Analysis
-
max time kernel
293s -
max time network
298s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
17/02/2024, 10:47
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 6072 b2e.exe 5528 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 5528 cpuminer-sse2.exe 5528 cpuminer-sse2.exe 5528 cpuminer-sse2.exe 5528 cpuminer-sse2.exe 5528 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/2032-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2032 wrote to memory of 6072 2032 batexe.exe 85 PID 2032 wrote to memory of 6072 2032 batexe.exe 85 PID 2032 wrote to memory of 6072 2032 batexe.exe 85 PID 6072 wrote to memory of 1044 6072 b2e.exe 86 PID 6072 wrote to memory of 1044 6072 b2e.exe 86 PID 6072 wrote to memory of 1044 6072 b2e.exe 86 PID 1044 wrote to memory of 5528 1044 cmd.exe 89 PID 1044 wrote to memory of 5528 1044 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\5DC0.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\5DC0.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\5DC0.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:6072 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6012.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5528
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
957KB
MD5263d046305d88a321a2c15e807b5e144
SHA1dc8724c8ff0d3f4d1b9668aef733d9ee8f419f99
SHA2561ff16405c5fbda781c6f61cfa6ebcc3d7ab3bd29eaa47ce24bc73b56f7189067
SHA512f07ab90e9372a86fccd9b6179224b260e0a51fa85e5a38cb4fdbb248f5993bdf65909d752a5acdf3857dc1bf1fc13a0107b747ab7b34890537b550f4850ae1c2
-
Filesize
3.5MB
MD5ca36d66ee14f1871a3b3ad489bff9493
SHA1cbc1ffe5ba79500b91e6dd2b1cf6cbaa1e821bec
SHA2564cbf6e7c7fbc2fb0b7b335ae686cc26d7ccdcd7f6dd9f3e2b4a168a42aa61600
SHA512bb6439a4af7324558ec9a5b947b82cbb5276a8427c28ef0e6d1382fb4722528054e41f26141470dc4176ce8e37ed46309cd69f1757b86836ec48bec5b276510d
-
Filesize
3.9MB
MD5d61671c4b5a1506f82c4387c48b6dc73
SHA1c3f4055401f1f7ac25f5e9d0595c703fd4b4f0ca
SHA25613945afd28d3228b9e355fe34f5745daf30be9d87ff3317b0f60c2e92a3f0d72
SHA512fa4e8271436d2c42da88fc9d3abb81d52a55626d7cb212de2a627d7bdf602bb62cf8f5096ab9a3f4c9ee87a1235d7f79ee634ef437bdae05a4eb3cd5a70bbfa3
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.6MB
MD516fa3cb783ff28393b65e1036a36ea28
SHA1acb20582d44536adbf459ff40dfd57f566fa2281
SHA2563797a692945a51167132fa9e730495e42ebb6ea67abc69621cccd9324f8d2447
SHA512a06cbe2d8d68a6dbdd0fea72087e094187afe780c8bd9b545f1479515e8b6b6ef2e535feb970dbcb153ee6826bd0a9fdc745a7d320e49160afbb9b8863bda8c9
-
Filesize
2.0MB
MD56475fda9f87b989077b7b84f1d96d85c
SHA16903809c5af1fb393440d4548a2453fd4d8bd6ee
SHA256bf4351b3ee6ce7f39a8d97d3706983d3a8d81152e9a686fd677fc49ae299bb9d
SHA5123fc82e9738d5217c038708b4bcf8dd7114ad8464bd20c0ea8a51c8e647cc4a804d80d1152bb89ab014f084b24d62d6c0b008f5fc9cb5bcaab968ea854704749d
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
2.3MB
MD59ae9df02fe2ec95db1d03b7fa2408758
SHA1ad759639a0308c7caacbb723be30b1aae0b939c3
SHA256bf06a85ab69ea26d472dd1f9b08985fce5e2d65082da5f11399e45726e5b781f
SHA5122ad4971dcbaaeffb3e1db252d3211dad6912f584421ad1836f62a86701300f9eb558504fb437b4f1ab3200e340d5fbe672d9c3f9afd1d41a6cabedc269422fc2
-
Filesize
2.7MB
MD5eefd3ace302b3ae0baa45e463348f02f
SHA1ad37c66d946701cca64640a93809b23fadbedeaa
SHA2569e189d6573a1834a26e804f7e36eb15adf6914979b4fedb63d44a32d0c85e522
SHA512b00aa111e2f5f6a7b6511592192aa395f447ead99c2086d7b01c7f31437156bebd4ddfbe95586e5653ef0800dc15440e0a3c328b1f9d1780802b9272d144e0da
-
Filesize
2.6MB
MD56156e0ee3c952b18dc1ece593bb7f1e3
SHA14acc3fdee76b7b7d0c7c751b8641aa24832877cd
SHA256b03b93f4237e69df27e6472a7e8358e38596dcf6b1bcb8a80774669c28145aa0
SHA51278020e520e8d84f46fc459dad142e72ed4f796161d5a339f16348e9891f81dfcb25a206198da7a76ff75da9d1482b97c48ec129934b59ae2a24892cef39a3628
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770