Analysis
-
max time kernel
293s -
max time network
300s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
19/02/2024, 15:29
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 4212 b2e.exe 2120 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2120 cpuminer-sse2.exe 2120 cpuminer-sse2.exe 2120 cpuminer-sse2.exe 2120 cpuminer-sse2.exe 2120 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/1920-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1920 wrote to memory of 4212 1920 batexe.exe 85 PID 1920 wrote to memory of 4212 1920 batexe.exe 85 PID 1920 wrote to memory of 4212 1920 batexe.exe 85 PID 4212 wrote to memory of 1536 4212 b2e.exe 86 PID 4212 wrote to memory of 1536 4212 b2e.exe 86 PID 4212 wrote to memory of 1536 4212 b2e.exe 86 PID 1536 wrote to memory of 2120 1536 cmd.exe 89 PID 1536 wrote to memory of 2120 1536 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\6ED7.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\6ED7.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\6ED7.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7196.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2120
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD571a12ed1c8ce17543eeac9d9fd6b81d0
SHA18809e2ade32cdb703c21a8fcfce55982a63f86a6
SHA256d0725ccbb4ed2a047c403d28f1b653391530fdc1d7f465bd9049903b3838bb28
SHA5124dbc26fe9c782acd498c309ba0df31440165c3f43bac69fe5bdccc7c435d4024eaef10afa8d212c8ec2e2f2100962910fab100afec9ad71fd473179cc6d60b09
-
Filesize
1.1MB
MD5ba03f15142caada0d933975163fc4320
SHA134c3c3621d1a6cd6d58fa320fc12c9143cc6d875
SHA25665e59015d727b91a40499cfa241b7f1540c5ec834c9d0b905f0b52ae28002269
SHA512ca3a6f87073c7dc5214b1ab4621daa7cc3b779560565f873a593337517dcb55488a6e646577dad3bba2f7c3ac0c7612416890fd2d9a97ba427acdb8a2e073368
-
Filesize
847KB
MD5f4033d1e66a6ecb25f5b590a648915d1
SHA1fd0484e63750d9d516530fbb7c8f1fb01623826a
SHA25663673d5c4ba111607e06e56b317cf964e5ed227087e35b9d7d2e585e8b786cc0
SHA512fc665779d49aac29457eaf8799121bfb711763510fea539b35488560c437d920205eb04522910dcbae82ef387ac663ad676613df4897e602f153001b86120a16
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
244KB
MD534997a37e436d75601f2f76da925df3b
SHA1abee9b4f4e8aef864c7e858cf9334226f6e531f1
SHA256f80d716b54da4ebdae2f159b004c3d666ff5329c4c2c325fb3130b6b4bf5505b
SHA512b342e4612b455f0d864bcfc8b61102156a30e2e5a21db429829a9af948a342a88a32d6ae4781b29042284f89442b048ca0e2de8523cfe235b46fa557c554b940
-
Filesize
330KB
MD57941f0f7862abd8d6b36514275c8bc2e
SHA1ebc89640d30f9bf23749c819843d6121c98965cf
SHA2569b986ff1bfc508a01a60854a99fb2b6de12dcefc1eceb95657e6b29125ae1bae
SHA512fa41cc438002fd065847617e02cf29f34cdcf0b22bea2843ee5b5726f60f5e291d45a428910b202b177263e72fb025050211d246d731098a955d1a1c778e9585
