Analysis
-
max time kernel
294s -
max time network
292s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231222-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
18-02-2024 16:47
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231222-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 5084 b2e.exe 2236 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2236 cpuminer-sse2.exe 2236 cpuminer-sse2.exe 2236 cpuminer-sse2.exe 2236 cpuminer-sse2.exe 2236 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/4676-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4676 wrote to memory of 5084 4676 batexe.exe 84 PID 4676 wrote to memory of 5084 4676 batexe.exe 84 PID 4676 wrote to memory of 5084 4676 batexe.exe 84 PID 5084 wrote to memory of 4556 5084 b2e.exe 85 PID 5084 wrote to memory of 4556 5084 b2e.exe 85 PID 5084 wrote to memory of 4556 5084 b2e.exe 85 PID 4556 wrote to memory of 2236 4556 cmd.exe 88 PID 4556 wrote to memory of 2236 4556 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\9E63.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\9E63.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\9E63.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A0F3.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2236
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.0MB
MD57279634f0e380860d67384613122a9b4
SHA15d0537b4005e31cc6f7a80cadd7ff60c58ba945c
SHA25636f68e917f927c17c9e1aaf09c4f5daa592475d037272aeec658689c7a571678
SHA512ab5ccebcc50e9af826b72764aed37a688c5a142badd8ce5ea388f9661ff373cd67ca4a7006f1217fb261fbe4c6454e369012caadc8ad2d0d6f7a874462800bac
-
Filesize
4.1MB
MD519878dfec0a8ccbbd82a092582559ad8
SHA1c22a0d17c63b95ea34da07e7926295f9c1f412c6
SHA256669b85f54293f4381e13f9a6e2d3b419e7a8416c47dfca28a817f25c9bfc47f1
SHA512372b13d64d4dc1530395e7df78206958c8de0a9e43f00987f4b20019257f0c7fdd2433234affbd1cba70759e81c5f2e0067a11d8165c5b8e44cafb29be042f42
-
Filesize
3.8MB
MD5e42d24d0796e8aa9bceba11483212998
SHA11a9ee53034ad560ae18abb2c680ffe825b48c6ff
SHA2560f33dfb5107b77606c1d7bf94fed6f9007febf097cda9ffe489201fa5a8ec279
SHA5129f6baab4033389e42a2ded749dbf25265cab83ab360e19a889b13fed8b3a332833c5673e59e1c0ecfd8275bc74d967b6cdb90552b886e5c162e10f70f01ce100
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.3MB
MD54cb1acfad6437192773d55f673dc483c
SHA120cef6f05792893ce33e0eea31b6edfecd5fd0f2
SHA256789669109c38fa150aaeec8e2aa11a1e8f01f376f83c3494c78161f6483dfca8
SHA512939376b39b00ea3731f73d4743e07d863716505dc2ae9ebd063592e99b17126f7a51233e1879bc2fbd0359cfbf78853b6295c4197477c17d8bcd624a6a730749
-
Filesize
1.3MB
MD5fe16bb3394973236a7caa3800ca480d9
SHA134d657adf8f3fb306b354046cf6ecabc8d76ff28
SHA25640b0fa38099c4c32ec91b7432ec8e2010da314930b801b62c80d8f87c155faee
SHA512230671dcf172e59af7b332c1e1db5531a2815e8a92728c0802c1512a73307b45ba76ac25651876d39955b694b8414b8995d78127bef75486eb3fe09ffd2aeb90
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.2MB
MD53520fd200b47922d456a2587b2f113ee
SHA10e4c0839b92ec2382c38f6887943356a0ca69ffe
SHA256a3145a18c9f14a7d93cbf31fe59e83dd8ad7b304237ef026c872ef4df7197a8c
SHA512b2e2c347126a2367f791d1bce3827fb8047fc51b446e74f85fe7439b8622a6685407e34fa066d5610e836a6d9ac27df1277d28ac36cc26add182c35872c8126c
-
Filesize
1.4MB
MD56209d231684a8f2e5e435f52c37246d1
SHA1b86fbebd13d623ebc5765543b2ef075f41e57c7c
SHA256d63535da6cdab2c1a2fe1620c6a418ba16e60f52545f5719bb88e7313f63de9c
SHA5129d4d2d39827ebd76373a3cb02ccdc6b70737b4842aa9e9949f3c411502feda78d8c60e0612261f2b0491c928f3807c5d43030fae8d7192f265cd42fa356c9f09
-
Filesize
903KB
MD53ca8b926eeecd97fb570f6abe593c4c5
SHA11f46b3b2745cf5ade9f82fa8064e21ed85e84ad9
SHA256c29df23020fc5163bafcc33c29b8c25449666a815e2439769fd6939e9701ecfb
SHA51249525e0ffb15d28a6a6583c728fd44e561585bf658ff511bcfda8102a8b9eb6fef7e096258a1e403afac87f0bf2ac9517c3d4d4500d4a699bb92406b614ea12d
-
Filesize
1.0MB
MD5ec767df00ffcf99d5089a443abdce637
SHA133f6d609b8ed0fdc8ad24d0ca4db0ddce3d83f09
SHA2567b488661d38d59d0d143f05b67f67ef6b18e2919c27ec3c1bfaf8adb0592f02c
SHA51281dcae04c2ed18ef3010bd9b0fb3c3a3411f11fd9497ddec8069ac388552dde3e5f63455a90d075e474163609d0cfe63e86457e8ca9d0a113c217aed71ec68cc
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770