Analysis
-
max time kernel
302s -
max time network
305s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
18-02-2024 01:33
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 2328 b2e.exe 5424 cpuminer-sse2.exe -
Loads dropped DLL 6 IoCs
pid Process 5424 cpuminer-sse2.exe 5424 cpuminer-sse2.exe 5424 cpuminer-sse2.exe 5424 cpuminer-sse2.exe 5424 cpuminer-sse2.exe 5424 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/3120-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3120 wrote to memory of 2328 3120 batexe.exe 85 PID 3120 wrote to memory of 2328 3120 batexe.exe 85 PID 3120 wrote to memory of 2328 3120 batexe.exe 85 PID 2328 wrote to memory of 4204 2328 b2e.exe 86 PID 2328 wrote to memory of 4204 2328 b2e.exe 86 PID 2328 wrote to memory of 4204 2328 b2e.exe 86 PID 4204 wrote to memory of 5424 4204 cmd.exe 89 PID 4204 wrote to memory of 5424 4204 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\2F77.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\2F77.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\2F77.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3CA6.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5424
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5fdaacca64a6fe3a5391b7f50b98c0b02
SHA15cb7d460c152140b0c5bdad54df601c0059326d5
SHA256eb72481ff6f7f812f18a487f872ff371e8551a688456f86a20afeeb134806cb9
SHA5123aac6cb32161d4d534f5e5d06384572d430a0f0df2a47e41c60e5dd1a4c01b217e535c387bebe4ed6640a8074b3092414afe803df60cd6836f0385d528149667
-
Filesize
2.9MB
MD59317cafb85becd9011ca213e7be3a2bc
SHA11c84c389734da0532809700191b96dc61527e382
SHA256644eb7fd5f540a11f942d00b2233e715a40b8548294924fc054db1e08b293090
SHA51265120a9f1410f4b9350788c5898557be3d3b195f03b3425895748764fc052048f38998bb455cef4f25f748c696821a9a4622c8f09f6ae4603dcd6882be451684
-
Filesize
3.0MB
MD5a89710979887a9093dd8a8793d815a06
SHA165724d8d52d38af1be95c6cdd59c06ef39809192
SHA2569939f45bbf7a55da2a4162e1d0c7ae9844733c6fae2027131a7736d605c9a683
SHA5129167effb9113bc69289b6285b078ffcbc895e2c539c0bff2610d75ecad80f73d5b2764d771c7893c9d500535ca70b03789dd4262e83c567b855ceff2f37ba4ed
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.0MB
MD5a5c156136e66c5dd1e8dca44e96efb0b
SHA1a0ccf3eacf1a3759afa9dab080c47cc45b7b4665
SHA256cb60d57fa51dc30cf56b1e527b68eb0dafe25b9bc2f0e1f0892c72d03652a807
SHA51223313b7dfb54f2da6ba3fb763d6e23ed6d038a116bf0af70c799ae22ff3d8a1b264e73ccf72b2be81b82f075254b447ab8566e7096011d1df676cbff30e37498
-
Filesize
786KB
MD5be168e933482a31cd8354e3f125337a7
SHA12e7aaec5379b2383fb9dc86a1bf56579d67bd507
SHA25686c0f1e5dc5c9f328aa0e83429b5bc0788277631e815bdca8383da33cc261c84
SHA5121489dcd49e816aaae4ae763250c17a39ae99b794ffd0599090c161b5d06123d125c140813d65ec667c872be55c9939b6b2a17d6f6a0c84ab7bff3c93d8f78bb0
-
Filesize
357KB
MD5dacb5699b4d6c0bda0ee974a26308690
SHA13943838af58810a28e4c8f7fcdb83207026222f8
SHA25681e554e65cc00da680019c4e14964cbb92ec6993376542ce55ada9ca63d22497
SHA512bcce6fb6837cde8aa36564c1603c8903db75e59d5c20b61eff65931365b9e24f87e163f1f7a46c1937022e5c3a82c785d31c5b49b1df4926ce4cb96e8cff0a85
-
Filesize
474KB
MD5bcb2d31a64427e194c5dbeeb7b80c58d
SHA15229f5bb4b9beafc501f88d2524b57c856b11411
SHA25659bbbb4ea51b9d6a70ab695974adb185e5211b5174ae2b93a7ae0939ab716e31
SHA512688a70a2aa48ffcc761d6bdbeb1f0d2eda20771b583e3441aabc80414b28b49c203be315b75e439cfcf883e7fec3ef67d44d8c4226c7d6546865fbfff40e69cc
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
420KB
MD5b977d240c8b24c24c856ba2734aaec79
SHA1af8b5cd16493c4e681ede6ff89a4caa15117e82e
SHA256bf4edf100c17c94266495736a1a60846681cfea8e81e7519ddcc24991151f73f
SHA512876327b719dc4365e7f98f6f743f554139d4f1f92688a4816a071fe64f431be013c7b64c027c6de354230b2206510f08791f1443f9cee4349182da1c08035d5f
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
387KB
MD558ee97045cd58ec4ff89f300f882d553
SHA1ce8d76dda9ab4f1b6139003e902eec717a51811e
SHA2568402953fc55931e204b62943b5de3b1a84a001d1e0ff693a7e2cd0135325885b
SHA512a9bf8ab365e2ffeb57669bfb2f32a07dd0565b097b9b89d205b9d4e21b9cfd0f4ebd4b7a873ce4cbf7b7b6e6a3028530083f682f3ec853665872243ef36cdc42
-
Filesize
406KB
MD51c9cf6cac516896b47094ea3bdb288dd
SHA153b7a8586faceaf0869bffe32c67231d5731b1b3
SHA2561473f7cefa86024ad8260d6ffde558e1d7a1ded7ef630f527d2c4d9e198e7645
SHA51297cace66bbb9197501c83ae7c063f7092ba5fbf8235b36cd275df36031eac4545ecc69b61be6ce2899e89fc15cdad7e94500a1ee7e825a6aaf5af9aa27209a64
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770