Analysis
-
max time kernel
300s -
max time network
307s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
13/02/2024, 05:15
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 6116 b2e.exe 5452 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 5452 cpuminer-sse2.exe 5452 cpuminer-sse2.exe 5452 cpuminer-sse2.exe 5452 cpuminer-sse2.exe 5452 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/4608-7-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4608 wrote to memory of 6116 4608 batexe.exe 85 PID 4608 wrote to memory of 6116 4608 batexe.exe 85 PID 4608 wrote to memory of 6116 4608 batexe.exe 85 PID 6116 wrote to memory of 5956 6116 b2e.exe 86 PID 6116 wrote to memory of 5956 6116 b2e.exe 86 PID 6116 wrote to memory of 5956 6116 b2e.exe 86 PID 5956 wrote to memory of 5452 5956 cmd.exe 89 PID 5956 wrote to memory of 5452 5956 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\412B.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\412B.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\412B.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:6116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\607A.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:5956 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5452
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.7MB
MD58b539af8be367c855ef8ef0c12c90ece
SHA17040cd1a4dfd6480572355787535c19acbcaf548
SHA256b1950609700987d2bd8fa731d2a85c249caa1237075f0757c8fa2e35a62330da
SHA512f57c1d92e93e4b81995995d9041ca2f765bd9a532d7847af8a73009d3293d5d36f17b8e4467192d0063eb5f63751381602a4a809a0544caa54783c3e6643295c
-
Filesize
2.5MB
MD5419f84713d9d955a1bd1b8dddcd4f5b9
SHA1e783e6c6b710b0134c11dd87fed22d1eb58e9ce3
SHA256754566eade5179c3b96435a76df0a11d03b82062427ea89fdb7d63819c779ed9
SHA512c6e6dd1e81a92aa3e3df4ea10afc8a35cc5628e995f07ef145cd7e7ae1b112052ef2accacee6a606634f8b8da54ae0384c932ed3aa5105a42e35d9b016c4dc84
-
Filesize
2.3MB
MD5abe7e384728f00f0802e744a36d35359
SHA17237d96df00bd39b76e5cba475eb2e50cf61e076
SHA2563d9d51102217f398285ddf1592daf53a8a1a01e7ca2676199f9f6de9c27efe4e
SHA512de8097b2544e9e2d12c7e7338bc22f9739965fedea172792b4cc02726c72708e83f5fcc9b6546025ba46697894357184a85bec764a42171dd9dc968c60d7feac
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
604KB
MD5b7dd7679c52d9b19bf47228b6a343233
SHA1ba3e26e9dd48178fbc28636dbf9cbd85c7733009
SHA256fec22ac58b775fa343068866590097c479055480c00c7de64566839114c8410f
SHA512ac68b69d474c8595d7188027d63fb6bbb717c9350f9438215edbf17b5ea7496f4aeaf12b6bbdd0eed14cb37e613f6e89b3d2e1fa03009e0cd8233ea2ce361f27
-
Filesize
1.2MB
MD5088d55e19cee70fd0d0a90fd30f28048
SHA152e3aacf49dc9c6e065dab50d4b55cc487448529
SHA256d1fa228045750a164fbb5a53b1081bf761a347532a13987cd9dc96af04038abf
SHA51228c175d59ed59af752beda57db09a400d65797fa23a816bde20d74cfe356cbed55798f243fe6651efe85835d68e24c02ff09b3db892dad67a4ed728cb9b89318
-
Filesize
581KB
MD59b1d39a6e736cd9ab864bdcde508b61d
SHA10d6ab1c3cdc4b47fb892e10f3903005ab3dd6d6c
SHA25677b1f6e39b5f43187ebc8a66fea03e8e2209c4cdec5233735a88c5ea21b04641
SHA5120fe5c7fe8ad3f8391b441831a2ddca2a81047af0af60658874079d7804e8c0f91a535648bd052f9489bee802e0ebcd3e5e23660b3c098070465d8ac083bd43fa
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
727KB
MD586a7c2e4b6374bda76dbfdaa1aaf9a91
SHA1b7a063bee538f2337bed8da434e3f8c39e933d12
SHA256733673d09689589f52e280e736dc29a963a2e66eafda860b73387ee4400a3235
SHA5123822be85410a8c8adff9fb302ffa291cabc6b36a4ef861cbfb022cdc6699e98b4d2e8f540359dd6a3945d944497c73016d28126dcc6a4405e87acf69c49834b8
-
Filesize
689KB
MD5e0e6cffe879713781d56b37a0dede6d5
SHA141591d8f24cb4da454e5c547065f09d6d17c806b
SHA256331ccdb6007669bc670c35f866469c3e0b550daf55fa02695b8f2814682f8197
SHA5126041f40c6d437ffaf28e785f53112a4ebc1813cb3204fe358c19691b647efd3bf0f916b40784654b5147c1faf94d88c4edb6394bf06aa80b30e48ac691c949ed
-
Filesize
654KB
MD5cebc44ac84f8e06c521d0306dd06f10f
SHA12100814ed018ada0273fbc378ada241879eb4f5c
SHA256305a2710a7be2d7cce1ffe67b22ed161bd902c1db2ecaec4b107b1645ddc47ca
SHA512435bdab8706922af2c78376b620cd382041a2fd1586685f6a690397867d0f26132e8c00d237294d1affd8600e746e41c000721242c35b70614eb689bcece5910
-
Filesize
804KB
MD50b9e050186d32cf92e9c0bada26b7d65
SHA1ae316df0b770981722eabe344184aa35ae09cf7b
SHA256b23bc8ad15890c0db0b169560efcc9798babd5ac79704243455a4d2968cd6bd7
SHA51245d85600a46b53b52b8da31dd581172a10d5dad2766933ba495da016014651dd7be9ceb0b916663c84ea81cdd563e035b03965eecba3e059a5ac4ec07a36e71d
-
Filesize
840KB
MD5c700e5c3d4834edcccbe46db0b2965cb
SHA15f5002d7c26f3ddcce537a24c758fdc377070d48
SHA2567c1f4897f29e5da5db233f71c740832a84d5fdbcfbbac421645396cd415b902c
SHA5121779bba312088d480003985cf56c2c8e91e60bdbbcc32fdd418b164f4c23ff6ee4150e0121e54b22ec94e8b54e3cc06883e6105501e7c4ffe274a8356a8f8075
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770