Analysis
-
max time kernel
300s -
max time network
303s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
12/02/2024, 06:00
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 4228 b2e.exe 1296 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1296 cpuminer-sse2.exe 1296 cpuminer-sse2.exe 1296 cpuminer-sse2.exe 1296 cpuminer-sse2.exe 1296 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/2524-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2524 wrote to memory of 4228 2524 batexe.exe 83 PID 2524 wrote to memory of 4228 2524 batexe.exe 83 PID 2524 wrote to memory of 4228 2524 batexe.exe 83 PID 4228 wrote to memory of 4072 4228 b2e.exe 84 PID 4228 wrote to memory of 4072 4228 b2e.exe 84 PID 4228 wrote to memory of 4072 4228 b2e.exe 84 PID 4072 wrote to memory of 1296 4072 cmd.exe 87 PID 4072 wrote to memory of 1296 4072 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\9F1E.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\9F1E.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\9F1E.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A856.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1296
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.9MB
MD5cb650fd9fc4b7cdeb9ad8f3c1ec83a90
SHA1d048c024cd2246bee3df024b9450f72797ad8a60
SHA256c4f52fabb6e45ce225f37cb46b9fce2f02a14e4cc056ebd0cf1bf9a475ea7412
SHA512a204a1936c81c9cbb9f909f762b057faa1894687e748d83e3385aa8d7abb8f2e78eec52ed775fae51a240ac428488cae7a6138e8554a548ecd0262651ed5e4c1
-
Filesize
4.7MB
MD5d7014eca157fe7eb218fdbc93f1e4176
SHA14e911cf7ebeb2b8da7392f60914900cc369a5c5d
SHA256bf5af65ea0d136d0f144d391c901a66b7a8cf12078bdec6eccd4707b72b17ecd
SHA5129cf341ac2e1fac57f3010c95ee14f3a1b32b8b7585504b33c3b2bc89aa72e369e847908877083a5ad8ca0e4e62d238a9ea38327952a127a67a51d5aaafdf312d
-
Filesize
1.4MB
MD5c5e09858066f182b7f5bdcb61d9b36fc
SHA17a1de79ffcfa17a7a86a01f8d5046eaf970b8905
SHA256b5ede4ee58898940fa268a8aa17da9fc31eae634a8c95afcb2412ae199e8f4b6
SHA51270e4e7cf5ec9df418480b0773c325e489749cbf6b5af491b24f6a6b2298cb043f681689531e70666787d42723d096d57012f1bccf317367908ce68a1420a6dfd
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.1MB
MD51d224a4c57a729ccdbd4f9d13656ca0b
SHA1bb8939539de49ee41d4a11caf9ec81b9ea1cea1c
SHA256dde910e3ba7aad77b66e776c724f11cc17956df4c1f64f901566c7a4c2a70532
SHA512034af5693d5d4f322cd722f2ee3afc1e9036f8f6ef1339eaaf81d1f6faebcf3afbe7ef4265678c7e361772928c2d730ad4c10434a167356455b2fb4b2327f4e7
-
Filesize
2.3MB
MD54c04147c386ba8792ac6a03069572a8a
SHA1dda67789fc1d0f2469ca95f01a5c81034853ca6a
SHA256c7739a1e940a282703d06eccda7110426d306f390e97fdbbd9df18472fd132cd
SHA512a8b5a0b878a9a7d30cb38feff814e1f4dce24d000158edc10a43ee9a89920bedf7adc92eb7e3913098b6aab7fbd0531f56fc09f508b5c2769992a94e55d153db
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
2.1MB
MD58397af41b846cdcc65004a558c16802f
SHA1176a393d81d3c4529685d065115192cbd0cc7f3e
SHA256c9b32cea6bcf2c93e57fbbbcf942f37303e1f8ca031716b9109c6b6ee2ba96fe
SHA51234ce81a296f9400b2219250185295c8c5b5d35567d8000b48f8e1d43ceedb8949606b65724c03b0a67409e42e76bb550266505acdf0e9e3d79844a10a4bd7087
-
Filesize
3.1MB
MD5fa6bf44a6b32ff3c7a8b5b38a672ebd1
SHA1c7b47dd5aea1dd9a807140daa88db29065cba784
SHA2562adffd78e00ab5cb8c8a5c55c7e234adb29437d4cfb4c8e3745f02b61f45ea5e
SHA51259e91be8e3b68daad169a70b0c4f4daf0e9b62f5d1d8981443c5a25595aa24da00747b3a3e10abb150c114911b6a30ebd3b1782803b541895f9ca083cbdef2c7
-
Filesize
2.0MB
MD5380c06220b61c3d7b25150476588f185
SHA15bbe41221c2781405884f9df462dca0a8c87acf3
SHA2564fdefa3372f8b7f0af64ffc66ee230420529fedc025231fdc33e19a0eb411420
SHA512bfe73fe1077e4029b0f5119c13892217de29527fb607751a3874783fba6f69903e14033f1e9c08a3853b6fc253287e9ef29e1d4cd76bda0a7598e626cbc63257
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770