Analysis
-
max time kernel
296s -
max time network
304s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
19/02/2024, 16:24
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation b2e.exe Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation batexe.exe -
Executes dropped EXE 2 IoCs
pid Process 4256 b2e.exe 1916 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1916 cpuminer-sse2.exe 1916 cpuminer-sse2.exe 1916 cpuminer-sse2.exe 1916 cpuminer-sse2.exe 1916 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/1980-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1980 wrote to memory of 4256 1980 batexe.exe 83 PID 1980 wrote to memory of 4256 1980 batexe.exe 83 PID 1980 wrote to memory of 4256 1980 batexe.exe 83 PID 4256 wrote to memory of 2148 4256 b2e.exe 84 PID 4256 wrote to memory of 2148 4256 b2e.exe 84 PID 4256 wrote to memory of 2148 4256 b2e.exe 84 PID 2148 wrote to memory of 1916 2148 cmd.exe 87 PID 2148 wrote to memory of 1916 2148 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\9904.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\9904.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\9904.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A3F1.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1916
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18.1MB
MD5cd73012c21bfa755039cde440e6b68bd
SHA1ebce8b7f2b8b42dfe2eb5c3e23b7e503d788c6c8
SHA256f47922acff9f2f859fc4d75d2ee852882508ae4c6aa6d7b1db8a6d0ccc17a52f
SHA5123b24271b73df56c2563ade96d3569635ec4a2f8f2c70a41cebb8913bfd2b7ffc01f9a8b4cc36201465a5965def78c7885820a7c041acc34f89aabf9d26a36ad3
-
Filesize
1.4MB
MD52dfac40138b4fe24c33bc6ea56e726b7
SHA1249b6674afef631c975abe8cd0c3af0e12077e29
SHA256038c8bc3781ccb119c000b724243e06c8ce4c29e5faf63df757b43d7431931c1
SHA512c313357fc09f0695076cf1fe6955f5be7c0902c0cbc8052938f1b1a15d7ed39552c17a318576462d8dbe532482e5592611107bfeaa2af02d8a30f6c1b313b3f4
-
Filesize
192KB
MD56ac4b534a8945150025756c2f85dd2d4
SHA14f8633cd78b9248d5885e75ff1b26ef27a196ad1
SHA2562e07e008a86c33e31905b1f49b18245261ad08ed3463c6750d63502e1e20e43d
SHA512303f0cd104441235da58583af1597994df43d0a2d55d6245e89fc7d8f2509915525925277636214722e922f2939c93ba95627d54a18105d6cfa8e606b2f3c172
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
96KB
MD590e88aa0f39b5b15e624f5618a889642
SHA1099f6deaa6cfb7479a4f342248926efad076964c
SHA2566be865d3ff0a33e42872397994631687e691ec28a3e369b3eaf09913b9f1316c
SHA512e2b14acb428ab74219963ebbb80bae60a4bd3c99022c47a064f750344e52437e2876c521eed87a306da2484753c7ebf7643413bccee9abb88d88bab5540c3527
-
Filesize
1.7MB
MD5e6d94526e8f637b252224c00250cd0da
SHA152e71cae006470629d58a7c2d385aa58314b441f
SHA2564a159b5f8f0bd8f6c34597b680fabe4f1b3d5a48f15fe546b351d23e835aaf2b
SHA512f75c757df95c21344664906ca410eaca221a5a820d950984b58033473e1616c3de1578d3fcc35b46fb56756149673f9b2d90d5aa9443bdb1a0a76a10263684d9
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
973KB
MD585c4f345562e9c04f2f428b1c2b8d8d5
SHA1826fa0185ff3c7f6da5efec525d87f5f69b82104
SHA25614de450bbfe8b8fee6021268451581e0b4fe6f118b279b287065801c23b76bef
SHA51283728c27c769bdf99b97b46414592759e04d6c255a6fce959b6303d67033ad2a76ac43744aec1a72663c6a1ac774f32f070ee03e48e369e2e4f0644d64a3581a
-
Filesize
1.1MB
MD56fe73fb577cee9e49c7c6f57330d9b75
SHA13c5417cc00c531ac964d89c102cd4ed88f379d81
SHA256c9c6657fb75e58f4c59ae5bf6f4615fe955edb80f33b9f1e7f0e61708bf32865
SHA512ac5c52610ca6aaf22ac9afdff6b2f3ab3f19b88003ed733d04648d446794ecafa0c6c43b8f6de5986f0b03ed0210ddba23ac6434ec99d63bdb9d56516b4c4d56
-
Filesize
2.1MB
MD5ba980838a6ce002875f0ef5af2a61f1e
SHA1e39680904583020f86a03afea11cd3cb4d0a4732
SHA25656420d7823d0cdab2c30e1e91e19f2cb41b01ac0e9738024ae2cb645c4a9decf
SHA51299a0646946c726bcc700392698ebc39c570afd5afcf478a6d7d30022ed0111e16a225c04358ec0ad2866f7424b197ae800e7ea2917724c5d2caa08faf60c89be
-
Filesize
458KB
MD5a3b28798c8789cef70464dbbc8182017
SHA1ef8593289bdfdec7af86621c7a8e4ce8a55d9c51
SHA25683c51ca7c71df735460d775d58674c3588f36f25adb34c5651ae56b6758f1959
SHA512fe945dd157a3b820f71668b25e2ccd80a6d2b7851f908a4b7ae0738540273b1b7dec68195a2f47bb30f13d865b18e7c9668e9dda2f02929a9256cd8e38946734
-
Filesize
768KB
MD5613807ad6d525aded318b643c33bc17e
SHA12c9a4180140838c69c20bc4047c3d2d777d3bee4
SHA256896775bd33edafb0d219d1ae3e973e71aa29a4937d0252bd3a4cad074c004971
SHA512d688b0f2570944898097dcc6acb56b3a4c901073f0ce22b5ea260b05a37fe2840d84b44e7aa74c7d73078b0e5a45c24994852f5c03f049982b6ddca6ead89539
-
Filesize
9KB
MD549c78d155b7472f8c122de17eaffdb51
SHA10fc1cc43b1b09eac5c548691b62947a4326759ad
SHA2568191a1456239e6ba05961a3af97fa447fc87b7d325144e8b4ffb00ff03c843a0
SHA512e02b41f25b139afa2f9d78fac329162adfafeb490a5c51fc43a6b9e11a15c1c14a5d252d689c248aa7ecc60960516d40a85117b3ab6e756f65031f1088e47e16
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770