Analysis
-
max time kernel
297s -
max time network
307s -
platform
windows10-1703_x64 -
resource
win10-20240221-ja -
resource tags
arch:x64arch:x86image:win10-20240221-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
23/02/2024, 16:30
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1012 b2e.exe 1492 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1492 cpuminer-sse2.exe 1492 cpuminer-sse2.exe 1492 cpuminer-sse2.exe 1492 cpuminer-sse2.exe 1492 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/956-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 956 wrote to memory of 1012 956 batexe.exe 73 PID 956 wrote to memory of 1012 956 batexe.exe 73 PID 956 wrote to memory of 1012 956 batexe.exe 73 PID 1012 wrote to memory of 3636 1012 b2e.exe 74 PID 1012 wrote to memory of 3636 1012 b2e.exe 74 PID 1012 wrote to memory of 3636 1012 b2e.exe 74 PID 3636 wrote to memory of 1492 3636 cmd.exe 77 PID 3636 wrote to memory of 1492 3636 cmd.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\318.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\318.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\318.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9A0.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1492
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD5eaf5e67e369e58baee4a43c61c802733
SHA100f9c79ba1a2bb31c78ed6b0190feabb622f71f7
SHA2560b372d7c117ab199c5e94954e98f3ea8fee8c7d6b7b99470a92b146e3a4f730d
SHA51278236da93dddfc5956d1bdadf1ae11bcbc250e853d6555b6959663c91ddadae7554daa91d98c697e5cc799826fea4440327adcda9f4316ce4508c1a2aef19ac1
-
Filesize
3.5MB
MD55c6d3cce7482e6587eebe0d09be8fd27
SHA164a1f08ff96681f034f596cedd42fce1d1bb9899
SHA256b463f21b5dbb2a6526448b911a4c428b46bcbb484b91aecedb977ec11200e52e
SHA512f1f30b9178fcb21d85b586f475f88af2ce3c9dd9d7938a98d895e915ee8a13682fc937ad1bcaa41030c04b2ed5f5ba67a586ec012edb2e386525c8286f11306d
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
328KB
MD53ec6cc5d067fcf3bb0543143cda260aa
SHA1d58d7c665dae2bb16ecf3b5e1cbbc112dbe9d2ae
SHA25615f2d25798f0f141a3a98ca2b81caeb1d55652ca03a834fc957dde19f40204c1
SHA512cf416c89de1f7e7471a0b888dd9761cbeffd060f07374f1e8f9a9696c9053be371f7fd5393b6b0a9fed50d25f709e61d2360ba6a0d71ffae0b0b0d610c390e44
-
Filesize
362KB
MD5ec076ee2872a2dc1408f9061888b502a
SHA13dd3e9ce7a6349506c18a8bb24b517bd50822bb3
SHA256782316b86be72a2f3ef43b734c2e5ab243b935bc3bd42cf2704f208558fa181b
SHA512b98b6278862bc66c010410b33d8876c9bbac6c7b6deeb27748fd98c8fa7eb2c2c6c0d703176e6786886ac91a3fe1bee1c4cf064f12ae514d0b382124785b1383
-
Filesize
212KB
MD59c4fa37390d28cb81bc2238cd1dcfd37
SHA13b4ddf6360bacf133a99544b2332a065b344dcab
SHA256687dafa63c5bfb22c2db97a27199d4dac75af1a28443c39f4ceee19f219603cb
SHA512ac9c2a41806215e80eefea474de389edc61214ec7fd56004d28cbcca8a26587e43c842851edb9e437a12b39103d96d2bfa836640b09c1d716dddde8cc373e629
-
Filesize
279KB
MD5442832f01325432fb43224cd5707cce7
SHA1b35eea0ec32f2db5d08255b6dbca8e1f6a4f55b5
SHA25623cf288c7de4bd6da02d0b83551fd0ea8eed45f2a2cfcb457e7d3e2169a469af
SHA5123bb4367ac2416171a883c96d5592fad0429fd3837ea40ca18279b8a64c312db4c245bde97b253bcb93515ce1249ec7effec0ca8112a7c9602562ccb48042059d
-
Filesize
272KB
MD5a7ac0af9208e6917d9cb23de4aded89f
SHA189acd3e78d821212e51170c23e2b00c3ee97aa68
SHA2565914e5ef678efb97f3a93d685b043a0fe2394acd722cb476fb731db957c53f6c
SHA51211634fe0fba4eb93733b73e21ebec534931a5c29ddc6384dc158423b1af20b6e80beee1621924e88eb2d01d6885d06793d939b760520afb672dd2bf17ca6d946
-
Filesize
216KB
MD5fec1cce5b938c69a7b60bf153bc6e0ae
SHA175ff35e0ef06f864f03257f1f71469a0b2de7f97
SHA2565681c2693f146063b0c1093c944b39f08995184d19f73823ed89eec1ccf18962
SHA512f9288e940063a18140e9c1758f157d6ea6ec68b35c2e58c68fe59e8edd08a0e879c687ae56b42db87e2da6031902705c7c82af949a8d9fbdbba7cdb514ff8e18
-
Filesize
153KB
MD56398a372aaa286da9f8259f42937661e
SHA12ea8d2f6112c1c2b9df1c0b65c275510be68424a
SHA2563d40df6e6c116dffa53a3a5acebf877208e68aec5a2b8569576d1e4536c25d36
SHA5127820d832380e5a148d530f843920c87638c2dfb1a2c4053984b2862bc9f519f66c95b58f0e850051ae2e53ed1eb1a5472cd3bb5224c216190c425c049df1d654
-
Filesize
309KB
MD560fba6658511ecb222bc5a9c479b3f32
SHA1ee4b91ec812c2a0475e6805fc2c1708b5528801f
SHA2566bc94f4fe5e8f5c4237dced4e6f71596c77c9ad8c861661582c1e2f8fb9d791b
SHA512a7549de03fa76082a13673a415d7f576fc59fac3ec71e3eb010af4ffacbaba258839d7acc9c870c19c4d0bb234c30b3a14114d92d8cb1a28ad5a90b2749af45a
-
Filesize
137KB
MD59ead572f4491b265627b672247490fef
SHA1b8e3b9b853dbdf26d15b97b834643eb243440563
SHA2560eab5c980b79727bf24a2c8879fc09a7ea408be83f0944229dfc3337179490c5
SHA51221c36c87150ea46d9d3c9035347e126062a43afc7f7e221651587deedffc1f36351b530a8a22651663daa10f4e67282fcfe15d8b655e8a20e141ffb516436efb
-
Filesize
198KB
MD5ebc8dcdfcc28cc413cbefa7600d59250
SHA17c344aa74691469a7748bb75cfd09a4ced4a2b4b
SHA256b200e2d7abb1388c80cae0c972ef0b33419a3bc696004b7707ff51ec2058feaf
SHA512c2d753c9133f5d4300e4ba59b06cd7ad09c8f0638fb72ea0515ca732cde39d4d82465d12f3bc0180331dc173acee57827f0a3a77e6da8f137629b0bc44d16ed6
-
Filesize
219KB
MD57e7f6a9cfd66537fedd730cfeb91cc42
SHA1de0efa0fdc01a2881ea671d46053acb7c0f60a63
SHA2567d31bbd5066fa8c3d9bca298aa47ccfbec9ff5939c6782ab62bc72bea112cf98
SHA51200c9bcf1f5d57a1398482da8be5c42b1808dab81dbe7d743f3b657e007a920bb147c6416455c48a008ffac26b9f79f72762c2fd1e028a2201bb88f6b89136dab