Analysis
-
max time kernel
293s -
max time network
303s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
12-02-2024 05:34
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 1888 b2e.exe 1152 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1152 cpuminer-sse2.exe 1152 cpuminer-sse2.exe 1152 cpuminer-sse2.exe 1152 cpuminer-sse2.exe 1152 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/2556-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2556 wrote to memory of 1888 2556 batexe.exe 85 PID 2556 wrote to memory of 1888 2556 batexe.exe 85 PID 2556 wrote to memory of 1888 2556 batexe.exe 85 PID 1888 wrote to memory of 3484 1888 b2e.exe 86 PID 1888 wrote to memory of 3484 1888 b2e.exe 86 PID 1888 wrote to memory of 3484 1888 b2e.exe 86 PID 3484 wrote to memory of 1152 3484 cmd.exe 89 PID 3484 wrote to memory of 1152 3484 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\70FA.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\70FA.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\70FA.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7455.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1152
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.9MB
MD53ccdde5857eff5d894cdc7a0252f170a
SHA1d56bf29f65508bd68c47c0ee0fd62dd27cbd1bdd
SHA256965518896f5063c52272a5d2bfec40e0c7e41b5afc7b7bda542b8e1edb1cc6a3
SHA51231af42ac917e3802f96c52d02da4a3f838c4c1182c605fe4d7b190024f46e616cbda8f4177531189be5f13d0fa67e55b231375cd2cce166b5b5ad114c644ad72
-
Filesize
4.2MB
MD5893ba4abe829bb9f2631d87452ea231f
SHA13a1b0eff70d9812a34faee257bed83067fb826b1
SHA2567452e91f951037d751719e877fe688cdb68dfa7e6bf4d27726a9ed65af4adc59
SHA512dddc73218382fb861a0d551e7860fd15bdadda1baf0686392f339e118f7ab396b204d6dcae5f6f3ad996f58947b0c77bbe0f49a85a6d4a82d53841fc461a7f6f
-
Filesize
3.7MB
MD5f11736d4719ad5f17e9ddcc3834211fb
SHA1468bc9dd3b49b4d25fa8ca5b27c906fb28be9678
SHA2569e738c398f6afa3a88555a6f78f17d19b19fd7bf154c2dd5682a5fa9b1457626
SHA512b1b96db8a27a9832eff3941132e5c3d89e1404fe81c46e7d4c51ca9485a1ba515747e814f02f9179c315af559cd7377deaee34479bfd0b02aac372118eaea9b9
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.0MB
MD5f25348bbae4ded28c014e97047e28304
SHA1958c235f64e8dfcdb1a582bd28dd86845c1a41f0
SHA2563d1640c98b409ca30d3f79968f5c4f0b42e581281b0cdd0007ec482776da66b1
SHA51252a911f4690517ab745da162acb503c2f66d5495f9a1103ae2401a4236e63ee28167f9984a6275e4b50413b00426fdc839516e502f922012410b0fe2c65e75ca
-
Filesize
1.0MB
MD5a6b0bdb4dfff268b188d00522be9613d
SHA19644be2bdd6951360ac0c9b0f25435c73aa0c38e
SHA25630be6c8ef9ecc43fd6343a6c20e915ce266bc66c1511e779f04184a25a8db8a1
SHA5123c479428d4ebbd9fc442357cdefc369a0daa37da2fa79462bc4a0c3771e8263913df80fee092049cee6b60c103618eb0b71fe90d03fc48d1a9ff5a92e94dc61f
-
Filesize
821KB
MD52b8cc6ed3739b4345092aed52c663cf5
SHA1e87ee2d8bfc663ec2972674a34ba0d687d258ecb
SHA2568a2dd929b7abb97fa58731c4bce2fb4d1ec9287f31e4231629de422733f4d9f3
SHA5125bc77b429e9701c4d991963cf4ac3c946bd8473f6b6d2c819827497144378c71c4a9d16b672df34aaa8abccd537eb7a4afa295c8171cf5fe91ad70e8654b7978
-
Filesize
830KB
MD5304b3aefc088a39c6d1ba917cf919ded
SHA12d9d93cb9d2f0b82e19884527431754530c9b212
SHA256f1f90228f2f5e3ed85ffcef7bb862f899df80923ce88a4b7ba7c7dd7930c5ab4
SHA512760004de3b4a246778b0283b1f66da7cbac5c3e3fb128551f095471cb137f7f1a76c3340e42618528d9a78c017077fb249086c9bbd7140b49f5fa3b993b00bb6
-
Filesize
871KB
MD5bdeee46b62b7eaa77949b033a1de9d28
SHA162c6b1a26a302f1844a063466aec0354fe307a15
SHA256bb708296e08dfb4f0db42add354c21936637ec6579f5f8108b15f5980893f844
SHA5122a806b3287023106ae0306b759e6b535f52135d28a1ec4d030f32140b7570b9869fdc0581885e65b230c4095ca24852e833b572328301e117acb63fd32af8bf7
-
Filesize
646KB
MD547838ad5b6ce936af3e074186711dade
SHA1cc18ec01db45b9b428c5a64eaeb9a46fe1f1943a
SHA256315eb748dc8ae9149fd0907869cd2a324176f95bcece3fbe104b70200ac41d1c
SHA512baafd72a3827120708cf379af1b1e09d28d98489d748ae0e8dd8989dd72b0f00432bccdf9bbecd3d744f2c3f754c2eec53640d08f59782a3ace16421573281d6
-
Filesize
558KB
MD552c37d94e73483dbc329621cc1f44b8a
SHA18eb024e67e7ea0088867c6991b0237c23f3fae81
SHA256650265878ee6abd57f4f464df82369ff0bfcdb99248c4981577166af5f44769e
SHA512e1c27e3508fe7d412a064e045a244c0e2f30d6877480e2aa9e163e23e6969a7169e59794b1eed94ecd9f46ab8876838ae04198b6c9083fdd63f0ceb777688b27
-
Filesize
621KB
MD52582a0b11affec3f67397bf1abbe374e
SHA17bdef4c693edfb1e6ec6dd4b69df3efd092f836f
SHA256aed7821f70deb74b05115407b25dca3c5376d3515b773ec6607260ec56e81564
SHA512045eeb76057621836154187448d634b35e04c09ec73262975459549c0b08cfd0a0b282050753d17052598031d06ffebfc2dbd0ee957faea96e449c1dc7fd24ea
-
Filesize
396KB
MD53fd0b276d58bd445ca3f039254219552
SHA128c463eabc8a5063303ea7f5809059a63a5f2bf2
SHA256a46fad395730ec4f1532e3db6c5242644ea04580214e8300f488d2497bc8e33c
SHA5123c9304c5b24f4d61bffdd8d64026ea535678afacee3c206fa732a8aeab571e313de914343b28766cbdf4eab293d86eb01c487517bf533b515699ca0dc5779aa1
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770