Analysis
-
max time kernel
294s -
max time network
301s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
12-02-2024 03:28
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 1064 b2e.exe 536 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 536 cpuminer-sse2.exe 536 cpuminer-sse2.exe 536 cpuminer-sse2.exe 536 cpuminer-sse2.exe 536 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/1408-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1408 wrote to memory of 1064 1408 batexe.exe 84 PID 1408 wrote to memory of 1064 1408 batexe.exe 84 PID 1408 wrote to memory of 1064 1408 batexe.exe 84 PID 1064 wrote to memory of 1700 1064 b2e.exe 85 PID 1064 wrote to memory of 1700 1064 b2e.exe 85 PID 1064 wrote to memory of 1700 1064 b2e.exe 85 PID 1700 wrote to memory of 536 1700 cmd.exe 88 PID 1700 wrote to memory of 536 1700 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\638C.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\638C.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\638C.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\66F7.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:536
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.1MB
MD52a717cabcbb60f293002bf30828d27b9
SHA13329f5a03f6a6b9185a20e6e48f6d0304518c2be
SHA2560b64f36a955a38b1a256094758035c21cccbe3de50f05ceb1efb767bca5f7b56
SHA51263163026e7f7c60578710ea56fb4ed1f23f231ea15654eb7ac6b094bc3f8e7fc99eec41c636e2137603ca651abea6b08b3fc6dfef30aceaca5151d866899b06c
-
Filesize
1.7MB
MD57b9e19cbeef48d1436f80636d98f1e29
SHA1211ab3ec2dbf56621bfa6e7b4af51f6d59ed7e22
SHA256ab3065d4cd6d2916257227617fba70a92bdb7b65f474d9a3b5a7910c6791775d
SHA512cd561dbc1747d3f5e1a799a1d6f13d71150e273835ecfd1f84b00e742b04a23b41daf83db404ef527c1531f665bd6e74a4fc62bc84759208b958a4803063bdae
-
Filesize
1.1MB
MD598a6e77a713f1bdd53585d4fcd834607
SHA11e44264b46afe8fbb11e8dc41d226fc9eb951d45
SHA256036cf4569945691322d211cd1b69d1973d56fd959e345ebcd144f25e17c350b1
SHA5124429eb4ff224636650c15c07a22d2ca3bf8c9a6f3298f1b89f0fd56f8d0cbfd3de875ebcc728b302d18b532957d1830723c38488f0ab541fb4f3628df0f892d6
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.9MB
MD5e75de0a4da8dad396f91417fdc6445b8
SHA16e4d0bb6e2d0107869ef086cbb57d812f87d5c2a
SHA256def062dc0ba00e1438a224a8d12c953dd697281f49b0e9b22b3db31c44b25eef
SHA512ab22155e200ee13a8a882586fe31dadc6af4883316406a677900fd25c69fb97385932788f825821e2c3d8ee53249df6c62013925f8e4e0c4daa9d7d45091a085
-
Filesize
1.2MB
MD593a5c1add02270e32d6940f1551e3caa
SHA1addd05194369b0a18ebba3b78349f1cd36e16423
SHA2569885d1e0e5633fcdcda3ad619f326bd9b2faba2b30ac44f17be8b8bd80a2b867
SHA5120a3f66c70b13ae329a08e18a8720989b9a1ffd3c8d3a280fe9cd86f894e7b13f662049cb5ecf6db44f8cf7b99618edd23f6975774697c373fee6c24183d0906f
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.1MB
MD5a5f50e97e20786f693bc471db3cd1686
SHA1525ab151a96d755dbf76c52cfad1a9283394ed60
SHA2560fa9c5e3aaeaff740313f8721ecf1a51eb0c3fea3050365877da1be661c557a8
SHA5124b5abeae4a3700f4a77c6d91de61aead5bf8f863f3568822931646ec182388ca091036c2c80a3800c289406274ca32b6fe9437301b36952d32d5a8fa7701ff03
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.4MB
MD5d942be7719296429a9e0696e8bde3bd3
SHA193def08f6ba68a9da7325650b7b08989bb5b70c1
SHA25616d38ace11b1a8eb3dbaf6b2369fc40e7967ee1421eb7c629521782f801ee9c7
SHA512b10fafb62b9041880711c7f17ef9fb871c265d41d9472ac73675574419f60f35dae023c9150ccda21cc6a3e0b122aca45f0cca161ae6f58ba498e158a8de6644
-
Filesize
1.2MB
MD5338d830b956600a4702dbac018b64815
SHA1ca364df550ea4a202427cce1976317155b6f3183
SHA256334753eca036e7981285d7d53496e5b04b7b7f2e2e25c53f4eafc302cdd67a46
SHA5120ffa08b81aeced9bfcd6d92e8af30f6240788032d107b8627fec205418124d66f161dcc44d650bc9c5289db5d64ae62e3f7ad46ebe3545aa82414a6f7a86589f
-
Filesize
1.1MB
MD568c5e0381e1c5d6b70ef9d79dc481619
SHA15b4b27ce7d562f9e8693b85738e0c5b2abb35573
SHA256072b801f8ad08956f656ef2ffeb939a9a2e3754010303235b4baf0b47f740040
SHA51227b19fd19dcd7149540f91edecf8cfcbf7adb2400922f849c608f047f277171d9028dc765fefef858c3ee7cf90075bee0cb1f4c97789e3f1f071ef40947956f5
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770