Analysis
-
max time kernel
294s -
max time network
298s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231222-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
18-02-2024 01:29
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231222-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 3644 b2e.exe 5448 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 5448 cpuminer-sse2.exe 5448 cpuminer-sse2.exe 5448 cpuminer-sse2.exe 5448 cpuminer-sse2.exe 5448 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/5236-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5236 wrote to memory of 3644 5236 batexe.exe 83 PID 5236 wrote to memory of 3644 5236 batexe.exe 83 PID 5236 wrote to memory of 3644 5236 batexe.exe 83 PID 3644 wrote to memory of 2160 3644 b2e.exe 84 PID 3644 wrote to memory of 2160 3644 b2e.exe 84 PID 3644 wrote to memory of 2160 3644 b2e.exe 84 PID 2160 wrote to memory of 5448 2160 cmd.exe 87 PID 2160 wrote to memory of 5448 2160 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5236 -
C:\Users\Admin\AppData\Local\Temp\5D14.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\5D14.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\5D14.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5FD3.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5448
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.7MB
MD52c865640694a7c51e65609b4aa0cd4ed
SHA1d511ead16f0ed77c0e986b7b639386e7fde8166a
SHA256a3e40a7e5baae95fa62b639fddb8c4449c411900128e17410b12fd164f9d50de
SHA512fbd7cc0d6032f01195d6be88ec8135e3bd6337fde04f4c4e49a35163a2b778bc85f15a36c8c98cfd8aac6762fd44e8a98bfe8b4a2a3fa6dfdb3cdf42bf58b99f
-
Filesize
5.5MB
MD5695f881d37c8fee6ad5c20b54a5d5dc5
SHA1e407f78585ff4b7fb5e1bfe1fbce5142a2a87ed0
SHA2566f3405908b735a3430f12473b357239fb0ff6f9b5fd1475f48e628bffbc074b1
SHA512c10610d33e5b8a804858138ec5640db49817e341051a7cb95d746dd1f472529ab039e5d6aaedc090e49a6092811db8c0f8eb05fed75ee435fa4c549ff7b11654
-
Filesize
4.2MB
MD5a9fa1a3698f8783ba4b99e08096b654e
SHA142fd65fe46dee88805baf3b9b2ccfbb5cdbdc095
SHA25677d5fc430b5ad47e745a2debf92019dd98714355e6a22ff740b946d8ee5348cc
SHA512bd3ca56db429f4d8d1b08cb6f1acf339bcd9dcdd9a6d70a3473ee48da4e12866d48a33b73aeaf380c453bfdf982c2a3e8749091a8e7485a05f6f3f22b4a52a45
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.3MB
MD54c04147c386ba8792ac6a03069572a8a
SHA1dda67789fc1d0f2469ca95f01a5c81034853ca6a
SHA256c7739a1e940a282703d06eccda7110426d306f390e97fdbbd9df18472fd132cd
SHA512a8b5a0b878a9a7d30cb38feff814e1f4dce24d000158edc10a43ee9a89920bedf7adc92eb7e3913098b6aab7fbd0531f56fc09f508b5c2769992a94e55d153db
-
Filesize
128KB
MD587bb74a6790018700645a8310bb9a32a
SHA1b0e3e91efa12e0df5ed4538d3b549ab5d9f6c16b
SHA256ee6a846f1dcf082d5216bf314e65e1428af13ce54dfaaeb371d1c54f330c5298
SHA512702e12a0858a1dd987d6a761f0ddc88fee9bce38be3d71f8c9be3fecc8cc6e88763967140f83caf4f2e10109ab95b811bb70bc70ff0b5cce8f0f32713ad3683b
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
116KB
MD583b6821fa1c858f802fbf4114ffcf1da
SHA14ec3f7fb4be82c19c7943fa9dc0503f1f4f99e58
SHA256bce651b25bd75edc7725f7c41cc57a0bed2d85d6d96862bba498cfa1f283a817
SHA5129d9d0a1fb626ea5a86ced221d90c39323e78472c97b6e30ae4bbacae6c7b058949e7bd76e96bd67b43edb8b0e31292ef682e10aae0976ef74be0ecfd93552b52
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
116KB
MD5db9f8201b09978cdd502a38117e57edd
SHA1509b79675178d3ff7e049a9868354621af0d420b
SHA256317551401ccb0a1b2c8652778558a93d63910029c0ed2f8dd1cee4ded6598794
SHA51284e9ea836c3517c8fb25e113cfe9ceecb96e639285cfeee80b3040684587943d6dd24f7795c3e863efff99428640c359891a66701ee6955ec010d74286081800
-
Filesize
9.3MB
MD53668f87b8a430b320b3e00e03c600693
SHA17e8ffd62ebee46e716f7f7ff74cadaf416e75cc8
SHA25600548f4a7f23a1ec02837ee38f3daf4b27a97e9d198a458c0b756656ed8bbc01
SHA5121f077d27ead0e561b49c1d26c48016a6fe305f472f60b18a5ad4c8384efc770ac1a68d23de0593ab8324929dfcbc57f0590c99dd743647459f841cf260081db4
-
Filesize
7.2MB
MD5722a3d956c203edff91eea584e1b187d
SHA18db72c6b45f4e91dc6158150626e2c23c7880329
SHA2565f6614da8298d07a4a519108cdfecaf78e74bc219b531f05e609b40496be9727
SHA5129c38d361c47539880533b4788a2a46008380b3d761281643e1d6dbf0b34327ff03b597e7286cfa01990368ad1c2d975bd1e83b4b787f182e8bc4c503e3e5ee5c
-
Filesize
116KB
MD594ce55cbf2e0631766805e69da5ea80c
SHA175fd7000970956d6cd1f10b0f851fd6f1fe9c12e
SHA2567ba3ed284b0cf7b5a7cd6f9f5ff9e8e512fd4af2ec93fb042f42f12d7ad02639
SHA512c227a31ddba899c0f2e91d12d88f0135717d09d659854aa4a8c6193b729ea87a3f608f6ab5d05d72ce55d7730b09c170b661a0f706e393cc773a20ad75094f74
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770