Analysis
-
max time kernel
299s -
max time network
306s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
11/02/2024, 16:44
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 4344 b2e.exe 5424 cpuminer-sse2.exe -
Loads dropped DLL 6 IoCs
pid Process 5424 cpuminer-sse2.exe 5424 cpuminer-sse2.exe 5424 cpuminer-sse2.exe 5424 cpuminer-sse2.exe 5424 cpuminer-sse2.exe 5424 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/2128-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2128 wrote to memory of 4344 2128 batexe.exe 85 PID 2128 wrote to memory of 4344 2128 batexe.exe 85 PID 2128 wrote to memory of 4344 2128 batexe.exe 85 PID 4344 wrote to memory of 464 4344 b2e.exe 86 PID 4344 wrote to memory of 464 4344 b2e.exe 86 PID 4344 wrote to memory of 464 4344 b2e.exe 86 PID 464 wrote to memory of 5424 464 cmd.exe 89 PID 464 wrote to memory of 5424 464 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\3208.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\3208.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\3208.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3DDF.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5424
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.3MB
MD533a1b8d61929ab4d4c5e3f3107d7a7b2
SHA1c620f5f76841ef20016b82e5875d7646cea30368
SHA256a82ff038f1466f3ef3135c6135aebfbed1cf504227257ae2a4dda7564420d1f4
SHA5123f1cc0f4cb2a37c52cb81cb1da073180f29ccd99611504572d90c8f476d7da8217a645c9ebbf393f0413464c7bd34a6f6b9a2951500187645c2e54c5b6362f1d
-
Filesize
1.4MB
MD5d12949103b0e724b47728239fcbb8f7e
SHA11aebb0f0d7bf79e745ac6ebc38b6d75f426d0b4a
SHA256f781670c807328b5f38dadd6c9ba614df42e4150bd0ce61d0ae84dbf28085e10
SHA5128a6da6037f38d5d267ae9b4b03548e294250e4fc72ffe2851af13c9c068389811ff611b307f661f0956408111c731b59844408ffcc0628272289229351a92b81
-
Filesize
1.0MB
MD5a4a0491ae9f9c569cfc86d3e33cf591d
SHA10e2d38d6e5bdae679c35dec38c54bdf4e77ecead
SHA256bc1cdb8be6eff311fd98cee06cd4526b6755bfade38be433b035b38d358e1d26
SHA512355c5179726c169e28f10c794fc170ed3fe932e65a8fa14dcf29fb9c17499128649154f127b687cc293eddf409e80bb853e905aac7b0d4590a5278ee278678f2
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
203KB
MD5ef6391d9f28c45d0c1d0d475e435820e
SHA143c3091e5307873f5d83d9c77812f7d7db837ed5
SHA256bb12d27a54ca29265bb886c1cc8cff66ce866d3de4ee763adbc578093f0356eb
SHA5129315a15475d8cd99c6ecd6a853f23471304e968af1681f47470c1fc2dd2553f14e39f61b867bf77961749fa59fa1ab750efd9b9b204b82239d38887a2d3d8837
-
Filesize
149KB
MD550f2dbeda6b31df6ba3a76b84b6e03e5
SHA10481a34b7674ab97eb1949bdbb5a93b2315b0a5d
SHA25665c8c385fa9563b79fde3d46238f08f80e46920bb24936d6ab992fb89692c419
SHA51204baf9ef021b243f240494c13ecca9d2bd63eee9a81b587a02624ac68cae6e7dad874d57a9718fc11b4abaa97deeba6da48bfdcf1b6d462dc58ab764580da032
-
Filesize
291KB
MD51fdd00c1369cef0f749bc58ef7fff4fc
SHA12ac532b547a26d689cf21277cc16b4d5b154bb3f
SHA256bd5511f4473ecb75c63deff548c84d28c6f2dde3e6d9fce2c22f5cbd674a73a5
