Analysis
-
max time kernel
290s -
max time network
307s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
12-02-2024 06:11
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 5052 b2e.exe 1904 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1904 cpuminer-sse2.exe 1904 cpuminer-sse2.exe 1904 cpuminer-sse2.exe 1904 cpuminer-sse2.exe 1904 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/1372-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1372 wrote to memory of 5052 1372 batexe.exe 84 PID 1372 wrote to memory of 5052 1372 batexe.exe 84 PID 1372 wrote to memory of 5052 1372 batexe.exe 84 PID 5052 wrote to memory of 348 5052 b2e.exe 85 PID 5052 wrote to memory of 348 5052 b2e.exe 85 PID 5052 wrote to memory of 348 5052 b2e.exe 85 PID 348 wrote to memory of 1904 348 cmd.exe 88 PID 348 wrote to memory of 1904 348 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\8388.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\8388.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\8388.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9088.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1904
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41.4MB
MD598952d61f30df21c0452eba38c36cf76
SHA14f15a8b78fafec2a1c3901e39a3ae507366c4107
SHA2560a14966e26647b6b8774ee2b1b976ea34e9b9c6133ddd7062d89cea4accc002f
SHA5126a3dda31cc07f1e3c9efd311a754efdb752400eb82d20933dca7026d4815784ff31a16caf3c3afbeb14cab46b57336ac416c5acd9ca058755b969232aa01da74
-
Filesize
18.6MB
MD5df2ea625685fb349dcfed38eaace2f75
SHA1fb51a6ba8081a346944c284b9ebde5f492a09c0d
SHA25689ca723e4f85e647d6fed704d2e24f0b60829c0c5bf91ef0fe9af86fce8a9396
SHA51235a81de0cf369bde2c00dce7aba237e7c1f228e3d81679926ca4a606bbedd3f8a7802c89e1b701cdfce10813a6287ab6071209603b6b2584738bc755676751f9
-
Filesize
10.3MB
MD54f65746c5155649200369e0bb0d744a4
SHA16c845da6c8d584aacc6f83bb97fd7110e22450fb
SHA256110537d50246e0bba7ffd6e8df34c7fdf3f3a9b8ada51be535b1502df4d20efb
SHA51244af6588ab1eca0ada4584dc51f5604f9656097bd52ba59bfde5604c3a57735e9dba28a0943564c2069482a764f264dfcb162b90c21c6e2fa267144d099dadca
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.3MB
MD54c04147c386ba8792ac6a03069572a8a
SHA1dda67789fc1d0f2469ca95f01a5c81034853ca6a
SHA256c7739a1e940a282703d06eccda7110426d306f390e97fdbbd9df18472fd132cd
SHA512a8b5a0b878a9a7d30cb38feff814e1f4dce24d000158edc10a43ee9a89920bedf7adc92eb7e3913098b6aab7fbd0531f56fc09f508b5c2769992a94e55d153db
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
5.6MB
MD59e080c2fa098a18032868b74edcdad78
SHA1fc1e64eed0d449700b18d9d8d20c2c2e50875b4c
SHA2568675e8bea0e9600f172c066331714e2880b69115169f581f813b0bfad01bcba4
SHA5122ea8e8e5ad5296ead1152eb58d639e89b0f19d2c6649a3fc5d9c1406d545b9bc839d7f22adc5ff52517c9e3cfca2ab5f26a20086df95230ecced8b96fd924fbc
-
Filesize
6.8MB
MD566fcf40e86654f41cad36f479a6844e3
SHA167c105d7cc6234acb7827a146004574bc172f796
SHA25688fce32ee91efaa9368b398581dc3a7138a878c6a105a1377c2ebf70d2cbe9dd
SHA512ab3d52c322c1ab2eb041b28b8ad55f0a7884bee7c2312510754ce164beacd6a979e1842498abe4afabb50ea8369df9f7023f08ffd86bbdd1bb9eb963293e193a
-
Filesize
6.3MB
MD590faa6c82e927984c4b095cb5a672f8e
SHA1da3264c58b763339951e2b62eb724d5488d79944
SHA25607ba3b7084ec698b7bb8df7b3b5049d37c5b35b01319a8dfb82f508221176df2
SHA5129330d17b0e20532fa419e657fda39bfcc0af0afa3cc5df2db2ef5712d7478366580bad4f8006860b47a37d6178d08f65a536febbf9809184243747936025cc59
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770