Analysis
-
max time kernel
293s -
max time network
298s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231222-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
13/02/2024, 05:29
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231222-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 2672 b2e.exe 2924 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2924 cpuminer-sse2.exe 2924 cpuminer-sse2.exe 2924 cpuminer-sse2.exe 2924 cpuminer-sse2.exe 2924 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/4020-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4020 wrote to memory of 2672 4020 batexe.exe 83 PID 4020 wrote to memory of 2672 4020 batexe.exe 83 PID 4020 wrote to memory of 2672 4020 batexe.exe 83 PID 2672 wrote to memory of 1084 2672 b2e.exe 84 PID 2672 wrote to memory of 1084 2672 b2e.exe 84 PID 2672 wrote to memory of 1084 2672 b2e.exe 84 PID 1084 wrote to memory of 2924 1084 cmd.exe 87 PID 1084 wrote to memory of 2924 1084 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\5D33.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\5D33.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\5D33.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6040.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2924
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.4MB
MD52217be731c43415bb5a7e99ec2dd2326
SHA1e1396e776f1416b84385809b84ae9ad580662d52
SHA256ef3c03144fb8f187f8f3efd27a43e5e477a558e2e2d7467f4ee3540d79b4fdfb
SHA512dfa9ffecc1dcdce00853b65320d4026fdeba483889b4fd446c92621835771d09ab3bca29cbba9cc8ee91728480705cb0d6c4c019c8a236b4cc4d98d36104478e
-
Filesize
3.5MB
MD5280b06fe35ab8fa5b4cd54a281fddd22
SHA136dab666a38140f3132dcaba79a972486d1785e0
SHA256972a76c0d2019cf10c84f1d28ac88fbc6b94f037b3d114ebbfb6129f80f264e2
SHA512ebed101e25ddb58ca4d6e1fbe3a676da18ec7246d3190ec7dab4ba3bddac29b3e532ea4a6277d9e414c8141fe502432e5da92efa357d366b7a3b384ec8ef2831
-
Filesize
5.4MB
MD5d2d21e4a5337b1b208a9f0c9a614a04e
SHA1aec0cc2306b4f206d677c5e6befa2a48d772cd58
SHA256891274973ae4486a47d771ad6d5fad7c90377dcb91dccb4e98f5b0d9ad153c0b
SHA512c7060d89337d618ea442d4c00990ba18484ffe6130233aa4a4fb9d0f41f722cefc24cbd6e188c10889bf3a94c6e35c26655475833c4a3e2a66ac3621fc418c01
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1005KB
MD59bbc14d303f7520d471239abe97697f7
SHA1304814c662619a037b1423b153e195b66ddb3395
SHA2569d199d0f50a749493e7256afdd1e7de5b8a7c3cb0666b88befa0200a16af7f62
SHA512f602fa4e3c8f6b7f9a5533b01bd9590a1c4e931cee7158a0d0562ba42a15fba406d25f9dc9200cdd23e2ece64680a1006f1dba30c3d163aa987bfa97c147b26c
-
Filesize
798KB
MD5713f2b316f8caf84381ac20b94101198
SHA11a6ad2540c137edd01e11185fae115d8ee2cab1a
SHA256845e3081e0f2d877b30d9d14b44bc2c0f0dd8e863f503b2765864341dd1b62c6
SHA51279eb7a04777d5b3e80dc8d42f9bae1fe6b40c59d9f958e2316b30946bebfd42427fd6ce27d67039e6f5ea81d3a84f0693ce9efa82cb0565f07cdc0817ca6386b
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.0MB
MD557bb5dc69ae15938b066bc2b913ad54f
SHA1b9304abbc513da169d01caab3665d9b4c2ecfe39
SHA2563acddf3962143565919acbf9965e1ce549c80075a7186c0a001cfa29b5ffc2f2
SHA512d9441aaed3d865a3f4276202dfa8d2b2d5bc2cf8d5e6a838e22756dce69cc47b2c62cac4103cd36c12a0bcaa3613c0bea912851ed4834d99175dad767f7279b3
-
Filesize
952KB
MD5fd3e74a7a98e9483b6c5a0eaa478db5d
SHA16a6c8caf9477d84dbdbbc5244d8f050693b09cac
SHA2561a22f2d0c3ebdb011940495900fdeada7d07d5162b858242a0916b1458f32e6a
SHA51211eb1d57784e21e2ed2006dc01c23158f2e505bd294602f154dc1fb4f54273a49a9feb3c5294e8b05da640dd6bebfa1ae3fabcfdb3fb2d9f1252d3264e3f5067
-
Filesize
1.4MB
MD57041dfa30d2ed4f4b58057c414de50fb
SHA18429dce1355d790937f27ecac9d18590fd945441
SHA256c0c1f00c1785035e90624b32172d0a146ea2fbb3edd29389688368ee82a2d042
SHA512c93607fcee150d528fc3255c9e95981612b4dd7562201866273760e08c0a59f3a0f93ef6753955aa3998c812878784af28dcd2bc3006a66abb5f1c906dfb6248
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770