Analysis
-
max time kernel
293s -
max time network
307s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
17/02/2024, 07:13
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 1436 b2e.exe 1824 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1824 cpuminer-sse2.exe 1824 cpuminer-sse2.exe 1824 cpuminer-sse2.exe 1824 cpuminer-sse2.exe 1824 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/708-1-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 708 wrote to memory of 1436 708 batexe.exe 85 PID 708 wrote to memory of 1436 708 batexe.exe 85 PID 708 wrote to memory of 1436 708 batexe.exe 85 PID 1436 wrote to memory of 4568 1436 b2e.exe 86 PID 1436 wrote to memory of 4568 1436 b2e.exe 86 PID 1436 wrote to memory of 4568 1436 b2e.exe 86 PID 4568 wrote to memory of 1824 4568 cmd.exe 89 PID 4568 wrote to memory of 1824 4568 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Users\Admin\AppData\Local\Temp\3F27.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\3F27.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\3F27.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7589.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1824
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.7MB
MD5a35ce7b0824a7f1e7cd9400e48206e7f
SHA1d6fb5ff7e432da1240879e4d15954cf3983b155d
SHA256e1796b677894070fe0422f1602d407d89bc4486e7c20a5151ad38f8972d07579
SHA512fde83121d29220e1e35631bfa26e11d4fa0a9f7e50c104c1adccceabf2b3d4a677c62025205fa7184934329b7a5d2cf4c21747c284cbfe035d178c6d9490075b
-
Filesize
3.8MB
MD58782954c8b6aac082ecc8b96cb0fa380
SHA12fe2dfb712df083d04ef662151f7a323078cdbaf
SHA256472a521487323090d233b2931089d485be932bb7b1df7cc096c8b498ff04a73b
SHA512d8a809cff6a7fa2b0762724eabda592db73e20311c184937574671be8cdff033ed4b9886992aa225aa923449c5a5a7949bcd5194ac26972001b95349506beb31
-
Filesize
4.6MB
MD57d7868459691a2c328873b785a431e5c
SHA16c3ff9e0d21a95df0900c498d1bd6b29b6a780d9
SHA256fc1461f288f8798085b382f92a49c1f41127d18a15ff96d5c772f58a34c032c5
SHA512e6cd8ff58d9b05ea241678f213047b679b1df9787d5f3608015764a4bf3b46bfb6c76e6b6c7407cde0c1200d5c95720a602a857710b3fe615990f4cab5269b63
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
704KB
MD5ce5f200d2d48a057722a957d5acc6426
SHA1e7a8d4c0dc7b561dfa26e3fddaff015716187305
SHA256cb450c8c0a952560f35f4b93f14357fc3856ee0b016eabf8bb4d20e9504d82df
SHA512e7d3b203cc96d08b6d000f6845bbeb5777cd08babadbcb86266193ca68d8183973b3a92f5cf587df1f26bf04a182fa51001b7317c9a9e7ba868d1e26b897ee9b
-
Filesize
732KB
MD507046b6ca28d7b1d36c8054e94e9a097
SHA176f615c2b700b3473415ebea663a0f0d544e2c1c
SHA2562ccdd9eceb938ba68bffb61dfc699ac211cba954d1d1e455ef320b4c336db8f3
SHA512500caf6ced59ccf66114af674c27a2a0b44197d33d2e3ad2a09be74079d65a7acdd6eca2f0ac10d2b636988552c70c781305f99ec26fc006d58ba3bbb04e0dcd
-
Filesize
558KB
MD5763704b90ec368e1a4c6553b7cd164d0
SHA1411ba424f7627106fb754550551010cf7034bc34
SHA25619323b173e37afef616b4c066e8bd5494c0f4c99d00c4dd191d9a35d745740c5
SHA512b04ead7876cde2509f369721f2d75c23a7a0ec199fb82a1c4c1b9805c0c813ead0f312526b7abcfd510c09d32b58926ec186b604a8e52b8010a9327393af42af
-
Filesize
419KB
MD54e522aa9f72f5a72931e5870eeccf63b
SHA105df555f5fca920ac58612857cbacb8c553678ed
SHA2561cc24346599e0e47901e78250bab144cc4a6da779593dbe0a71fcfb591e421dc
SHA512786b71b0305053dd5622c29c6976169b51153747215e798ab956173ee93694187eecb9c3daf9b1ea989fd60ce4d61645e7e13ba9fa2b402a7c4b1198511b46be
-
Filesize
640KB
MD5c3b7be6dddc3a198de4407cb54c1557f
SHA1a940462362495fcc9d06f0b88b9dd8850e11639d
SHA25689460a0f4113c03c6fba760bdaf02e8df6f92faeb8c5fd228472ef3324be603b
SHA512371ea6fdd6a58ce3f0c3f3b53a8eb9bdd37edb248f85b11608ecf37845f70c6a39ec5cdc8cd73f36359e34220e87dfa7efcb74d8b1b3d86f606d99e83be04cfd
-
Filesize
560KB
MD593be5c2c7e515bf6d0c79a9fb99c4e9f
SHA133662e1dbd6be617ac21db8375d5735daf44bbe0
SHA25673f9a1b5a9db54681544e764d6b00f2e9324b52fd090e9a7bb631eb87fbfbb96
SHA5125011772083c372c16d70ff53bd7888915f160fe77dcfb2253eb2a1165bef7ecb740ce15fc5691d7c8e449a49bb59a9aadb6f13825abe107469b006a1aa93d141
-
Filesize
1.0MB
MD5d481aa932c841b476eb94abcc1c9b580
SHA115845501d2a3e007247d980320a2db8081ed5734
SHA256173d3d9e487b64ce6c2949fac6b1d192a260694955cc482e457362546d89e594
SHA5125ee549e1baecc5beb612b09b3690d40cbd5bd5a5266637f0822bd558f63f3aeba23c22caf5fe42a48c51a79f1a49e465b4fd9e53a656ff1d278579e5b2b632a0
-
Filesize
109KB
MD52d554538c011b996edd5756fef9abb26
SHA1e4ef8de5fd2a1fdaafcbdad630bbee158aefa672
SHA2565d3883c7cea1aab81ea63dde17295356d03562b7ce7aaba813d2fb55c4cb81ac
SHA512a6b0c06caed34e8b0079420967e8e4848695a4ff1f100688ce14db5e7567721faa2820ee265a9113939266c2001cb1d80b3e8aa9be51a79efea696c16a74c03f
-
Filesize
119KB
MD5212653464f0fe3bb0ff7ea12f0f32f95
SHA1a631061b3962366b0d70be47005aba77ab3bcb4a
SHA25695358b390d48ff5667f091623861c3e0bfbd61945477efcd4371361a8f5a4997
SHA51255f18ea64c588c4697492cde21ebf88984805de4d42172f8042c5b84c3ee7245b34662132101c116b48371fb9d9a97ad0e139722ae57f8810f862b566d244e1a
-
Filesize
413KB
MD52706a70dce973eed18a55469fdea84ab
SHA1bd98bb0000769afb8de6d6e8ef6b75c2ac201286
SHA2560241a4bee39c7066bffc13d123804e0ce4166f8325d4690b014b96fa92cca57f
SHA5122a543e91d73b793024e2d515e87f3b3ffc3a8a0e7b315add65fcf705f0611ef5f05eb464aa401b320675cce6fc055602eaee605c8f49217ba8f62b4cfdb5686a
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770