Analysis
-
max time kernel
299s -
max time network
303s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
19-02-2024 13:38
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation b2e.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation batexe.exe -
Executes dropped EXE 2 IoCs
pid Process 5748 b2e.exe 1072 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1072 cpuminer-sse2.exe 1072 cpuminer-sse2.exe 1072 cpuminer-sse2.exe 1072 cpuminer-sse2.exe 1072 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/5848-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5848 wrote to memory of 5748 5848 batexe.exe 81 PID 5848 wrote to memory of 5748 5848 batexe.exe 81 PID 5848 wrote to memory of 5748 5848 batexe.exe 81 PID 5748 wrote to memory of 3720 5748 b2e.exe 82 PID 5748 wrote to memory of 3720 5748 b2e.exe 82 PID 5748 wrote to memory of 3720 5748 b2e.exe 82 PID 3720 wrote to memory of 1072 3720 cmd.exe 85 PID 3720 wrote to memory of 1072 3720 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5848 -
C:\Users\Admin\AppData\Local\Temp\F627.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\F627.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\F627.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\27C.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1072
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
11.8MB
MD5a132b15ca428dd9af883c530355ef778
SHA1bfb8de637f523aa2c1aa2031f5446fae8040e857
SHA256d26d6611457d0ee7bcf19cfb11161a1dc4513e7d54a058441e12068d454507df
SHA512cb12dd3f84aa6947015b295abdf89b65124b9217fb466ecf6441dd139289408adbb78473a007f2b4d215b46aa19df4a1dc566b087acb4b9082e5391010e8f8a0
-
Filesize
832KB
MD5e1bd95ac3f9c6ce43914de2a53967fee
SHA13e03982c075df051d5a8dd837f42873f30483faf
SHA25645c3475b58fbaa942be0297167c5c3fbbfe7295aa3fcbb4fb61df1348f55c550
SHA5122166424e86301bbe04fbcce5d0b91562248845c5b1a7e889fee9a95d1c872dd6ea5cc85792b54e6d085095339be2f2b7f30cfd9b40a071b51c96a5009cc96f00
-
Filesize
704KB
MD52bb8bf63c7d7958f71f9307c8635131f
SHA12362f18b011bd1e60fa078052821edefa33b8e08
SHA25685151a35fd2a7ef587918c4702b2adbe0c3e7eed43bc8564a662ed03a6f3ce79
SHA51259eba9edea2b2af76f261db76b15912b20070d75db7cf498d55a1bc13f11692d016c9a70ed447a784c874f6d11582112312f3d058443606eb4b6de349a4857ec
-
Filesize
470KB
MD5bedd935050a41398e8cdc0d7cd485b02
SHA14a3fc6d98437b0fe4b3040242d866d17adfe3d80
SHA256a4083b8520a97e4344dc1d73b15e0ff953182278b6ec63fd8897ad25e4dd1803
SHA512f63830dca372864a6c41e6fc7a8ee6e226f1e7897c18cefe2637e49fb4c90c7561f246c5bf1b00cb4866d7daba8492ce11071c47f5cb2187d65bdfb8bb55a691
-
Filesize
650KB
MD5cb27551d104c08c7b4ded82bc405c468
SHA1e3acaecbd05afc8c3085c00f0aea522abd2472ae
SHA2565d9d99d0c58a2f44b54b75aba474d427306dc0d6f728e9a58f0b6fe2854e9bff
SHA512adbe89f51d618431b7ae0080f86825e6b6c4ddf9c2cb98e01d49706b97e4ace91be69dd9b1fecfd676a57244c90fb3d7d5d271629ee948122b309b4e691f1901
