Analysis
-
max time kernel
296s -
max time network
307s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
12-02-2024 12:07
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 5872 b2e.exe 5752 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 5752 cpuminer-sse2.exe 5752 cpuminer-sse2.exe 5752 cpuminer-sse2.exe 5752 cpuminer-sse2.exe 5752 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/1036-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1036 wrote to memory of 5872 1036 batexe.exe 83 PID 1036 wrote to memory of 5872 1036 batexe.exe 83 PID 1036 wrote to memory of 5872 1036 batexe.exe 83 PID 5872 wrote to memory of 5804 5872 b2e.exe 84 PID 5872 wrote to memory of 5804 5872 b2e.exe 84 PID 5872 wrote to memory of 5804 5872 b2e.exe 84 PID 5804 wrote to memory of 5752 5804 cmd.exe 87 PID 5804 wrote to memory of 5752 5804 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\A20C.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\A20C.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\A20C.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AD76.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:5804 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5752
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16.4MB
MD59d8c397faa504cd7128f5b9532524348
SHA13745d5116a4c3552873c324a5e5cb83d54c51727
SHA2560d49462ac075915eafbeb4f5f1b851af263ff859590482e722544179520d04e3
SHA5122b99337daadec67958045f43d4abb2b0a74d5877f259a2369d4f16f5308f4ee23e771f10964dbc8a1cf8533bf2da18711b022d686a833a2fa83768c07e31a7f7
-
Filesize
3.6MB
MD5a202c43df284047b4026052f2015b382
SHA1531129cc3cff7410080574b0fd1f8404c8c343d6
SHA25622e0189ee48633fcbb780d8ce081c027adcfd289ce6b90e0dddf506b78a59a66
SHA51203192f196ccd2100255c1fad56bd14019876f87509f7215f1af469e93a9e4a8686d7bd18a1273d46e05711d1017a87948b4299a6d4597fa66001b29ee310cea2
-
Filesize
4.1MB
MD555075aad2654558e78c79389d328bd6c
SHA13c49741995c4eedb25ab33cc269abeed7e5a00b8
SHA256778ee0f65897dd81fdfe44499a01fd879b1c237acb9015a4b8afe1020809e440
SHA5120060002f1ddd8ba3d108c627afb31818998a107e866db7bf1de6ce534e4974c520e8a4a34a0925c1ecac868c5f85543afd169b1ad77b81521b88049bf784ec5f
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.5MB
MD54ff74831f154773ce0f6437abfd0ba4f
SHA1b9ac1e63975ff7494e0f0ffb5146be8ed86d6e2c
SHA256df9b335bb9a475519b633674179aa216bf844b371df7b3c5823bae50d892e7ec
SHA512b972dda46990ebe84c68988a927ce74d57c0d75ba297d5ef1f938cd10eb8135a74e0dd5f97e0eea7a8301e6376ca90cab6782a8c8f3c7ef4abfef1eb3a08a524
-
Filesize
1.4MB
MD52af1ce05b5a790b134eefd1efd88dab7
SHA1b078e6f3cf7ee356e0d9b671c6d33f3a6e777524
SHA256ce4cb4f4e60a89cbf413622a7f96f879ee15256d4ed5872ccbc3f2b366369fe3
SHA512bc08666b4c96fb98b1e1a9db0ec10c5bbcddb82efc4829d65057f765a37a24f6e28076300dcc3f07c0b547b563593232f90d959607ee6a5faca26b27364cf695
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD58339dd854ac8acbd755c7be45d3534c0
SHA1c3450b51184637d82c27987117ed85c49f1ef097
SHA2568e848628061dd11dcc386118b70c602aa51458bf1ce865c84752af7d8bd6e61d
SHA512620f53d149dc4a1a240fce6c3baafad84d3a132b28493560a3e090911623b4c63294b0dc389f0eaede7d7007c55fab69b2d4a4f8691d0fa2de8312ee828e38a1
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.3MB
MD5696922f5250b5df33813776816103357
SHA16f6e4cecb16596c1ad0e631c7ab5b56659da1ca2
SHA2562802e69b65032d2cb76172ab508766f8a2b2beba9c2cd84dbf7c28fc9cbe1c7d
SHA512dcb8535a83f321561241432304155a2e2a18435e102785a5789bd3a9ed643f153fb63ca797c8ca798d2d85927b29375048b43b0ef0bc4cb00c1c96b5822e8ae9
-
Filesize
1.2MB
MD554f6dcfcb4692afd139e7d2c65f0c5a9
SHA15b7a54e17eaf1d7df1b0979427e2ebe29e3b4784
SHA256c71110124a2c6fbec5e8a197d92632d1da656853d21e72cc920e300c78f44037
SHA512b8489b186aa3afb7647dd1f6dec3a2d5122c42c95a2dc2b160692c079d386e011dbc6925c0fc2a0af60003cac27ca374bf8fc649585c5b61f406c9b39739f85d
-
Filesize
1.2MB
MD5e5ad741b50e51cfb77f8bc80e669acf4
SHA119a1ecff5b7aa7008d0b1d70dc2aa4b1b2ed9e86
SHA256c9edf0f5691a3cab0fbf0d94c28b2dccb6e155e541a871b29873aeeb1a7f1c1d
SHA5121342b8d883586a5946bf83d6e31a4a078dcce1651a0ed2eabe3d539adb1a3b0c14f821161f82b228a3d3814bf39bbc401ffd5128c80805afd8cd4b37bbf04e63
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770