Analysis
-
max time kernel
297s -
max time network
300s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
18/02/2024, 07:57
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 3244 b2e.exe 2252 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2252 cpuminer-sse2.exe 2252 cpuminer-sse2.exe 2252 cpuminer-sse2.exe 2252 cpuminer-sse2.exe 2252 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/2892-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2892 wrote to memory of 3244 2892 batexe.exe 85 PID 2892 wrote to memory of 3244 2892 batexe.exe 85 PID 2892 wrote to memory of 3244 2892 batexe.exe 85 PID 3244 wrote to memory of 508 3244 b2e.exe 86 PID 3244 wrote to memory of 508 3244 b2e.exe 86 PID 3244 wrote to memory of 508 3244 b2e.exe 86 PID 508 wrote to memory of 2252 508 cmd.exe 89 PID 508 wrote to memory of 2252 508 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\5C2A.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\5C2A.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\5C2A.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\631F.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2252
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34.2MB
MD5df4bd213bd1f3eb96021eb91e89dbad2
SHA1fbc82cde8074231b4da6eb82854071ce58b50c4a
SHA256958ad04362662c7ceed20f8198765341b94156fa1ee5cfbf825498b516ba9fc9
SHA5121fd09b54e43a015bc401e18cc2d428b0aef189be5890caea6a1786e46e44812ad273d429e8e8bbba4c384c6ee3a35921d4dfdc219b00b58c0028506e8875160d
-
Filesize
5.8MB
MD53e1013b404e151ba6db0005cccb8c0a9
SHA1391fd36ed9cf6d51faabae5ae796d497b222567b
SHA256021a7a4bdaab52398a87cd5a0e332386ea2e0411a8fe00d777ef87b8f9cdd2ac
SHA51227fb3f1c5530b91bb903c4768861f67220ad44a44224c8bc0cd0601f6873afcc94586514be4aeb5f8763c0ecbfa7b365a9f55eeccf0968df907c1d5a7b47bc59
-
Filesize
5.1MB
MD56ee4e2b0db99e98a52bbff50c6d6dcba
SHA16a363a1d9872cadde27a66ca7e88b765274cc8ec
SHA2562a8806781e17a2dffbf5906987b9dac15b70b0a8d18b7c29c94758f3a688c676
SHA51294fddb6a7cf9a3660edf3bc6a65f45ef46bc4bf41f89357c18ad841276d80f77d2819e80699eaa63f07df2734f902e0f8719c98ccbeca6bead05df7f0b742d2c
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.3MB
MD54c04147c386ba8792ac6a03069572a8a
SHA1dda67789fc1d0f2469ca95f01a5c81034853ca6a
SHA256c7739a1e940a282703d06eccda7110426d306f390e97fdbbd9df18472fd132cd
SHA512a8b5a0b878a9a7d30cb38feff814e1f4dce24d000158edc10a43ee9a89920bedf7adc92eb7e3913098b6aab7fbd0531f56fc09f508b5c2769992a94e55d153db
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
4.1MB
MD5160577c54503b136c501dc298885d671
SHA1b1b87ec10a038b61616a8fb8d968a7994d6cba10
SHA2567226c24fda9dccf7b4b053bd2eba41db6d205b9889d96c94592c984ab9e9f8d7
SHA512d09651ad970a944200307e3450fdacaa32d09a59a4a00f3e9ca697686c571e782c7bbe95e27fb10738651af3d8155de48f549f147245814d440de9e3636135c9
-
Filesize
4.4MB
MD538cdb514c3c29b57f68eb99e753011f3
SHA18cc3f5cdbbdb12c7cd680799d4077af85d321bb1
SHA256376cce6885f62d6a174399a8d53f29f3ac327e2592c267bb739c5dfece4e49a4
SHA51293b205576df41d4a3431e57605913d1819235f16cae73f8a830db850c8c8d88880e4cc6f8536aa711ce7f622a4bd3f59c3fe74295b19f9fadda17891deb15f62
-
Filesize
3.9MB
MD57f0daac3e15a9b3ec83d741dfd7305f2
SHA1b7ea2d0b4346f357af841db26675c140fd4eb1c7
SHA256e96592297cb8d92f333413c1beb2940d540d441ff320bee487b1458f0cff75a3
SHA51266f27f14fff51deb3a0426c3ca70d31b51152bd1112a60bb1b71ac8bd5e783dfb7f56b874e91a8f6b955ab326aa36914964d08a6c70d4686c21ed2c446b9386a
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770