Analysis
-
max time kernel
302s -
max time network
311s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
21/02/2024, 05:39
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 3792 b2e.exe 2676 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2676 cpuminer-sse2.exe 2676 cpuminer-sse2.exe 2676 cpuminer-sse2.exe 2676 cpuminer-sse2.exe 2676 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/4904-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4904 wrote to memory of 3792 4904 batexe.exe 85 PID 4904 wrote to memory of 3792 4904 batexe.exe 85 PID 4904 wrote to memory of 3792 4904 batexe.exe 85 PID 3792 wrote to memory of 1140 3792 b2e.exe 86 PID 3792 wrote to memory of 1140 3792 b2e.exe 86 PID 3792 wrote to memory of 1140 3792 b2e.exe 86 PID 1140 wrote to memory of 2676 1140 cmd.exe 89 PID 1140 wrote to memory of 2676 1140 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\7F8B.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\7F8B.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\7F8B.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8A0B.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2676
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789KB
MD5271634a549afaf1915f41847441eee76
SHA1013295a39fb1cdb0828fe4371d08aafd0d6a1164
SHA2560bdcbbf794ffc8fe4fae045be00466271a1877c76b78b772e76efd1ad386266e
SHA5127597fd86ffb7bb9c22cfa129a7534f95ed393d548a6f80815fcbcf0d561310781a404f184e440456f691d3a6bbd5c419ad860f5d3859957aa2863964f96ab128
-
Filesize
715KB
MD56afd68fd1551f15343ac4adea67ac342
SHA126a4786c23c090858f0bccb7b04906f991ad58c3
SHA25678c7a3e3ea6147e2be2c6e05e7665319375a57c52cd7878d8c90a29bad538d1c
SHA512f8a201caf34912ea762f4b4c63cff8b28e80b6781e66c8cd9ef5aaa8f1464540aa28989864bbe989c4a31f20f4faad3e47244283b2ce0b0cb8f9921499c6d059
-
Filesize
850KB
MD5d25abb4460931d860e4bc1506bfeeaa4
SHA1c222b28ebd252dfc3e7d9d2d8130fa5804f19619
SHA2567ab2d196bd280fc556d5f1a3b38ce7722f2de9c1073deaa76a0e85b2dd97648c
SHA512c48b40cbf38e43cd6babdb9e09a8b422f45999f54d60fea7b9312711c468b5685ba7a4d8d4e1f85545de6cf7a982dc47858159844f1b6cf3ae66a71950a6415e
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
497KB
MD57ed5ff549ce31bfe0b755773fd348d22
SHA181bb9e154cb12b56d52ea21f9d7ca6871c8ad37c
SHA25679414d8049483eedfe8f6b24f483f11f374ffceb6a20d5e0a24f159e9011b180
SHA5128e46b31bc196fc754f35120cda1460b33eb54b144fc7aa38e0814c79c6fdc9eacd54a47d6359e57b084bd03177665cff51d739c810d527797b001a4c2e61f2e8
-
Filesize
368KB
MD53b3e5342366d2c4a6d20aa8b3d5ce0e3
SHA1bb2bfcb11f9e5a2401a4d88710122cb0b0777519
SHA256a79c254eb5e4c0b7f3595ae244ccc127581b869c69ef2858ed2b949d26a62893
SHA51227c182e17368de4a2d39f145ec01349911aa2e608781ac4df5785ebeea856674da7604cfe14f7f092aa9b41469c4781f667f5a1108db0cce9b29239aed1b8c1b
