Analysis
-
max time kernel
293s -
max time network
301s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231222-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
18-02-2024 06:11
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231222-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 2672 b2e.exe 2924 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2924 cpuminer-sse2.exe 2924 cpuminer-sse2.exe 2924 cpuminer-sse2.exe 2924 cpuminer-sse2.exe 2924 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/1220-7-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2672 1220 batexe.exe 83 PID 1220 wrote to memory of 2672 1220 batexe.exe 83 PID 1220 wrote to memory of 2672 1220 batexe.exe 83 PID 2672 wrote to memory of 920 2672 b2e.exe 84 PID 2672 wrote to memory of 920 2672 b2e.exe 84 PID 2672 wrote to memory of 920 2672 b2e.exe 84 PID 920 wrote to memory of 2924 920 cmd.exe 87 PID 920 wrote to memory of 2924 920 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\5D62.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\5D62.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\5D62.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6040.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2924
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.1MB
MD5b6a824b01b09fd8b1c983df6bf4e977e
SHA1ff777148e4c7b2b727760d992974c87b45b397a3
SHA256cc7f49794559d81df69a5fc95bed6626fbfb814a2a9491b509259e1810705250
SHA512caf582fd3f2bca86c0974fe9e7227b36b50178556c47ab03197ea33d61b1b8aceea97adcd97c46461e087a2db7a10550b0e71197da6c2172ee16b86d9c4f38e6
-
Filesize
4.6MB
MD56d4bbb12af39574930caba3f4df3e1c9
SHA1013c1168c39ef68cc2572b9f09ed5cdcfd5422b0
SHA2561b639bec5afb0090c658cff80ac0df7406dc07947d734eb2173dfc0351211b28
SHA512cb0f0a6f86fbf8531a089a6c09bf7de62003fabead4cc75cc726bd415cae8880963e3dac9d0ff6c783522b0e11c23df2ce493f0d6b1e94520cf466d74acaed0c
-
Filesize
3.8MB
MD5fc74c4a83e8d19273d924f8f299de75b
SHA1b6f3249db76cf73455771197911f3c26a81ade30
SHA256a1d576616faa12a729915970b6180728a59a2cacad521bdaaab4057be5ffa725
SHA5123c9b5ee17e79574c0c56de35af6f8ee1076ed5780ed2edb6dd910218c9e057a0fd6808d0fa1c2593c6bd0a0d5e85da81ed4c7af17239b741b72da147da293806
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
603KB
MD5abae1e5f931e9d766f2f3854dfaab4e3
SHA1e5d715464a74541bb82ecb4da6a0c16885bd5828
SHA2567ddd846045e76b170ca388d2f7fa4c24f05438d1d64196f415f41c38f89332d0
SHA512fe2d8572f3b810e5fda8b51d8e869787d67bbee404e14f1369edd5c5d60ff023acfb2842b81846fad5bfa54edf20e12c458e381ca5587ccdbce30dfe5da59ca5
-
Filesize
405KB
MD5d7a3dc137b678525974ee11704cc3d78
SHA1c82437078712b18b9ea18ae81c52447aa80aaaea
SHA256484b0016aadf02dedaca0a8b3947e6cedb36dd025fb6231c1b6441e6b5784451
SHA5124c861bb97f449cbc7bfd1d227a06e06b9925c713243fb774b3d837c0a0d0a460ebd92fa2fcff03ba963e516317e818a5fbf1fedeeddfcbb81b7591d0a69ff3ff
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
512KB
MD56162b21c54b88c5c990e82aee951ebb4
SHA1477384ab8ebe5f5a5d5a91603736d9ef53c12fd4
SHA256462eb68967c7205145d0b92e4f3b69297f616187b07a189178f35f288063aff4
SHA5126264ee49c4b8a6eaa69241e10ff9ab39445f85a57b756b8bc0530b45d77827d05e669dc06b689d4693db34e4161ef11b2cfe6f1954b0b90bcd434e81a938a40d
-
Filesize
256KB
MD5f8edb8dd2fb15f1887ace09587589dd4
SHA1cbf7cbfefc0215d9500a98d9064deb9e86787152
SHA2560465270288d69a0ec9beb7114707bed76756c14148293237d0d35423abdfc67b
SHA512aa993112953225280c0bedb1ebd8288298b9c22a6a884a952ba60e48cbd21c4ce60724b7adc961a0528d7c569596e3420fec2670fc47c3eb6c00c691e0378abc
-
Filesize
258KB
MD59a8c4bc14d5e9d3c2a09c0a2f0b650a9
SHA14fb07e38617837dbf559698eb83e8f15d8209789
SHA256aa1ebd604c7ef780c86c43f74efd2c1a983500df765431e5da72502e91347398
SHA51291e2d0c446d259f793ef964d9cd795f8b359da79eb5279249787685851827d90c5ab7414e493c10a6809c9aef9fd4795b61b02e736877468ff5fb361f300204b
-
Filesize
192KB
MD562069650d62f76a4cdf0e81172d99993
SHA13b20ec5b4a4320ee15b0f7b9715a9ab90f68346e
SHA256779a5590c667d9a704b79e159259c0646737394fd66a9c0b12d13f9445ca091c
SHA512ae1954a84fb7543465e77a4cd5cc1bdeee0cf848592958633e6c51702b42131daae64c302d5c9537c59a9b3ba9498e5bf913d1f6f757ccdb8c4183b33224852b
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770