Analysis
-
max time kernel
296s -
max time network
306s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
13/02/2024, 12:27
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231220-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 3628 b2e.exe 4872 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4872 cpuminer-sse2.exe 4872 cpuminer-sse2.exe 4872 cpuminer-sse2.exe 4872 cpuminer-sse2.exe 4872 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/4612-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4612 wrote to memory of 3628 4612 batexe.exe 85 PID 4612 wrote to memory of 3628 4612 batexe.exe 85 PID 4612 wrote to memory of 3628 4612 batexe.exe 85 PID 3628 wrote to memory of 4088 3628 b2e.exe 86 PID 3628 wrote to memory of 4088 3628 b2e.exe 86 PID 3628 wrote to memory of 4088 3628 b2e.exe 86 PID 4088 wrote to memory of 4872 4088 cmd.exe 89 PID 4088 wrote to memory of 4872 4088 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\3CB6.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\3CB6.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\3CB6.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5484.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4872
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.0MB
MD54ef17d1d0cb445e496ad3d593589482c
SHA1a413497e5bde1792d30979725d79c14064c84013
SHA2560843bb939315ac3b60064bc28b1499ef66e97206a35dd3c925f2416c7aad0daa
SHA512ebc41ec07d26ef781141a257dc603ae4ad63a3edef8a90f74954e7279e000963b7e77a2afe3d336bad22881803d1ca0440cc8d9c78bf02af65a72a13df14d8db
-
Filesize
2.0MB
MD5fdeff16ca964a2e9a2203979adac8aef
SHA163fd594b64440d14c8bbb531f900073ca93d6f24
SHA256ec3b54b18cd56dc7a31df8ba96620e24f6ba98f305481e310b7f159ce544f7c7
SHA512e892709e7c3ff823345cdbde2b4be9f51b3769456baed5ab824bda5ae849dbcff8c2a5750c7db79baa9636eda2542df5df5421b6e8629c827fa4db1abc188e92
-
Filesize
1.0MB
MD52bbbf9fcd2cd0e188fe0a5e8ab25a825
SHA12bfe03613557697f82a8879ec9494ef1154b5f3b
SHA25608a5642b2863f6541a91b81445184d71098b672033ee87093b2677da1da47006
SHA512ea4cdbb17e2b004ac70cc627a2775acb8d1afde9ce3fbb9c1e09419080d4dcd312c5e1a29b9f3b89faed737c20d0260b272040eab18ccdbfc8d28b707fe86715
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.5MB
MD5d96df94e2f8c1cd4b43bd9d8f76c63e4
SHA1f7d3cf00e1e65257c16724e8cb53a48d16cf9d54
SHA256970a89506ad615a9f9a7eb065065454356cbf457ac08d49810e1b0464123ef4f
SHA51263dca1824db7f258c1cded1701c9d24499e8962c2054ed99b00a6e96cd5c3bad30dfc0e4669c4104aa87d670cbd4e010188eafbf1be7d0ecf19a4fe4e5ff5dce
-
Filesize
1.7MB
MD54a2b6a729b9f2edbdec954d1c574dde3
SHA1738f17ff8c2a25c19bccfa012b9b7ab4a627997d
SHA256944e2b930cc0cf01d7d18fb305cf93ab2c45f5dd22dd071f5814080cd6539add
SHA5129d0392d5f3cd5213e4970f2a9df7a3bcaff1a5c0e4a8e5ca2285d417d54eed2eeb444918fb5a0e319514e9c918007667ee1b3f6259e8662806ea53d7cf7dda16
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.3MB
MD5a70eaef5ffbfe90f87565cf0a5f4d323
SHA1f3f66e792ca1e8553cee9d96de65c9d5282c530f
SHA25667f4082e26495a0d1d5c9590d4313519cfa39e38fdcb00e2c84a19e4863130c7
SHA512d0013292aff096e2885a90972a520af4729eebf35a59ab204ee4008d4c76598aa9dd0496355ad8377c350c32cdba86967501ebbd9806c3bab69969683009b5dd
-
Filesize
948KB
MD5bbbf1f9d64e79d58cc298b554fccaf70
SHA122b8bb73a3b98995fbd163f36ed9a16f6ab0ad65
SHA25685982374ab61c782dcc58a1658c386c95c486e773e6076012fa0fe6816c5bb2d
SHA512eab636b8ce0f58bb3fb9e89f06bcfad9c6aadb82ca2b1789f486bb539f4bfa51feb66287228ccd6a6dc699fed3bc58b0d8413bef1b5a9c51d07f4efa5657679b
-
Filesize
1.1MB
MD5750ede41a68804d7e6432ce1668b6b86
SHA1a3e71be2294ad511afe66d9cc576fc4582b3a3a8
SHA2565792bafcd9cc6a7ac03b97ccd6d199d9ad447250c4b58e98816ac86e357ee704
SHA5126c19429f242cd5b42b1cc5898a3e09a65ed9f79f86d4d50d1b4da0e471d0865ee406e8849a6e107a29640ba8a5c23a8a4ba5a068432932bbff8f68eb443b9e91
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770