-
Filesize
263KB
MD58586fb80606b49b48086a0792c6a99f9
SHA1e8a8b933052008714205c23530bb718ea33738f0
SHA25693f6810151aab920c863a44709f10ddfdeb0a0c04799f855b2fe3b7f119ec268
SHA512d71516b9f1cc4ffa0dbd1aef351e838229529c8c26b3acf074e92230388f50b0ede29df1b1d944a6f7952eb0461c2d9225e7c7c119cc1c28dfb52927eb6532d5
-
Filesize
376KB
MD5e255bacfb148783815c893125b7b8cc2
SHA169244f7162702e7f6d12e3d3998ea39f615040cb
SHA2568d122e38f2a45cb14d815d0f0a89f740d3c056c2c4c35b9ea99c1431aef8f2ab
SHA512a2ca20706315471edec77869824041fdbf02f6f4d4e5f094a2166aa995d2ce891274d5ff3c9f79acb95959b01b270fe7481a23ddb82e03c933ca37e8e89eba41
-
Filesize
390KB
MD51cceba1f4a8d634fc446015cb659472e
SHA17a1aa68c5d41b08dd4bbc514535180d51fefe121
SHA2569cacfc2e2947478655c286a8cab933340f36166bf5160280f6b2d2e3ff329fd8
SHA512e3a3ff2befc7c03b5e4af735dff7fa4733a9d2e8e57751badb9dcfa360e3c91a83725a6ec7a6abd4e5117c12ebb05abf3763dd5e8c5070e11bdcbb2768cb9bb3
-
Filesize
344KB
MD59b2377887bf82ff4a62ae0ac9bd2b958
SHA1931efbb04441527d984675f399225e15514bd86c
SHA2560b06f2513465101676f31812aa4ba936ea6dda78145d89892171612d185f13ab
SHA51217509bd0b705245953ec450c99dfcd1f98267d20bbe35d77728e6003872dcb1886216dbb0e4dac26deb67915a31ee6200356a41190123f637426811a6584680e
-
Filesize
335KB
MD5d3e97faa5537955dd5b80533d986fbf2
SHA14a13d728b0b03f0bfca1eb9d0af82c76ad88fb5b
SHA2569b52eacdbd9aa207471d3e7d24a243e31b228aefc6040247d1a781c6a3fb795e
SHA512ab23bb71cafcfbcccff7a0908bbcdb0801cc8bbe69aa72cc5fb570cf45bafb0d03371032cd8deead0482d5ec3057565f382c11d65f04aa7868b1ef3466fa7c94
-
Filesize
468KB
MD5ba786347de22d5604834da4407f5b707
SHA1801caba5dd0db5ed5440c50000a6f1b90e296761
SHA256b3c63efaa299a9761cc6236897bbaae658a4e21b95dd0af761548069bfcc4b80
SHA51223ca654aed30cf9fece7d2617e6bb71dc2ccd0153a796c5f0e005d1b73db9cbc72c3b71f7b61ed846950224e648790aae4bf94cc7225f20afc9221a5acf2f03b
-
Filesize
424KB
MD5fb37fe4de57e8aaf1bbb7db3c9e47f34
SHA147ebc91d70dafadf7864e09770e87845521b8509
SHA256bd47945c55590ade55301825adcb0f38d6d87c85271782bda4e0b699f2dfde3b
SHA5129ca0af9838766019aebcf74f53e2921146382aacdc548489595eca8bd6b7778df9a3733bdd28fc57828ebdde61e67595050335bcfb5e92d7a939a8d365decc33
-
Filesize
394KB
MD554feb9d5ff5f14f7c4b9b7b6fe7ac422
SHA10a287632a5985eb503bf1fdea8d3f3d38bf102c2
SHA256ef9396f91780e561be02a968eb1b7b6524b71e8296257d82636258c9ff4da492
SHA512fb30e5e17ef6f05e23d1996dae6bc23f4ff7ecc56cd50ef13b5bfd937b63fd8dc0712b6bf5616e3b7110d3e512ccc5b3c3ade4a4e799d262a5ef73d20ebadc3d
-
Filesize
245KB
MD5c56e9713c3eb8c5c66047b928820ac80
SHA1e0392d0e14e51d341612957171d7c08e7bff0f64
SHA2564d08786d2713e6c0654f2c266c98cb90d70b7c1275f50dc3306450a40c7ec3d0
SHA512cacbae515c39ee4d558101d89c2ce1121f076d8b28e5424bd8885a12aa477319f7c8738862b0704c9af26396d5c0e36d12554d025f782b2c3d09ea084a18bcee