Analysis
-
max time kernel
298s -
max time network
305s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
17-02-2024 06:43
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation b2e.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation batexe.exe -
Executes dropped EXE 2 IoCs
pid Process 2328 b2e.exe 5408 cpuminer-sse2.exe -
Loads dropped DLL 6 IoCs
pid Process 5408 cpuminer-sse2.exe 5408 cpuminer-sse2.exe 5408 cpuminer-sse2.exe 5408 cpuminer-sse2.exe 5408 cpuminer-sse2.exe 5408 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/4756-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4756 wrote to memory of 2328 4756 batexe.exe 85 PID 4756 wrote to memory of 2328 4756 batexe.exe 85 PID 4756 wrote to memory of 2328 4756 batexe.exe 85 PID 2328 wrote to memory of 4860 2328 b2e.exe 86 PID 2328 wrote to memory of 4860 2328 b2e.exe 86 PID 2328 wrote to memory of 4860 2328 b2e.exe 86 PID 4860 wrote to memory of 5408 4860 cmd.exe 89 PID 4860 wrote to memory of 5408 4860 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\2EAC.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\2EAC.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\2EAC.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3A64.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5408
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.3MB
MD5792436b8352cb6bf7879316e8489c5e7
SHA1dd6efb074a7f667e5cf992c0d849c97c9017ea4b
SHA256408e08e6fa64469f4300ecefae08af44e98f5ab2912f7983a5d3f20e323cc2d9
SHA512e3e74543eeb6915341f16ea09ec2ca662934427597bc2cbb6f0e14739bfb51b58edd7bbcffbbbdd2305f65ddd430706699220490fd65333bb0982174e10a392c
-
Filesize
193KB
MD5bf8546c5e8efb5b6616b05246228c7b2
SHA1c53bead6f6c29d4f1c683c95afed931c3e756a5e
SHA256ee1f483ea5b346e1ae0314a2f9ffa873177010ed3c0154c6523e0dcc9698b764
SHA512cd42d65ef1887882e4f1e35a04d0dbebf571bdf27e288dcdcae59dc639030980eb39f779256096c4800dae35caf483f5e188fd85d5591cc5ad698659255adc9b
-
Filesize
306KB
MD5c3d402f9996ab4be47be7258a4f5d43d
SHA1ee5f247bd911090563a11d8f46c812e4d5dd061a
SHA25694d23f27705b37d7266af38e64de737b2204a748215e4693457656a22b591d82
SHA51209c494833238d246753d37337fae4d7565ec991d865f2adb0c5dfb209ea456b86e544a83458dcd7f8f462ab02dc62f17e5d9a0851782e7d56183009e50b024c5
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
629KB
MD5563117361dffa98c4dd3c2178c0305cb
SHA1ac45545ebbf875e0325c6857ab413b554bac2fe9
SHA256dcb98162ef3cdbd56b2b0a09fed1c4c447def49473a57ec9ef241bf72e237457
SHA512a9de74636e6edbdd96de20949068ae0b3c8c2162a3bee91e44d9b9067cba18bbdbe642f46259a0e77b531e66b6c11eb59891ad3596464d206786d3c869cc76f1
-
Filesize
594KB
MD5ab42eb52d1749ab841e87e91df92d54b
SHA178eae5d55c93272d3d34fbabd5803c4f5e065a93
SHA2560d662727ff46d7daa49b0c8e7905231590979b3d72f5fc11f5eff9510e6e3191
SHA51287223052d0efdc4dace332a7ae81497adc07bf433dcd09326fd4367c63f3804e9319da964d662f6fb64d4ff3bbc0d6748d468c5b0716cbe98daa10d4a9907f56
-
Filesize
640KB
MD5ac7d1c3bb4d3c69372907331267c1ee7
SHA1fa82689799785ef9ab4c304b1c1a6d2d9a961928
SHA256d22689ab67764158df7b19e8d78ec1393899f21e390f469a300975a31106c3aa
SHA5120d541661060d7c5eed486ea0377142e7d3883b3c0935114679af28bcae0b1767585fe06328955cf59aab4fe3d4acfba525dbc42675fbce80b7d0b2300784d125
-
Filesize
380KB
MD527f293ff7d66c179acb5741a860fbcf1
SHA16b177a8affaeefb01906537419b525f1ee717e38
SHA25637e4b9fe1f546a5577974499017897ca399e78d4df2bba00b24c4ea0bce4a8e7
SHA51255969588fc11c4f92cad65030bf85942b0d9c220386628a6548211092077a11d2cacb8dcf8e3fbd863a140ad6a77f6ea8374315ab5c0cc5c398ae803b6de8362
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
728KB
MD521f886f67855df4a81865664c8ade5cd
SHA1e3fa5a76fb204af06f95946cbab2fa52da708a8f
SHA25636b89f087630319e99e08dc9c1d66f7ba32a82c2effe56eec1118d9c93f671bd
SHA512e55695b2699eb90cae80b7756c16f450b1cfd33287d2a98041ce4054be773c62c17f57764c40d61820ee586120d4b78c3531149fea52c728fccdc6b844b0d9fe
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
554KB
MD5932923269c893a60ef0030776af588e3
SHA1c2a07f9560e54828d5a3dcdfa2b6b5b6c7f4949c
SHA256c4677a9e7894860467062cceaf67dd5669f2acd3d00d6b67753f44e0bfbd6552
SHA5124fa02cc853ccedec5e66fab54348ba1d4b7da65c6e5d36494874df83fc6b925b34f02c36d46ceec4c6380c1ee67a03c3ca36aa5d3625cfee294dac61e007f11c
-
Filesize
670KB
MD573debafe80b9f9fc074636c0b2476254
SHA13160b6b11857756b5b17a0b88cd2c2b31153a410
SHA256d55a66384fc46d061ed6cdd712f13e628992ac8a33c74375fd4469310b4f7f3f
SHA5129b77c70714248336851f2ff63a11c849a49bd7b45c4c8cc0fd15cc907966491d3a3133f2dee30e723cd2006a4bc5580fe05e5b07b1b853b358599d6811b2c0a4
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770