Analysis
-
max time kernel
298s -
max time network
305s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
11/02/2024, 14:05
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 2328 b2e.exe 2228 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2228 cpuminer-sse2.exe 2228 cpuminer-sse2.exe 2228 cpuminer-sse2.exe 2228 cpuminer-sse2.exe 2228 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/1480-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1480 wrote to memory of 2328 1480 batexe.exe 85 PID 1480 wrote to memory of 2328 1480 batexe.exe 85 PID 1480 wrote to memory of 2328 1480 batexe.exe 85 PID 2328 wrote to memory of 4088 2328 b2e.exe 86 PID 2328 wrote to memory of 4088 2328 b2e.exe 86 PID 2328 wrote to memory of 4088 2328 b2e.exe 86 PID 4088 wrote to memory of 2228 4088 cmd.exe 89 PID 4088 wrote to memory of 2228 4088 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\3302.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\3302.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\3302.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3B3F.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2228
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD5d6026b8f66753c50d520a45ef4d9bf90
SHA1dcf5b6b5a096fff1703716dccd6aa43ac7288b75
SHA256610bdb1a98e92e84c6fb8ab156045c8baefdf2c73df948433bf6027f59e3a145
SHA5121304542568cf872409ed2591666350f5132765b607360b180b56a23797f303201c2f18f41bad99fcc4edd37b3bf988572612c855fd6514861891525c04be1c74
-
Filesize
1.1MB
MD5a25b5ce40797f8983dd440580ed62612
SHA144f4847541fea6ce452c6d953c0be09c8e21475d
SHA25605c6a130a2d2bfd64aae28a97035b25c0447dfd8335c877235eafe363161ce5b
SHA512e220494dc356015266acd1b2b6f70a6b74237a949c6415e1600818783d710371d1a8b9095a9d0e09e22abfe083d91d84e4092f808ba1c61d9d4ea6b4f5616bac
-
Filesize
984KB
MD55d70d121b8bd40939a4a0b6c329c1124
SHA111499dadf29826c2cbedf9329163f3645bf9f801
SHA2565c52bdd066a6da25db23030fb734c9831c95f123cc952dcbfbc1be7c058cc4fe
SHA512fcdb630cb5d2a74bb4007f0fe22cd066773b86d8c090a66333bd436ea934bd0d042851f85ccf17b7cabdce96aa136d073b9487d7d608c26a2e4563f47b5a146c
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
27KB
MD57d1877cca27128f735f3c667087f1a9f
SHA14e216225dec120873d018e7404270569ab5533b8
SHA256efe1554fac66020eeb7ea1de864368428091a3a6411ea04f1db1f64262772081
SHA5122c1a59ced5cf1b21494b49aaa8edd224248df7609ed3b92c6ee278efc52cdc6cd5a55be3323586bd3f48319149e7a4dc2be0a6806b43c6f33987e1836beaf90b
-
Filesize
566KB
MD5120e8183cf5f5460be866ffd0ee0f8cc
SHA19fc00d242c752f01ebf120bb6b198dcbd9c94f0a
SHA256dd2ac16c7619d47fb6803981120064d21875a9e8b6cd410d29256152e9b59b4e
SHA5120cca2423931ea748e91fc1dbb56a287ded9c5aa276223c68132864608c2b6bd3c8e114179e0f97b9e8b36b76a4efb48824528efcf3a60a164ab5fe97343066bb
-
Filesize
695KB
MD5090b6bb380a826a6034612e2ed848809
SHA1cf8923b3cb8c73d020f8fc18dae118cb5e415667
SHA2561135266d15ba5c0de602ddfd3002a0ff7012613f9c1c7a733db709b312acf69a
SHA512f35a87b4c940a7aee71f42a6286c5e9c2ef5401ae58fcecc743dff115546e1acd6525334a7ffd06d50a88b707f76a1f57adece88093e05f9d072a88515e3c374
-
Filesize
793KB
MD558efda7cce223f1de78b37908366ca50
SHA1672c329b22e69178543b47cdcb516d0f2c954901
SHA256d39d0859fa477fd789aa4151af70761a7537eb5bdd3dd20c5c29d97173cb2eed
SHA5122976545d22f83deb46ba4fad3b193958265b9f5adf57002826adcfee2017c1ab4ecbb3d076458ab545cc9e55846bee11ddcc99f075aebbc2ddc232bfeefd0a2f
-
Filesize
623KB
MD59cad286c29bf99deb295f0c1f9869f25
SHA172b49924d769d8c74e9e8f445264a460253fefda
SHA256e212119cf8980e6c5f9be9f9a288447e584c944a75e1d5fd19d52fbbb1de76c8
SHA512c777886fb75089980d07e922d5bc68cd26a8d1d8a78c0b12a0d4085df482da28da0c74ab9f2f5adcaf661fc82a06849e142629265a3f2797f58edca1f45029b7
-
Filesize
193KB
MD5953cd6e458eafce4d22a9a5bfbeb8682
SHA170e7827a2eceedc5834edda3976e03f4e57209d7
SHA256cfe200254ebf4a37accb553c546bb8007bcc8fd3b53ee96efd8e87c9b1a47f2a
SHA512aa1eed390ad0744a70c1a12be25d8ae5311104b96ebd9b73b1ba56105e3cb3bf839cb54e01347d4f9ee352f0f13b882584d4cf95c92f2944830928bc93b7fcd1
-
Filesize
521KB
MD579b16d1252acb1eb84bac1ad9d9416d5
SHA1db7c8d49039d5244243b1f8eaa13905d6fa9bc3f
SHA256ab00aa8069f5e78d2271c4cdf08a7481e6baa88f3ca6d31bb59ee172da423cad
SHA512a98f2228773f2a4b3df1b9672e563bd043b33d6c4e27fc0aaa5c5ea03bd917fe4777107740b7c40bf0a3ae49073bfc6cf0349b4a37ec49cea889c87071c71a85
-
Filesize
704KB
MD53f9acecb345b2e86cdb4b5f2bf84c07a
SHA1b80abf460de1239a823da5cbc0e003130a41af60
SHA25678e38220d5739cefd23e9771aae21cf6864df5eca851dcb87768cc2569bc5fe5
SHA5128009bf3476d97a1140a1a9175342f9a512eb416dde9716a3f1acc24b96fac8339f659ee4f0e1929b44261e0e8c44a72cc2266d80f2c0a41afd4e1da7e9c4a55c
-
Filesize
378KB
MD59475f99e6d4b605d1a52b9d74aba5fbd
SHA1de0c711334fc364bad9232298f35a8730ab049e4
SHA256f3d06bb558ed2e2f441db2f0b343d67d71bd0e4398897379cb350faa0c06ce5f
SHA5129c737801435c7a7e21966733fa546cf53cd291012d32f866c8b8d27dc3bbde6855340079f392ddc923c47eb5409f95ea5a15a80e6f6e4d738443d5a11e51dbaf
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770
-
Filesize
560KB
MD5817c02838b97e7a4d823e0f3d11df1c9
SHA1c1d9e97da0013fa5c3cc14f5dd591341cfee4c88
SHA2566f1feaa3d8cbdec628e56c78f95de1afee31b745f6c345ae33ae5396f5fb2d46
SHA51245eb9554dceb1cb3458db6a29ec3084263bd36e79db374b8e23c967dbb9b0748df72f841a9ab1992d8cf4ff2b5d49e84ab2b1a93f7d59b8304d6c3105c7f43cf