Analysis
-
max time kernel
294s -
max time network
299s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231222-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
12/02/2024, 09:38
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231220-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231222-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 2812 b2e.exe 1080 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1080 cpuminer-sse2.exe 1080 cpuminer-sse2.exe 1080 cpuminer-sse2.exe 1080 cpuminer-sse2.exe 1080 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/800-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 800 wrote to memory of 2812 800 batexe.exe 85 PID 800 wrote to memory of 2812 800 batexe.exe 85 PID 800 wrote to memory of 2812 800 batexe.exe 85 PID 2812 wrote to memory of 4196 2812 b2e.exe 86 PID 2812 wrote to memory of 4196 2812 b2e.exe 86 PID 2812 wrote to memory of 4196 2812 b2e.exe 86 PID 4196 wrote to memory of 1080 4196 cmd.exe 89 PID 4196 wrote to memory of 1080 4196 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\B6FC.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\B6FC.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\B6FC.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BBFD.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1080
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35.0MB
MD5210156d42118d6ddaf70fb4ddba05cbd
SHA13f8b75a6396e79fb5abf39d9c5707cd4086c557f
SHA2563816b79b1ae33708ae3516e07e1eab73da2831be5028300d4d01d4ff7169b975
SHA512336877b94288a46b87cd3d6d3f9b727b92714c112ac9962676b7d542f9c1c50ff4d265a69215a286b3511820821231d4cfe8d761dcfe4202472896257cd463c4
-
Filesize
896KB
MD51f22d8bf5f6c3dda3e880ea1ba0417d4
SHA12a8dbf2319999a894714bdea650eb5be32c64c19
SHA256afb7da96abe31529f462178372c48627a7e681e3c18cd2196aec8beee07f5b96
SHA512217b89f6a74039807c135539482b1a769d715190f7756e2b0162a33da3d8ada909b80ca3fc1596e542f163f6a45726282997f4e52a36c352cc89b9e58c1e6e05
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.7MB
MD5de00072c02a43549faf138ec15cb6fd9
SHA1ad462368c282ecad47943cf64f6a1ef138cc5d3b
SHA256adc1f5b8bb66c54a105999bd858aed4304bb72bbf52199e4ee3c4f70b3606946
SHA512c21747dd9b1758210ec6bbcb047c86205586b89fe134b41fbfef7229555d066a80dd79ecf0f93a65e795e686291c2944f23b6dae001d917b92658d3b359304ee
-
Filesize
1015KB
MD507dc1b320c0a1d9cbef9d8786a6c2444
SHA11a2e2bf5415fabde50aef41340d57a0bddc5c489
SHA256a9d0333eb7adeb80b004cefc96dda8b65675c039d2345fef724e3a18e168a513
SHA51236795c3f498e7e7e7f2d75e0ab2b71873b3602b98ff53c778d91af208482ab1a59510ea4b09dc736f2cf0b595b2ce2698a911c7caf651dc6b02a708e1cbda67c
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.1MB
MD5d7c1502314f1a4d372e1d88f8d805c36
SHA16c97bcb0b12feadcfc16d54c389e69f4b67b2d0b
SHA256587c675df9f42a0b8fa04b02a867d7a01f8c6eb4f9b6396c1bf70bb80043cf3f
SHA512de31f28bc9a48363a90bb931ed49d557f3bf4995b07a5a701868d5a51c24176b72be92fc1e50e9e51cab3ee014c56391e9bed9fe1f1556b62e1c3cfeddcbb956
-
Filesize
1.5MB
MD5c41694dcb335dc3e316b8e2a3f9e0188
SHA13e902cb504a1628bb62290f79866153cfa6b2c14
SHA2569c9571fd2f06ae1724812cd73ee3c14cd9045af20c635c0a68acbe56d2f07cb1
SHA512e90f15f077bd68f9679567b242c18a9c2c760c51163191c8f6c3581557e4fd71acf644cefdae3dfe698fd7e96196f52d7fba66c346c3aee3bcc5d0b03d24b95d
-
Filesize
1.9MB
MD5a986bcaf017c21718a01c98132ffbea7
SHA1c13b0d1718c4f96a50a0a745b3bab1e3fedc8d1c
SHA256ea9e521d217525c026d1317d9344e180646122ffc457119e8d82b76065ab9612
SHA51221920f4530c72246ace25f6175422f14c66cafedaf0c94a31f627a50b0a7b2f04932e1609e51023c6c3771e8d6d68ea58cd9e17b885d0050d7fa29458d9a5d69
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770