SHA512c3c46e353034b144f66e56120106f3de39b77c506b6457b9c813ac3cec80153f9abb16a8793e5ae82e7fa239598a9fbad44b8b57239fe7121e96580ce5df646c
-
Filesize
173KB
MD534944ecc0a81bccec060aeb14d5a44d1
SHA1632d4ccd173ff5ae51e0c68cc798fad2eb9c4b89
SHA2564af8e4005006ac9e8fa9b7c32a5a0bcd64664b3e72970a0a648a99f736cafcff
SHA5125ae9aacc5db34b58700013c9f590be33ab38866998e34b6bc632fb06428218a7cc064f608e7180731e9e12af07dcd18e167935559d1bc565218bacad771fdd7b
-
Filesize
277KB
MD58d0b46b7c95727980faa49bb5972ec3a
SHA163491cc05e18bc45d0c1f1be901048dfadab7b11
SHA25677f4f07b103ec1ac102c3b9666ae882e756d637c865cf0ecda68bd812637dde5
SHA512691e71507a982d55b03072d14c5762ef84e500532c58bb8f019623312794807a616d1b0e51256aaee36fe495b3c7e5dc8c007534a9c5a2ea5925acf34ba57ea9
-
Filesize
279KB
MD5cab10a547f97cf022f0f90e039e89dbc
SHA1aee5df74827d4533204e13910a77b0dfafb36eca
SHA256330f1955ba18c678a2746dd15849b27be49caa9971cd937eca2289017baef3d4
SHA512b51fad418d7982c3e40fd27ccd12f99f934cc347f3462efb4becc7a374a3459c78361547f0dc92963cf1e8ad0ad9a30ad9654aeda9cb8dd1d38aaebbd53b6b7e
-
Filesize
359KB
MD5125d2f408c21c8ef91e4d4b1c6e88a98
SHA17cdf586335d905428e5183c30f9979a29c9c6e1a
SHA256863f919fd535b3432e81e55b1b27be5b8c90e50cfff48e9420611ed55e776831
SHA5125b16e04943a0774f27ec7042cb4ba2fafd7f0c38a53ab4344e85355ecf63985ae01c33e5d603030e1d525dd8982cc5f7438db5becea8434c507550d3d1fbb4fe
-
Filesize
280KB
MD572fcbfefe70a06852f96fa58d2ac0685
SHA192c8fd603eb96f7642cb0ea3e2db86c2521fc71a
SHA25645877cffea5af391601d61e20d30fd91a181bf2b517cd964416c444fbacf77b3
SHA5122b341b0b727e7fb6497f9608ac73a266d3f2503f9e8382d893b58f992efadd45de876a4e1430814c3527838dfa0c7cc5e5118b235757075ac6cac60bbb2a5e10
-
Filesize
203KB
MD5cf9303eefbc6e87968bd2b8d7fe2e5c7
SHA1a4174c9634f79cd38b3f325f67c8cdf769716e73
SHA2560103ca625f570e6dede7692eba4b0fc7a866d6da23b6daeabfac7926bd9a1884
SHA5120c8150268f9b14ac95e2d53528a5629987c9911e49ed864c604535141372cb7c3c0b4b110956531e3f839c465c4062c6e3d3b9c90acd7c81da81edf52d4ebacc
-
Filesize
176KB
MD567e4c78a9b50e071735820ab6cc333e8
SHA15f189c6e4830d03c25b98c114cd6375ddd5521a6
SHA256e06a929d334ac0583f61b4d6d538982e2eeb6939bf72e99b14f13bd06d629f4b
SHA51225dd6b3befaee65f0f38144c30cc5e9946c243b7d6a241bd0d298a4780a8a8e659d1a81725ca1598ae0c8b2bc44a915fb07403762d58e4560477413f82cd1004
-
Filesize
240KB
MD54381d63d3e9e866782da2ba8be60d95b
SHA1bc3354adc2d95fe60c22dc87eab06bbda5cb813b
SHA256dc0430feb5e9b323ad313763d6b41a4f2f4b5117852b619b8c4776993f514dea
SHA51270ef12d51055408e0ccddcbbcddaac3d2e57f7a26ea8ed916cdfe4589a20cd84ab1f0a732ed24ed836f9adffeae6b31a28c7eda9804ff24a3bfecf9a518e2bcd
-
Filesize
186KB
MD5844466ff22de2caab80d9ee9fa2b2f6c
SHA180e0d2f42ba2ffc4ddbc895b6022c0b48b9dbcd3
SHA256b9772c303e19e13137e4227f079fd44afb1277ae471df69a489e25386cc119be
SHA51214083943ffbdec116a17b0c56bbcbd38473f23b06f93d10970a484ccef790f2085dc388301505988adeaa9f6e30fd257216f54bc189f0a37cfc3ff89441a374a