a92c8f7d4747ef47f0c09bfc531b170a6d3ebfc3564401d51fed22efb78
SHA51244b1399feef4d24465f3be50aaa284c1908619e399e62d4a4a05e2ee7d7d6fe50495aee6f0cc2a38efc7a588e10272926bb1d00898f8be15c5f636fc1237d040
-
Filesize
289KB
MD521426fec21bd7b2508fe444a44658d05
SHA1ec5ed71580811c339b1aa05af6efd04651a6c117
SHA2566d0324b33270f8007efd868c52953d29142018f44dddc687482958472721e9ce
SHA512a8810405bfef79bbaeb1ca47f5bbb8009d19cd346514354b1ab98e42daaa5200baf990165cdfae96837c3c3e60e9e1a8313462e374af39259d014712970485ca
-
Filesize
316KB
MD5e5a69b5f1c2a31f887965a671885d6a7
SHA18e1441adecc0500dee5a53d134adbcd6813d5beb
SHA256c5f9aea35433bca26bc3c027c246281e6de47134621fd3e0ada2e5bd85ce1af1
SHA51298bb47c475ba663e8d10dd27e6a74bc9dca87fc38f38a32ac9e183c4a0a1afedfd83f65ed944499d2f7914078c6fa00e2149ab10ef6ffd458621595b1e090a73
-
Filesize
298KB
MD50df4854048884c2f73dd6b954d6ffdc5
SHA184dacc97febaf97210f238dd087bfd4c7615bf3f
SHA2567a61280e7e7d9f4f937cfcbc0819fca224c420a06ad903b53f85e1e0d456388f
SHA512c98a0e53c174f0b0dd040582e6eb07d1f88656276d7c58b0839fa62728f47589475c3f03208a57d3cdefe2ec1cfa0e8d689cd160e7ebc969f2c33b22f2dbe5f9
-
Filesize
296KB
MD523d374ca518791cdd8047cca7f767019
SHA1fd9da3912e2e4727bbaa7daf09fbfa497eff20d3
SHA25692d4013a90320a7e29dec96c4047fe3940667bda0243a7164664ba409243d889
SHA512995c3af27d27474c94d9e84e908f88e346fc2c2adb93139ca7603d16f2653a6570f31be06502631e5be2e205d0b5753a0913cd0f37dd4bcd7784b27d84193287
-
Filesize
334KB
MD59a59db518cba5254da69e9e21bfe88cb
SHA1a9d47d9943bf13f89f8aa4cb3f2adb5163b2424a
SHA2561d1adbfe8215292c2aad29f543d3271e6fa773b4da0ab0e3bf1d48b1ce9d007e
SHA512a9d63ab03258cbe0850b22a27f0cf3937db436cd4e6e02a4b6338cf077b355f1e1e737d8358eed13d25184e80ff81e5aee1c29f99d061565da251c05187e25c4
-
Filesize
176KB
MD5d8c1068d7e58c61f0d80539aca4744bc
SHA129f77b1defc87ecd367522484e7d5b50fdfb5033
SHA2567d64e77d9b914c32237ab3b7df11e02db6213b5cd57a2bfcf08014ed16e2ca37
SHA512b441821aa3603b2e30fb18b6c290c9919b3cc0b1c618a06506f7ba4cfad0852cbd0a2b5beebcadb733df93c76aa8569e0d16cceed1b208bfb1009982958beacb
-
Filesize
333KB
MD5760f18175f7ab1951bb607b865ec90f4
SHA148a609386f77543088076dc48767c0908374e074
SHA256a8976867def282d637377510647b57a254cecff1d84dbcd5664d314ab61ddb2d
SHA51227309ea536b034e841320be10d6291b8cd740705e25914e40e6a5b16657d9dee6b538f9e5650416871497e683a93fd8763277be7ab0c45f5a5eca777206cde7e
-
Filesize
244KB
MD5ea08a3b877fea03558c5aad568d11dac
SHA1c8ea084f6f65ce2df04e689f2fbd932b9a038085
SHA256c40049297464e56e002a0f75b05772afb07e5dcab5b359e6e41ee3d03fedacad
SHA5128fdaa91a7cac1ce6ea29965e9e3ab63ad4a2c222ae8317ab4d100b958c03fc51817b16dd2dfb39a0d2b82bc799852004f5b81368bbfe15be64bfd1208bd4f799
-
Filesize
315KB
MD56830dc0fbcb5ac28dfc645c93de8600a
SHA10063a1859bd044084757a455ccb27815972a6a49
SHA2563aa29383e0a5147780e85b5b88b261b565235b6968d4d540a022985e82ab430b
SHA51249f41645c557c2c115c7d5bb1438eca8491a0db22e4a81207209c3d98a1763c16634d351241dab0e408e8d41e18751972dc6a943a309f8f8a07c2576d13a500a
-
Filesize
287KB
MD54f3c35bb3a924f0c0d7ea5839152e0c4
SHA1feda00db987440f8fa3ec5f274cf10e4160db9ca
SHA256f7dc63bc79121339eac8c5288689e9c1f4e704494192481f9705d7eb35543218
SHA512d42e56e8e89be0f65da37d6bb0aa714fafbe513f9e5c05fa7188b07de998b5f67edecce68b1d13a390aa5f94f64fa32ae525e0805b43f8c316cc3dd248633808