Analysis
-
max time kernel
293s -
max time network
300s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231222-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
18/02/2024, 02:21
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231222-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 3684 b2e.exe 2260 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2260 cpuminer-sse2.exe 2260 cpuminer-sse2.exe 2260 cpuminer-sse2.exe 2260 cpuminer-sse2.exe 2260 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/2508-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2508 wrote to memory of 3684 2508 batexe.exe 84 PID 2508 wrote to memory of 3684 2508 batexe.exe 84 PID 2508 wrote to memory of 3684 2508 batexe.exe 84 PID 3684 wrote to memory of 1360 3684 b2e.exe 85 PID 3684 wrote to memory of 1360 3684 b2e.exe 85 PID 3684 wrote to memory of 1360 3684 b2e.exe 85 PID 1360 wrote to memory of 2260 1360 cmd.exe 88 PID 1360 wrote to memory of 2260 1360 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\954B.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\954B.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\954B.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9887.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2260
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21.4MB
MD5035559c7e691fec0a7c8019a6bfe9ab2
SHA1df140c85d90a00c3e02ab2394fbf7ee53b34920a
SHA25629ea40671c968c52f7b3ed437a93eed665738dcf1ce398dfb2f496476da0641c
SHA51219938b1bf7024e6f7773ac987235170100995a7d6a151666694e2341c69a16b86aad4539b8ef2a6a5944f0446d65bb604b4fe10ceaaab9dcfdad5a5cd061b38d
-
Filesize
5.6MB
MD5d009ea00d4e481b5cc36d8b9902ebaed
SHA19ed7f0293eb58a29c6bbb5b93a18f4c030c63212
SHA25622b6a093155754f8007ea4e1814e299a927d3a32187eaece9cbf13b228b48bbd
SHA5128f98ab491d94d63d9841a7ab7cc0c4842cae342938fa710dafe00cab6c8b6e044b1bd1b58df7854c08672529febdf225dbde5a3c71733f7d91ba9185dd4a5fc4
-
Filesize
5.0MB
MD5a8b293ae6f5bc3c84d8e7b0542c04aed
SHA1bb24178e67dda519de445041dc9cb0896d445370
SHA2561c1c50b3a953b88e9764986f383307d68a0818aac7556a9cd041aacea446d532
SHA512117a77b2e3569adec6ed181fc2e0de11a0d506c4333fed6bacbdbf762fc2d94d52c613c4947ea3e590728a3916e62ee999cc5162aa8474b2b5a3f23ebb5cc387
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.1MB
MD5b62f47da8bbfaa83de747b085ebd72d5
SHA1cd8c8122d389050723fea2fd23b324a298aaba99
SHA25621758fb7636e738d55c453424701a106ba9f974c53ea980dd5409363646fa390
SHA51226e12b30b4f619139d3121242bb5d46cf46415989e14072a55332b84dc215e987ffd5b0d3cb8a9306cc46204fbfca6d67f7b40f1a9e91be8f86551720c57fd78
-
Filesize
2.3MB
MD5c31378971458a377c28b444066921f8d
SHA1ecb17b842bad5f680cec272e21d44e9c52c30ef5
SHA256d303d45a87f4db1a41cfcceaa63de56b572172baa4e2f64b51f9a9466aeba2b5
SHA512521f10c8e6ba69693e87e58113b84d0487b2a02d048f85dabfcb3ee98df805333775f748d9b66b0182a7e7ae0fb29a109f331120e71f7850cc19fc4cc8b2e7f6
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
2.4MB
MD5174ce112c595b33862918dc8c0daab35
SHA15cf11c1b18f4fc0f06ec7fc033b7d48370869d1d
SHA256be3c44c0d68d67f918eb41a9fd74fa41982aaef3ea5f5f4490f3cbaf83497550
SHA512096270900d70c17fcb764cdebf69004450b195ec52b9e92c020901b93237333c29bba31bffc843935369271efe21a6fc3b2a0f11cb2b66eed30f23c228d4ac22
-
Filesize
3.1MB
MD5986bbb52fba51065aa209de396e2fec7
SHA1778fb0302cf75d503df25ffdea380ac4efaf848a
SHA2566bdaecd59fdba5eb8e9a6bc3dd813c974f9d7994a7dcfb632471ab42df3595a8
SHA512128e168acc73ca11f60b1f52dfdf874f38b5f5a08e050dbc5f61989fc1f602c13e6d574b69a7eff9515fd301e802765bf7ab785dbf60cb651bb940473993862e
-
Filesize
2.3MB
MD5138b008f0b64d70154b499c633bd9239
SHA12c24c6937fbca51920ad2b06551cb228770b6e17
SHA2562d551f5610d56e0172aec7c30ab51f75ffd3fcef7a58314d2ee53659db557086
SHA512935c08e1fc5a2fcd6cb34dee300971ecf327f050a4d5ab7a0a159b1c1c95c8148f0dca795f428422de5ba988226684a6a848e64fdd5d57632108709e9fe969b7
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770