-
Filesize
530KB
MD51b9175b7bd745f3c3e9364fd7a5e5b2d
SHA16c4dbb05cd675adff909594c613de4bcc8ae0c92
SHA2562b83c92fbf378501b7dd8e63e8f182387587d773a17259a0d645ccb36961c0fb
SHA512eac8695eec157cb185480dc636476013792dc78067867009b1b5a3ffdecc384e39eb1447f1a5862306b755371646e1138559fe24348c910e210198a783105bad
-
Filesize
664KB
MD57eedfc11c23be036032db0540872540e
SHA18264bd5f8df91c674a6b07c27e3b8e6ec4928058
SHA256919973fdfe38adaaf5b3b265fb86dc24bc625aa553a1bb7fe7c8b208af0b9a8e
SHA5124102e5c0db4d9ab3aa3f1eaadf70c4e1bed4401b3e059eb580856ef63a1d2ab8932eb662e4bf83a180190d843c55741e481e4270dcbdb4973b8ea319743a47db
-
Filesize
367KB
MD50d8b85131638018da50360c725d7997c
SHA1022a66de68d98524b0b7353ade0aa0c127777de9
SHA25660014d3e26a823a21d8730396ae8a397b67e571af5bc25e0b00a524499779445
SHA512df1b6ffde658d2e6a55bfcd81e989070ab8480d2e946e97d4782fd001d0cb4d4bf5ec7dead420717f189471a06e75fe668376e202ef76c26ffd9cd8591827c56
-
Filesize
294KB
MD56d9d24ee88c25f89e7bd7dc8bff85c76
SHA19346e497cca1f033cb6144ab321f5b65ce9c113e
SHA2561cd3b639f75f26b942ff09b201f96c87d0b6f093f58a000204ac4bd018403dc0
SHA512ff2c21daa552ab7487db5e61c6a24c7ad69afc0ddfbdc8dbebd9b3b0ef3748352be88495752bb6a64efe54ca060ed7edf902b00e0e7dbd5251aeb1e405d95adc
-
Filesize
433KB
MD53beca0d136e65d85678d057244169f45
SHA158376bb2366e7bcc30b6baa2159dc0d2a1489611
SHA2567ac00624c698a616413ef32441df479753beb8b3edfd3d7b2893c731727acaa6
SHA512d3e15c9d9fad058cc079a9a9c73edb299cf9730b40f5e3ad798f388162f2c39582bb3e0fcb39feb90bc4e9b06c3855df0b17aa558194639df7734803ec24e6eb
-
Filesize
445KB
MD585ac449f8ca3ba3231c8936a1699aab9
SHA1a0becb4d85e4d9def4b487d581fa98c01bc8c8ae
SHA2566ee7161fe048fa48d3c06261ddade4d7cf2db24bce2c2b53f1b3919ce9f38592
SHA512764387679eaa798ea1cbb7b5fc2f808a576b7cb767770b72b8772c03e9deb37271319091aa69cb933732a2d109d82c4d88e4c31c1bbc60935b92aa28773e2e15
-
Filesize
251KB
MD533a09694c2b0417375e9d2db2d433837
SHA1aad22de66aef337c34eca80b3ae7862f9a644f04
SHA256dabb95f905a5e51c65ae315419e027989e44103b8a683bee4424605e984aab3b
SHA512ce2006c36ca98c69e4af05ce3046d90d6767a775fc0f641376bc02f8703eb056a427d88d147476d864bd00037d12c8d3e2e5fe5d6e1a8eb3327d041a597ef90e
-
Filesize
276KB
MD514e98cbbccb572bd06be44e9f3cafcef
SHA182f25f0a00c6ba5094add88b74dd7e7db1987b51
SHA256dd7aac26e1648600323e62dd8bffeed061240d4035395793f99c8d2301188160
SHA5120940a6af2b23cdce49eb301b9b1dd77659e1008f24cbe5c7f47a879c67fdded1a301231870e42a21bdea5c0d2b8b424cc50e893281330d077e75b11a7c779f0f
-
Filesize
242KB
MD5144991f564f0ef73d304e6b9be7755db
SHA1111de48c68c6c131502eb5b612631cc1889625f4
SHA2569d2035765a422e2b7d54c9f36186661ebdfadaff0408ea81a8fd96a872d2acac
SHA51273e612e78ede07280a64fab2f022e984f0bbb7e4c3306346027f3db8d45db7ff8b80680869ce7a75b5e77e929494cad46016a46713beee7057086a4be1e8b9e7