Analysis
-
max time kernel
292s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20240221-ja -
resource tags
arch:x64arch:x86image:win10-20240221-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
24-02-2024 02:40
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1640 b2e.exe 1936 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1936 cpuminer-sse2.exe 1936 cpuminer-sse2.exe 1936 cpuminer-sse2.exe 1936 cpuminer-sse2.exe 1936 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/2492-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2492 wrote to memory of 1640 2492 batexe.exe 74 PID 2492 wrote to memory of 1640 2492 batexe.exe 74 PID 2492 wrote to memory of 1640 2492 batexe.exe 74 PID 1640 wrote to memory of 1464 1640 b2e.exe 75 PID 1640 wrote to memory of 1464 1640 b2e.exe 75 PID 1640 wrote to memory of 1464 1640 b2e.exe 75 PID 1464 wrote to memory of 1936 1464 cmd.exe 78 PID 1464 wrote to memory of 1936 1464 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\7ADD.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\7ADD.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\7ADD.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7CB2.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1936
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.7MB
MD56db4eab996fe41b1b5f613caf444a125
SHA179c8bacb474ec3e7e195225e8ec04d7cf11c978f
SHA25639ee0f2222578dbe0897f16f31c573a4958d692d6fe6c6edcaa0184bb1236f03
SHA512b87a43159bb800adcc3a890ec46d5fd0c20396cd421662f7b574a43e2cc31f6d3fffd66015f0c5111d38af09b5ee77016e269d828456540425a8fd0abcfba442
-
Filesize
4.6MB
MD5323b7283c4ed56612f2ff335d5e98d47
SHA12c946044eec709eeaadde7e05e9736dba508a00e
SHA256f17df0eeae1ef4448311dd38c104484df17f00b6f1664ae701af639494490816
SHA512be67d3198e1ad03f879774f46ce8cb6a5cc41f09811a391df6320c7bbb5e6c2a40d1c62b1b3a2e2dc47216b6a93ce5edb1643515206910d86144a4ecb7d0fc58
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.2MB
MD50a33e5a52c00cae388d9c06f6373443e
SHA191e8e1483dfaf7adbaf6e941d8836417487abead
SHA2569b249cb380c3f07cdf9b2c1c21644cf0e30afb2d6e1cc35dcdd8eec5842d4cb4
SHA512dbf11e4254123b21969f083710931505123ca0cbacb0293a5543579dd842b593cfe0fc56a03fd220688a385c507a73c97540d17ae4152a98f12a4427f47ec79c
-
Filesize
2.2MB
MD5bb9fd77d35a1e434897e4c1cd26068c0
SHA1af3fb501ff0131fbc34246ca7693a1af105ef380
SHA256689cb3eb91923439258c2df548fa90549ee785ed0128be0d88c955b38d2140c5
SHA5121aad805594d4719b93c7a6e109b84f292949e489e1d3e42b32123f79767c3cda23d5a4130f7dfb4dd64eb83059d992784797d8674e6bcec1eaacabdd7487abb3
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
2.4MB
MD5b7c1beb0cfa97240a0d18d596d9fa719
SHA16becf710f845745e67acac3b0d190fdd3f8bc41b
SHA2569095473b03f13dcd4ab2d0d9c07d3adfa57c9df5bd798ab70eb81f896d3d45f1
SHA51241c42aa9ed9a3436a84f7fa8d271882e5db775eeb32aa3a1482d84038f8fb23188835573d7904bc4de84d8a8d8995f3ea22dddc92ec63b119c9bcaacc2d89c25
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.7MB
MD5f3c9cf1c612f642f36bb0797244806d0
SHA1a77ff8349f7c665aba983f401635a6e1162d61b3
SHA256ae66772cc430ecfad19c55feb34aaa63a418e14e9fe4ff0244bd6820f8cc71a9
SHA512bbc0e476d8fa3bc997ff39514f179cfbfc5a08ff186b1746055892b1e4569c017d716927124116c096c343b9fad0e953b9c2ce3f34a6ff95544350b481ffb761
-
Filesize
1.8MB
MD5863a71015e281b2d66382bd52fdb6293
SHA16915f8974c19016406cb39dc6cdcd52b3d9d6e5b
SHA25672a65d50e2a06781133cb691a114937bc2764d43aca2dddde711e4db300f9022
SHA5120b3431af5e443c22e93745ec9f79d5b2d630f240400e08211abfe75b0bf4217b200d0ec78ae4671c80f21b0a9928ce14f875f944ee82823979f855a9c84d7922
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770