Analysis
-
max time kernel
294s -
max time network
297s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231222-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
13/02/2024, 09:10
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231222-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 3940 b2e.exe 3088 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3088 cpuminer-sse2.exe 3088 cpuminer-sse2.exe 3088 cpuminer-sse2.exe 3088 cpuminer-sse2.exe 3088 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/5548-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5548 wrote to memory of 3940 5548 batexe.exe 84 PID 5548 wrote to memory of 3940 5548 batexe.exe 84 PID 5548 wrote to memory of 3940 5548 batexe.exe 84 PID 3940 wrote to memory of 1408 3940 b2e.exe 85 PID 3940 wrote to memory of 1408 3940 b2e.exe 85 PID 3940 wrote to memory of 1408 3940 b2e.exe 85 PID 1408 wrote to memory of 3088 1408 cmd.exe 88 PID 1408 wrote to memory of 3088 1408 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5548 -
C:\Users\Admin\AppData\Local\Temp\5AB3.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\5AB3.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\5AB3.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5E1E.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3088
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26.5MB
MD5dd98c3bc0b0efcec8709f536e2aad9c0
SHA1524d5d4ed350475131305a969eca7992eccc371b
SHA256d75e59a75ebebcc7767257b0161fe37c1ddad00fee25e38d8c6638abfc3c7de5
SHA512705041d87fdc45ca4a8d5c29fd22185f17405702951c5c303f7db168ac2b9fa61246e1ff422ca96020b929ea0466a8c72ab3c6b9d9eb20a60b44d07727677261
-
Filesize
8.0MB
MD5fa6a9218a250f8ba79934cef132e74fb
SHA1b3d60a516e2592a1a3bb013d423289773a62a579
SHA256f8202a770ef777fce8707875f078d45a28b17c042f7105a07baef6524c353fde
SHA5123624218665b9af1e9214bca436d9ba93fa42cb40d867755fe19730b656cc80b27fa7c4162ecfa14cd549cf1de2513c7b7adfdadf76d82cdfd3e07f903cea99ba
-
Filesize
8.1MB
MD562b4b660e3c783708c9be313b0eaa45d
SHA1b9d506e5e3276fb31d0500eb06f4cb47facff33a
SHA25601b3e37df3324c3264cae3dd936b9af15d7d09ce81a4983aa0e9a878676c2ace
SHA5125dd80f7f369ff1a71c1c1ee9a745ec58f90cc2eb1f97ea7554040ff6a6319a45edcf798db5764213f1e816941297636cc1bd3f2aea613c22b3c32418dfd29cb8
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.3MB
MD54c04147c386ba8792ac6a03069572a8a
SHA1dda67789fc1d0f2469ca95f01a5c81034853ca6a
SHA256c7739a1e940a282703d06eccda7110426d306f390e97fdbbd9df18472fd132cd
SHA512a8b5a0b878a9a7d30cb38feff814e1f4dce24d000158edc10a43ee9a89920bedf7adc92eb7e3913098b6aab7fbd0531f56fc09f508b5c2769992a94e55d153db
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
4.1MB
MD5d6430f1d7a3f8f4d4256fc92ecc6540c
SHA1e0a54fff53e25accb35b2f1e5ef4096735f72770
SHA25662c621601f0124c9c99c5ec680bd3d45b2113dbb10384d504be1dff3326671bc
SHA512ed6a19a075d5e6610005c4eb031e012cda27ec07dbc1fbd982df39ba18a3d5e455f6a517b4fce3e1f48c411907e1c88372478a8d878e624160a01a490dca047a
-
Filesize
4.3MB
MD5ef7c7fdaf301ae2821b62e6ce2982051
SHA140699cf31dc7c5905e4001532ae69eebe0d49c17
SHA256c1d0fd19350af1ca037852482eac158a4f5786250bcc45b155ccf8c584a3eebd
SHA5129d61881f6735475a9ffbd4efc13c08359cde47b7fc0505f11f3abf7528d45cb8c5c288accf6e989e777c5406882e9d2b02e9cf2b4ec4836c024c5dc5d6f8285c
-
Filesize
3.9MB
MD5c41fb31260d41dd18ea8320ff2964bb9
SHA1be69f45f4be4323fd095ae62991b8f8dbd9c5a45
SHA2560b169d7324d31a24deb5a02668402a870e700a9232c7da508134890fa7f840bc
SHA512e68d516855ddc9e1b4df2b702f64719299853bbe8c9f084099f74d9f555658f6f83033bcca50c0650ef636e128806db88efeabbdbebbf094be15c436b2a9add8
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770