Analysis
-
max time kernel
295s -
max time network
303s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
12-02-2024 03:31
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 1464 b2e.exe 2268 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2268 cpuminer-sse2.exe 2268 cpuminer-sse2.exe 2268 cpuminer-sse2.exe 2268 cpuminer-sse2.exe 2268 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/1788-7-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1788 wrote to memory of 1464 1788 batexe.exe 85 PID 1788 wrote to memory of 1464 1788 batexe.exe 85 PID 1788 wrote to memory of 1464 1788 batexe.exe 85 PID 1464 wrote to memory of 3484 1464 b2e.exe 86 PID 1464 wrote to memory of 3484 1464 b2e.exe 86 PID 1464 wrote to memory of 3484 1464 b2e.exe 86 PID 3484 wrote to memory of 2268 3484 cmd.exe 89 PID 3484 wrote to memory of 2268 3484 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\7129.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\7129.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\7129.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\753F.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2268
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.3MB
MD5d6cc34a15065c512dc796617499310a1
SHA1ce2b06bbd0e709e6a11dd4c3ae19d6b4a3361860
SHA2562b251e9086a4b50afc42ac9fd35bfc9a79ef7a9c40a28908b74c7885dd849926
SHA5125b4db2c2f05ef9aac5be407678e0547bfeeae250a40fa49260d208996219c7bae20cdeff6b6f49fdeeda3b68d88171ca71aaf6a0f9705368f9afd05dcf23c82b
-
Filesize
3.0MB
MD5e6b6693470f0472e12780bb732c3b5ec
SHA19ee87ceb9e0bcdd2136114b0b809100f26bde92a
SHA256846de204c72aa7e299a15b28ced2d4709eca9ca7f39b67df48de34c1201545bd
SHA51225584e69884c283333febcaef7ddb15bce52a7fc088603866f140a35d712bca2a2217f6bcedb66a5319a58469e68d32239ad6f4d430063a43a0440e29c2c111f
-
Filesize
2.6MB
MD580039b4df6a7680959ea772f6ed2909e
SHA15564061171834317dba2910ed83621b78de17700
SHA2562d897b1f95c09feacb40e703a3ef2f99339b5654152fda3dd29f8ab895eb9e68
SHA512a501890f113b45ca254e9ef80ebe9bb13f7cb3b87a927ca48bf5ad3ed49e071f12291e96b3f48e98c103cc0ba02b9c69da613b65f4d14f50a33edc2d08f397d0
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
40KB
MD5cc5d6ffbc47a90868ebb827651e0560b
SHA13e389000bbb21000ec1a07a3616ce9c80e69b30e
SHA256ee9019aa39c49d77427628316a1642a153b7a6d12dc4e817dbabffaaff44d249
SHA5129d611c6ad26d3463ef21c10143750d85fc77415598c67139d99634b9bc204d58b43e12f606bd73178e3a82203cc9dae068125e932b79997e61db33784c1ff6b4
-
Filesize
925KB
MD50fd6bf7fead10ee49662fb7835b62053
SHA10d9f8715f6306521eb9d8fbb032685177de08fec
SHA2565649048e47c1d21076670052d83bb3c48fa5a4e18b9d7dc35215a6d393adf4a5
SHA512927d958fac39e7415140106bded7d7f4b84278a2ae4926e320044997a2c2bf005078788f7e072e853106e9c8e13441f6f2eff5495bb3a8d3647d3d5d4309aab3
