Analysis
-
max time kernel
300s -
max time network
298s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231222-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
12/02/2024, 11:48
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231222-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation b2e.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation batexe.exe -
Executes dropped EXE 2 IoCs
pid Process 3240 b2e.exe 4212 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4212 cpuminer-sse2.exe 4212 cpuminer-sse2.exe 4212 cpuminer-sse2.exe 4212 cpuminer-sse2.exe 4212 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/116-7-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 116 wrote to memory of 3240 116 batexe.exe 84 PID 116 wrote to memory of 3240 116 batexe.exe 84 PID 116 wrote to memory of 3240 116 batexe.exe 84 PID 3240 wrote to memory of 1620 3240 b2e.exe 85 PID 3240 wrote to memory of 1620 3240 b2e.exe 85 PID 3240 wrote to memory of 1620 3240 b2e.exe 85 PID 1620 wrote to memory of 4212 1620 cmd.exe 88 PID 1620 wrote to memory of 4212 1620 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\5AE1.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\5AE1.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\5AE1.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5F18.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4212
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35.4MB
MD5d24d46f2e6dc4cd097bffc924de536dc
SHA1effcc07657912369eb70f6f5964fc6fcf369fc75
SHA256c2cb2918e2dd69e8d45a6775c17e24fcb8e173467984406a0a84770f39258df4
SHA512e29c8a7fcc32701b28f0f848849b407e1350f07f57453a559cecd6249c307fe929f9a365b33db67b8d50058486842dc3fe8aee0c48bf444946ac815c8dfae63e
-
Filesize
21.0MB
MD5b15fe1c1c0116777f10559757eb427d5
SHA1e25e55c74cf8ff2c608b09d18e4085367798f7d4
SHA2561c0bb618bec95cf678c8624b6c323c786e5ff8ceaed7c35b18fd7846b66341d1
SHA5122d03dabba9cfcea76fd3695256069828299f3c01a5a062986bcddb733bf8fc23bfe865c976b687e32e14301937d6b8ff6670e923b8360245a685056824d61a1a
-
Filesize
20.6MB
MD5012f10a594d8e6fa19fb1b11f5ef0100
SHA113dcd5a0ed8e625ecc87b747b3f4f05494bc46ce
SHA2561d22bd3ab1ca25056ea792d2142e511a1f53a3fbf36a4f325fadd275840846ce
SHA512816d8378a420d18c2b3b5b8ee1dfbc04ac5649f4ebd68c08a9e64155085dc2db3ded72c075eed1ac4e8d7abe071987d8a5ad2e9aa9233772a0b38371250a053f
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.3MB
MD54c04147c386ba8792ac6a03069572a8a
SHA1dda67789fc1d0f2469ca95f01a5c81034853ca6a
SHA256c7739a1e940a282703d06eccda7110426d306f390e97fdbbd9df18472fd132cd
SHA512a8b5a0b878a9a7d30cb38feff814e1f4dce24d000158edc10a43ee9a89920bedf7adc92eb7e3913098b6aab7fbd0531f56fc09f508b5c2769992a94e55d153db
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
7.0MB
MD551938f208ab7ce2700ddd9f763eadd0f
SHA15b2067861b34615d61276b0169537dd81f50f40d
SHA256ef536a93fbc34ba8e64aaad734d4dc75b87892a5798447eb1943c5ab0eae7fdf
SHA5128369c3b3295abe11c76336fc7448f86876bd6def39a27de9189bb93a87468e2fd2fdf68faca774eaa1ce72ed11090024039bfbe6dec36f72c620eb3114554c47
-
Filesize
16.2MB
MD5766d6e8b2ac2a61defa849814b1f44c0
SHA1b92a48b31d24aa6db3e228800ec6975462cd7bf0
SHA2565449ce9f4b87856fa0e34d8c66a9479fe0f721a680a401d9cb749cb407c1a0dd
SHA512afc1b772fdd4a9a3ffff993103541a0926f3f62e56c9615fc2e9a60bd7883f3cf501e815210ade7bd7318b8576e3d67cebb400e75ab7201397f7ca9f7bf58ca2
-
Filesize
13.2MB
MD5f9306883d26a61e861e7af3454297e64
SHA16b5a82150d717c78eaf40740f6cf4ed22eaee968
SHA256d5a19737327f30000baa349924660b7a40b585884a917905a11edc4292028d05
SHA512e720bdbe3e899e84ae3cece59a945efed66db220635f17d5aaa40447eed12a3a0710e8dd8e39d93ce7fbaf269a3149ea82dd9ed5642dfb7e5112b5da81d2dca6
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770