Analysis
-
max time kernel
300s -
max time network
302s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
13-02-2024 05:03
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 1860 b2e.exe 2404 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2404 cpuminer-sse2.exe 2404 cpuminer-sse2.exe 2404 cpuminer-sse2.exe 2404 cpuminer-sse2.exe 2404 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/5076-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5076 wrote to memory of 1860 5076 batexe.exe 83 PID 5076 wrote to memory of 1860 5076 batexe.exe 83 PID 5076 wrote to memory of 1860 5076 batexe.exe 83 PID 1860 wrote to memory of 2080 1860 b2e.exe 84 PID 1860 wrote to memory of 2080 1860 b2e.exe 84 PID 1860 wrote to memory of 2080 1860 b2e.exe 84 PID 2080 wrote to memory of 2404 2080 cmd.exe 87 PID 2080 wrote to memory of 2404 2080 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\8DA9.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\8DA9.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\8DA9.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\97DB.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2404
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17.7MB
MD5e59d33e8f081452b10be341e86bff667
SHA14d6572b1f8a45176908e61c0070e5ead19f3e2c2
SHA25686effbb06a8d6214a3bf5fcde3fb84384cfa43151d72e7fbab1b331df83fe16d
SHA512ef2ccbc76d3211f82b2d003e15a072e1b5ad5a60e6ee9a7b2943d74b5d62c5a9c1877a6fba7b6ed6685b8ad2dacbf87fd358b99a1706f18c5c03e87c3d4d57e0
-
Filesize
5.1MB
MD52a717cabcbb60f293002bf30828d27b9
SHA13329f5a03f6a6b9185a20e6e48f6d0304518c2be
SHA2560b64f36a955a38b1a256094758035c21cccbe3de50f05ceb1efb767bca5f7b56
SHA51263163026e7f7c60578710ea56fb4ed1f23f231ea15654eb7ac6b094bc3f8e7fc99eec41c636e2137603ca651abea6b08b3fc6dfef30aceaca5151d866899b06c
-
Filesize
5.3MB
MD59052fdb24dd5c4b87faaa785c836d7a6
SHA1f300f1f81a4001d1f8ae4196acf5a615fb859d21
SHA256adf48aceaa3e2c7b9c55dcf36c9ef045f2f36ba5ee3596cee31e560e3323f60b
SHA5126b4b6e3ebaa72cca6d091ead4b64d70ed06d6900e5aa56d445a2b5e353b29564b724047fd022766f85eb45caf3020a2109f81c55986f5fe1f96b48cf5399954d
-
Filesize
2.3MB
MD54c04147c386ba8792ac6a03069572a8a
SHA1dda67789fc1d0f2469ca95f01a5c81034853ca6a
SHA256c7739a1e940a282703d06eccda7110426d306f390e97fdbbd9df18472fd132cd
SHA512a8b5a0b878a9a7d30cb38feff814e1f4dce24d000158edc10a43ee9a89920bedf7adc92eb7e3913098b6aab7fbd0531f56fc09f508b5c2769992a94e55d153db
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
4.1MB
MD532dbbfd7b361038a50e9b5bb0278e3a7
SHA1903462e1ff67257defc9738148a8fc60590e4de3
SHA2566119e724050dcabb90de066256c1615072ea7089e8259d40a1e66c2d4b11bfbb
SHA512d82ebb17c2c86fdee0469e3ec2faf94d63e1e4aeab2e0ce9d74a805ec8fb381a4dbf4806ff3a4c464f6a199fa70164fb823d3301967efbf5a2c30d8e09e8adc7
-
Filesize
5.6MB
MD5ee1dd80d0ec47b61e2cfbda65eec7743
SHA14e6c2c67a032935c5e68549e0fecb1dd288f061a
SHA2561fb53c5617a2162c323dcd1f375a8f9aeef0e2ce04232d909f6c4e162a567b15
SHA512bb00a74fe926d58169783f20c698586440e4255f478f1199b007a42b607b5b58779053671021d99b967ed8ea274ad50681663d3288e82cb0d44ab5b66fabe955
-
Filesize
4.6MB
MD52d0313a655440e87aa3c0c928026ee16
SHA12275a64c92180d88e646b8852ace630ee11ce085
SHA256b94d18754c2d8478151e0d73faa055fa69da602531d4891d9ddcd2a65124409c
SHA512a253fb7c977895a6d6cb508729af9b4a06d85f24c62a0b0fc0baa2b4e463e0ba53416ede4a5f9efdd244e3a0cbe99732b07b73d2eaef2a02ca72b064c00569a8
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770