Analysis
-
max time kernel
298s -
max time network
305s -
platform
windows10-1703_x64 -
resource
win10-20240221-ja -
resource tags
arch:x64arch:x86image:win10-20240221-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
24/02/2024, 03:36
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3008 b2e.exe 2192 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2192 cpuminer-sse2.exe 2192 cpuminer-sse2.exe 2192 cpuminer-sse2.exe 2192 cpuminer-sse2.exe 2192 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4560-4-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4560 wrote to memory of 3008 4560 batexe.exe 75 PID 4560 wrote to memory of 3008 4560 batexe.exe 75 PID 4560 wrote to memory of 3008 4560 batexe.exe 75 PID 3008 wrote to memory of 2996 3008 b2e.exe 76 PID 3008 wrote to memory of 2996 3008 b2e.exe 76 PID 3008 wrote to memory of 2996 3008 b2e.exe 76 PID 2996 wrote to memory of 2192 2996 cmd.exe 79 PID 2996 wrote to memory of 2192 2996 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\AFC8.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\AFC8.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\AFC8.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\B43C.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2192
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.8MB
MD561886b50887e3d2df383cc576fbed142
SHA116104ca0c52c7570cb9a201bc42a5a2b71620af9
SHA256d414f7c759413933321e63e6882dcc58693cb58e08ac25591d5bb50956ef1d8c
SHA512f80b4a7c4a8e2aeabbab6c97d3fb3e9973a1d70e08a56bec42cdf54c86fbb7bf8af4e3b785fd39a88750daff2bc8598ec4eb0850d6b569ee3408c6cd14b261d0
-
Filesize
15.2MB
MD59348657fe9f4b016c47a7b86b326c4f0
SHA1b3135811f05b09fe2c9f038b74061c2dd415090b
SHA256ceb6089c9ce31751955d7eb9c849b37debf35e743ebf4668e28c952561c28125
SHA512090e6debe84f23033ecdcb458e98ffbe4e3c5ae90525e72c719740d811a3429a1e2d9b0ab9f8e2916f34ddcc9b753cae65b74dcf261f0b8ae4e40315c85ef7db
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.5MB
MD54b6bf35e91362cd963e4ef4cdb40ba1a
SHA1f3c4b4e55f18491cd7dfd5e121994f55d67678ba
SHA2564e68fdc897591b3489a0df8efd1aa38e5a617c077ab638846c84e5b4c8984ba3
SHA512bc58b39b90ca9950f141c048d0ca9c8555f6393ad14ca103c912ff1ea11ebe16191984bf5059575ba9638da88fceb1e007610f3acfbc9bdef894071bdc3121d9
-
Filesize
1.1MB
MD52d783659d22e63e4bc8e2a88692e33b9
SHA1ac6f3ef5aa027eaeac370b08d8ef107540310a31
SHA256f943a0918913d80c317b5c869c4e5ccd19663aa53f01cb70d29064a8812d0f55
SHA512b24bbbabab2606dfd569e2539801c931418421578086bd478b72002b5053b3db5fe277f0c312489e74549d7762aeb374e067f1ffd2a6585ed2d68bd05517e375
-
Filesize
1.1MB
MD52692108220b7c19f29f5c059e25d0898
SHA1de1574a0fab6fba6471a7bddadf38a71e67fa4e0
SHA256b03484a95e261040d2980853e38add65f2288d69744ca2bfdf5e72c897ddd80c
SHA5120aeb1f5059d42b5138208956f1ea8bf66ff7649848aee15b9f1dfc489e4dfc5c71a068e5161506bde0925dfe8904f9b99f9cfab835aa094be3293b42a01014a2
-
Filesize
901KB
MD5e8754ce76d9c9a7dbc0ca292625c479a
SHA1c1d36145e94586599ed8d88eba125e01a40f205f
SHA256f5eb6d9b448efe332f7941b9c3a5a4ea4a93ff23dc7d21212db7687c9dff3e1d
SHA5127251602ce86bfa53d69650b5f7a0513a6a6dbe8a3ab5f48f7f5fbbc67e3c39cb789274278a83f75bbb73e3999de4a66e9a2155ca5e8dd3ced8c1f525d4135478
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
837KB
MD5ba89d2d39192016f7a8d4a9b5d023770
SHA122cb7a86a1e9a278c6f16d446171987d3aa90a68
SHA2563faa4423c734ce9974c87283aa2758b9c3f80ef9687d9fb5b2453d163931b64c
SHA512f4e27c3ba85e93fe1ca94e74a5a8be63d6483ce76f9db12cccaf8369c2cd46fc793353f1c43fbd0bdff37b5d04d3e133931182e25b87a2d8a279ebed2053f026
-
Filesize
912KB
MD53d2695553f126d10da426508d63bc9b5
SHA1678db6caf4721625a6504c01f6dc3419006546b0
SHA2566674e600cfc5604f9430f997d7a9e1a3bdc968a18b1f041a260abbb00b696101
SHA512742b7b62a5941baaacf51dbed5b39e7175a4381699d887d4d7c511db41075a5a17ff3a2f2510f9fa091258eb879159a7eb06e68ecb8ef33f7179488391a1f6db
-
Filesize
852KB
MD54beab64a9143e3bcdd09980792318253
SHA1e98f0cf44c7bcf828fb2f5eeb9cc4487eb822b16
SHA256114498441a50f3f49bb23db7b2d534c5b6d39deb7788342ea56db0fbdf4e2e78
SHA5128dc6ebd9778afc516df460ebfe5ebb7f9755c65e93c3d62f77695ae9eb46cb6cfbe7a0adcdcf9b656db0912cee1a1097b3ee140b1d09c732f6cf82017b1e8358
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770