-
Filesize
194KB
MD5226358475269f60483a7f65fd4dc2fcd
SHA1b4463ee5f27c6287073ad8a03ac3474c79039ace
SHA256dc307830cd9dd12423f2133205eff9c89f8a5d495a3cdb14063ac7bdd008ecbe
SHA51200954ba3742ea3b95a6b37466a7b22313de324748cde32ca2cc76049ab97e43ab427f24ab6176f92edf822bbe64e308d53ab2a3d94f1e87da0fd45875645823b
-
Filesize
182KB
MD5f64f6231f5d21bc5c43a63f97e74773c
SHA1bf6b592285f22938d53e6c84ad8e555287235a27
SHA256441499a1406aaf32ca72fb657550f52bc9b9400efc13e6ada37d4c84e8c89e9a
SHA51288abb6b95295d691084f456c938517794f72f72af3812c431bab7f69766bf030f6a2b734a29ce051253124fb8fa0fa9a89c89d71e721ee5eb408a117b20885ef
-
Filesize
237KB
MD5069b8399a466d2c202013121d52a2756
SHA193ba19d4967c94978fd806e1d2f94217fb4718bd
SHA256c09600951087d6ac0f9b9abeadc2ecc486e8b70daa21a61b4957c6ee88321e85
SHA512c41ef3c216a9c51db50a71527fa1d027020cafbe2a8906ca8a98f9268ab9b5d3e64d5cd3af649b5e8e815c8a18d3ea1071981e08a614dbfb158e1fe60389a5c0
-
Filesize
131KB
MD5bcf65588ff6fdaa3bc14b81c99417235
SHA137d1120775ef234b4efa23dd31fe712e90f01965
SHA25620828b488930222fd008b2180774479f7b26ba6ff15dcce7e7026bfe95c9a012
SHA5121fa21852172beb13bacceaae6e4164fe73bd30e9c6110db23ce169c918060ba579a2169754608f0ed103b68f4cecc86fc52be53634d3bc45ddebef7109b25744
-
Filesize
267KB
MD5bee0a15c1663d2de22347d7a86b38642
SHA10ab5265fb403d7a4d5da09e8b0af36df02ffe9c3
SHA256073ef6284e1a028e4a42d1d1a00e56ad0318daf6ee327252d643ac8c863cfa87
SHA512ce789eb3a2f31530cffe44e1680becd3f4a7ccb350a97bec8ba1855196a333deffa4ba7f6f575e2d94e6a3d6445a3d67c932bb8b0838012476fc6077d2e3adcc
-
Filesize
126KB
MD5ec3e4ba348ee8aa433ddf9b22a17ca97
SHA1d96979cf5654e8c56290d2c7e6c82ff64eccebb2
SHA256c3baf11a0897ea717133fd15ac30b306a5836b8826741bdf407db0aa424d4707
SHA512b4cd57d343b67597b97204b439ea7ec51fea20fdec7f56df435550db4a63963fc1e9672ce52ebb0dc64a4dd35d98f5d547c9eeb41028c436b748292f3d9790a9
-
Filesize
312KB
MD5d33374603bb30e4b16fcf181080578d6
SHA184e8b09ed4bdadf5a92d9e92b300ff56391d7ee3
SHA25667d8b7e1f3ea3d738eda6d8c24ab5279a5cbe7668cf1d0f9f61e90c1167478a9
SHA5126afb0e28665586c95331fefe6a53e081455e3295bed9f72c16a5ce6b1e9d94a30636a42cddfc0d9697cb6777189faca3f7e4262c1b415adcd598761f0acec0a0
-
Filesize
243KB
MD544458865539d1242a611373e005ccf9e
SHA1b51b5e5e4c1975aa4a63ce5f8694ca63738778f7
SHA256ddd967250d0fbee7116001adfb90c5995e356cd6e914ae7ab2e69e76e6df3aac
SHA5129fa388985fc522d5c9b4d890a8ef3c606eee3eaa32ef10ed448345714bb9000723f580af01678f463b49ffc3733b9866332c6f5401d5fd828e25f67299d1ba25
-
Filesize
213KB
MD5df0f1dc012b49a6d0366432be871dba4
SHA112dbc399f4302d3f4d41489abfcf69ea3c8acd9f
SHA256cdcd2ccb4feb2eb37a87a21cbab94913e99447a6fe56d0e9a9c2aa596abe1aaf
SHA51271feb2d88492dee57e8c5542fb016df1d00ced8c033f9b9da471f317ddf0b053c045d125f6df6268e49670fba40388bce94276274bd7fa602831e2fca605fbba