Analysis
-
max time kernel
296s -
max time network
303s -
platform
windows10-1703_x64 -
resource
win10-20240221-ja -
resource tags
arch:x64arch:x86image:win10-20240221-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
24/02/2024, 14:28
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 60 b2e.exe 1096 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1096 cpuminer-sse2.exe 1096 cpuminer-sse2.exe 1096 cpuminer-sse2.exe 1096 cpuminer-sse2.exe 1096 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/1492-4-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1492 wrote to memory of 60 1492 batexe.exe 75 PID 1492 wrote to memory of 60 1492 batexe.exe 75 PID 1492 wrote to memory of 60 1492 batexe.exe 75 PID 60 wrote to memory of 2180 60 b2e.exe 76 PID 60 wrote to memory of 2180 60 b2e.exe 76 PID 60 wrote to memory of 2180 60 b2e.exe 76 PID 2180 wrote to memory of 1096 2180 cmd.exe 79 PID 2180 wrote to memory of 1096 2180 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\9AF.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\9AF.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\9AF.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\11AE.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1096
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.1MB
MD5099e18cf84312ee05add20eaed01b2c0
SHA13aedb8f0362d50274ec7bf1e79bbd3923b47cc13
SHA2568856beb3ce39073034ad1cd1b72251224cbe3b2861af9086947470096666312c
SHA51270c26948eecb460a2c035d8bec9f100588244a0c621fe26c13826bef00464051b54e200abfd73cb07bbe76c6c807317dc90b4974a739be718e37aa2621c134ec
-
Filesize
1.3MB
MD503a293396da8f3c42edf6b8807f9e2d4
SHA1807be4179cd16ee74f409c493957ab9d4c133256
SHA25640ace4e2bb82d200721236e2dd762e2b9c3f3b2b56430e949a4c7dbdc1e6bbce
SHA512da267ab2b8dbc876620a082e7be0f3c78ee0951375cef068593b04dce43c52aa3b0eb08ac1c3b2047321e491b8092407c285d1ea1e3b849510f418f1b59584dd
-
Filesize
358KB
MD520163172e619da243d008103cf8cbb4a
SHA1692ab88e953672e104e2719a3ba204d19c8dee88
SHA25620fbcf7c085ee75a9cb4ad47ebf2410ab026cf513b4b13127fdc14d746338af3
SHA5121ac95d76888aefeab020ab91cbf2a677631f326efc8f05eec41ffdc77dd84f061e58f61f3a64a4d26b412502fd402e85f6b2c5c0890c17405abaad95fa11d751
-
Filesize
347KB
MD50cc0b44ffdccdfde81345a8bc778efbe
SHA196688e5f361c79fdcc154c894eb976da780499bf
SHA2567e67636f481ad9146014527d32b2e10973bb676db89ca4fd43c54bf9833ed944
SHA5123f2e8f2d9f30706b7a25cfd5672670303cd8fe8963071b3e5043d2a8545c42adb1adbdd165bf900a0dd827568a683c674d19bcc22b0a9189abb27b9b5912249d
-
Filesize
418KB
MD5359399e5de137e1598ee01340b5324fe
SHA158f5c0e79ac0c623f407d1ff407ac8439dd20d72
SHA2567351861c022e6d2d5d67260ab23a457ed7926313d2aa8c4083603f2dd7d0dcf6
SHA512d75c450dc340a42d9da7c2aabcb50e7026654f94039b7ac0cd1abc86c352498952fc50666d9697f93bbd3715c34fa883dbad63e4d8479c7d6f370d9d606ceffb
-
Filesize
492KB
MD5e7d7e38a647a5923a1364c54d41cbe14
SHA1d559be243ff8ddcde3bfdc571f53c6c89c465497
SHA25669658cd7b2742d8e26a50802857d60bffdb63e9b7df188a73d18e9f6bba1ae05
SHA512bd3dea0ad5cb72edc18ebcaaa2978ef604450ab56eaeccccacd63e7ffdc157ea768d7fbe7c546e7fb1b464a68d672b34db847b382f7bac57c31d60903d2dd727
-
Filesize
290KB
MD5e747d11201425956893020814f06f409
SHA1cc23677903633ff5a7fee1cc9b22d685bcfa4fe5
SHA256a95a4be89175bd56f5ad756839e1f3fc58f26741d5b0fa976705a43d81528ba1
SHA5125b292c6bb2bc204c661a23c2dd8730888b1c092c63e902ccacad57a69c28047d946322ff42dd4475db2826cf53653215581beec6db9f44352461654af19ad69c
-
Filesize
338KB
MD543ec237a46966f02b9e72e2fb1400f66
SHA19ded61518103c70c719c771d62b861b079b04abf
SHA25662e306c2d7f7ab1c42ac3a3014346c5801788cf1ac7f455eab35a8541ffb0d35
SHA512c69b16f3172b3e4d73cc7d2b86e8fcade68e63d56781a647f7cb9e7755f3b8b51da3ae71a546bcf9fad16ed9df3704dc4592beb531d7d0b6c0c2f8adcb9892f3
-
Filesize
473KB
MD5a3fa2981766442458ce7f69f6c436933
SHA11abd11c07eb2044e830735bde49824374c99e4fd
SHA2562614d77e6cbba83accdfa0e4a6006cba15a0e30c6c49ea5b0c9f5d5005ae4bfd
SHA51267b8f21b8dd0306d9357de94be7d337d677b9d3e61807a8f692715aa9ec8ecb968344edefdac63c88822ad961e308c386222f3cfefa1459e6775b265bf4e809a
-
Filesize
291KB
MD567f48e7f0786d45fe05bebcd3642642a
SHA18f7ea291474eebde37176533a77efb63ab674803
SHA256bfd1cf5cfc7f638b1c2fb3a15372972bf46bbb1f9feb4ecb1588c6a805c3b3fd
SHA512bcdc07652dad429751ef2223e3bf2f7f4c4e89882c8079dcb4c037f673bb0ea9415e173d0acc8f76821b4e09c341ab7e7e33dea7275b6548f37101edd77f83f7
-
Filesize
262KB
MD5c029c847b95b612696a9f2c6efc1a1f2
SHA15d46a6a466c71c8aee1af055ed6ad86512c0c9af
SHA2566e2e40a14f155e5c32557f5933f09c96c616d45d85ccc47edc8af41e1ca51309
SHA512f0398a808a5c944e5e99c3507c6d658bb915209009c3332cca34acd7fe9ad1ef90ea600299e9e9c4e7302e1e692223db27c603661934f85e3d7ff2fa13f8126a
-
Filesize
357KB
MD59e7a4fbc515deda3d5d35f1e970abc7b
SHA178183e168f9ddb59a27ef4d384db0edd7652d1fa
SHA25679a8ab9b788c3b2ad4fdb9c1314292a210e3367e062278916da4d791b1d1882d
SHA512f729d22ff550dc08c68d1a393dc440c9dd20683b01e90365647184a521b59cf158cc5edb10f1a605abc86410f6fe8bffbd13f2cb9d6de9aed81862d6166c94a5
-
Filesize
329KB
MD513ec830529e1b469bed0469c94d9a91a
SHA13e572deaf743a349b5e55d4fb51edacca9dbff99
SHA2562a0f4510434e6eeaa6e2b76595285dfc66e4602a24e36338be6f518d445b7af8
SHA51292283f24ed889f9fef50091fc64c22bc8b17e4ff0c9ea8ff7c1d0d342dc05da581955947f902e06d02168dbc876c1e434b89257a79f42c665aa6ab685153abed