-
Filesize
41KB
MD5a707a2b062cd4798c71858f54257184e
SHA14b8630a2a29b04b243fb8c31b734d2beb357833d
SHA256c4a426c63439fedc5bb3781c0a826a475906793ed592dfc4316fbd8c7bf791c6
SHA51283acdab65c3af5ff5066cc5ec4734e9d870a185f230e871d2ac61aef3e2fe558c5fbf210c0f67af951f08bbbf8bcaf68b8099db495e86d765386c2b878f053f5
-
Filesize
74KB
MD57b732939602ff3cc76cc50f77974ee15
SHA1bcb4aff2f16a00fe40935ea763dc07951023e18a
SHA256d88ec1578334daa049d02bce2f71e9672de8e6edac932cbf4587dd74a9f66740
SHA512d60321dc01a3660932c10e4e1a251ca853554851844a0eb097345cb7b179edf31e04907bbbe22e82632f1238edc8a2ac8fdfd6c86dca50d5abe584558e2d1c8b
-
Filesize
861KB
MD53df60b05fc99b4eb206bc1c2b3eed691
SHA11896a58fc13c11e96560758437afdfe6f9262007
SHA25671a5d79795042457101d1beeb88e34f8c3e7d949d646b374a597e4726479c811
SHA512f9eaa8e9fa9165fb4e4ef875d542e2cd0ad88af2c8aeac0919b846f2abf2efa01fd8bdbef7cfe03db363da2ca722eed1b31fa8397e2dcd044ce6c134f733ab9d
-
Filesize
40KB
MD5bf7b0e0866f8e97825b182ddb288121b
SHA1f37a5c23fcaf19d9c8bd0a5bef0729682e9948a9
SHA256fe18be62e698dc02efab0fed913f76e08bdf0dee23a2cc6b853ec465629f3258
SHA512b43fd7f94be623cd79ab1f26ac4b04bf4f293d6e1b63442bc2e606e378ecc4b8009275f6ce33d34a77b5a8e04aeb24a77640b263d1f947fb231cb5ed0aa06b7a
-
Filesize
965KB
MD51e0871290b3a7ed064ca67f3aaa54468
SHA1ea061862dfce7a6c4552a8ab5d5e8820e42f5cc7
SHA25619d556c06b5181e14bc75ac60d515fecc5b9f45ab78f397e3d10e431a0b8f275
SHA512a241e1ac527af59cca51936d4ec0b05862dbc4c452762925708b4e12834b0e822114542e7f8c805dbfeb19c005f9650160e57c4bab97b3c8cf45753f381f5c35
-
Filesize
21KB
MD5db0c7adae630e4cd4e34ebf1f73ace71
SHA1bd5c9486cef188bfa707f0e142322aaf1d16833d
SHA256999a191ef76f507c90650fe73177028b4bf5b8c7e85dc26ba85a4163c4d74b79
SHA5121dfd062d504b24d94964e1e92f9f2df9810a99ee72a31d499c3caa69fd5e473a0c8a3c8c478b56e885be2075eddbef9cfc0eb9904ba675f836ba71ed8422112f
-
Filesize
57KB
MD54a91d8f522a86a4a67e44a7667410a6f
SHA17ecf2598d4da2b1b105991b2f5a49c8e14e648a4
SHA2564ecdc95a5d1aac157a46642018b8ed1f005ee2ab6e9ab2bf8f38e961dc37ea4c
SHA512aa5a94d3acb4c310f0b24d132556ff07ec17bc152e4575c7e3e3d89babc9768ac0be323f3ed89c796d145b28f19a7d8d880721077b4e503a2aa3b8990032f9e3
-
Filesize
28KB
MD5174ceae43b1c57e70b53140dade36ff3
SHA10dfc73183f423823f35ec59a1372cfe0fe11aafe
SHA256ef06103c90c2aacfa444476070cadb924caebeb1d5c6f448908b584fa01f333f
SHA512efc76ca416c5fae0d3ce588da133112f237364e4d008d2f0f91c9563ca3c129498731b5181776e5aa0996091cd2c7fe028a909924b1f725bba7ca1bc9c86962c
-
Filesize
108KB
MD51410591df4865186715ea8f927c6e90b
SHA1444fd4f96d09d20994e71010a334af9d9a8f9bb2
SHA256dd2a2bc35730887bb0a22ddaee3b9e412e946fb920098d481bfffd7878a9d1f1
SHA5127568c9baf27c34897c9b015c90b3e8c276a5839c76e78e0623b8e6687285310de7b8f914c7bc8380dd4e70a1cf75253535dc635b105f18712552c5fedcc374e9