Analysis
-
max time kernel
295s -
max time network
303s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
21-02-2024 16:36
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 2808 b2e.exe 2708 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2708 cpuminer-sse2.exe 2708 cpuminer-sse2.exe 2708 cpuminer-sse2.exe 2708 cpuminer-sse2.exe 2708 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/232-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 232 wrote to memory of 2808 232 batexe.exe 87 PID 232 wrote to memory of 2808 232 batexe.exe 87 PID 232 wrote to memory of 2808 232 batexe.exe 87 PID 2808 wrote to memory of 1696 2808 b2e.exe 88 PID 2808 wrote to memory of 1696 2808 b2e.exe 88 PID 2808 wrote to memory of 1696 2808 b2e.exe 88 PID 1696 wrote to memory of 2708 1696 cmd.exe 91 PID 1696 wrote to memory of 2708 1696 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\62B1.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\62B1.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\62B1.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\66C8.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2708
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15.1MB
MD5519cbcf5daaab133d8ed79b8a40edfe9
SHA175376dfb46fff78ad75971198e395f0db9750d6e
SHA256a2c2eb423852f3fbdf147bc95bca463719966662ec0d8560dee08fa2a2a425d8
SHA5124517c6f77e5c837164364934583787fb586dc2199ab72e427c1fb3eb95a71361aa6f1a43790a773d982ce801339c7dd0af1e84e83777d3df7834d177761da1ee
-
Filesize
3.8MB
MD58a51974691a7d2ca16d572e14bd72f6d
SHA1fd2dd3dfccdc9976061973f46ce4329c67f3f0ff
SHA256a2addb927e64405558879e1fd87207ff63e04116bb14da2124172b8b6e31a675
SHA5123cdeb7616bc145f4b5e401f805b05a130769be4660a9c08ec09a6f3247477507143307ad5098485b1b39b3cbeeba5c5037a575977eee475e954903414911becc
-
Filesize
3.5MB
MD52d7c84f1593d50261e6278b090a38e66
SHA18b8b5bc865e3929a18fc3125e64412c672947488
SHA256174dd76b5aa03dfe25aad4fb92ab4fc11a90edc1db791b2a93b80fbabeea2145
SHA5123a37942ad2c1b257297f72ac5f9a872583571007dd0d3def0c9775f102b476a6617989bd4c7c38bb45f0d2bfb8a3a3855c189fca2a63474e20bfb01dd86d9853
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
211KB
MD5b93515491510207e525d78bf38591c52
SHA17e23ef8d7386ecb94865281d81bb72184df3a011
SHA2561205a8136f7664b4a5758e81d069dacad275781048efd8c77ab7d0d86051c01e
SHA512e1681b0e76ac154430e75eb8c89e5fba1e50b0b72edb92af5948028d4439cf283c071023ebc43684bf6a2bbce45057a553b662260f91b82aaccfb62b459af825
-
Filesize
349KB
MD5db56fd7fec73da8dd3fef4f89e88e3c2
SHA125981e61ff7b1d0f9114042c64118c077183af2b
SHA256fab9a68efd8b5eb270f8a585ff1366d13df7af1c4fc31ed9cd7e138d2fadda37
SHA5120352a0685cf833bf3749818b650f071c153cab2d8d18c19bd0e5bf0f3277062509d5d97687aa48f50dad7a3ef04eaa27d0b385ea6be4dd6a8dadfc5be35face9
-
Filesize
103KB
MD597178e660a2ab396dc0d282f6a833bea
SHA1a21f8187625b6bb1dacc9856e0255c18c682b9f0
SHA256447ff8a7fba0de344d12b423ae7066c750e453290c39f2f0d10463b851482c33
SHA5124c941ba95b23c505c9af9cce31876c4263207c1700ca84f5f2526e1b5099fd370201e31036326862c175951935f1fde899f6949f4905f1c8cc60fdc46670ba88
-
Filesize
171KB
MD595d7000ed32f3c7386efa2af62398b56
SHA112e3188fb4a5b31162dc6c6c22047337c81922ef
SHA256f7b1114a1cc756a91820429a620a540be24545ac2f13b9f67b0ad2d036c126a6
SHA5122423071f603b333f947fa4be30686624be9c67fcba523954ca515ef9da03e86fbc5028b32410cbca7cfab38d3b4667566dfe591a41e50a620be3503b94e87fb6
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
33KB
MD5e7de7cc779edc1fcb23c5420a87d78ea
SHA1079e4a092b042123c2879b81fc23707eaf330920
SHA256116492fd069100626d79849759676ae513cb71267399c493bf0fdaf678d1ccd1
SHA512c0a0430ac5b5b9306fc111f88d58d1f413a133e47937121c0f253620abe96ee64b6cba792f141211f2abb37782c116417d5dd76e2e00f6148ff53ba6aff6aa0f
-
Filesize
129KB
MD5f8c350ea46872735e864b8e9a651f93e
SHA1c9dc1e288085e133a603d47389b3caaffeb3745c
SHA256af968e303d9013bb0e870cca348f4374b5e7b4c6012dfd57cb24dd4fd45a49d2
SHA5120b0db1f1cb73281adf74e97885480ad90ff12a8a577260263c5d33aad45eb5ecc5c1810ac096d8e959c7c04d676c8d28a3e426c5178dab2461433d27a1d71e86
-
Filesize
2.1MB
MD5f6ff763a4cd2007c32b87aa8f9428e10
SHA181d3d2ce8efb770f1e10e90f80704758091a037b
SHA256c25036f1fab64384b9ce534943e91d23d96edba488d654ffb8db0180861048be
SHA51242c5b7eb04ef9e7487e27270be49f821707abe7c7b7fda4e30751b81e6719a6375a3bcda897be2e664bd40e267193b4bcf384fcb0b290dea8fadb507aacc9d14
-
Filesize
14KB
MD55c37dcf3e37dbc99177c5bcf977be61c
SHA144b8d5a15e30792b04ebbcd38b18779b66b5c07e
SHA25629d05cc85bfba5e047fa07d67fd4832259ed2cd8e651e1d0719d6d1fe4ab1c5c
SHA5127653829956b1e040b59d78d1b8d3efae81a65c906be1a5538d0ec6167af3fce5f0cfeaa506290d3ab23d192ff971a408c5b4a74736c83ba3ee9e6faa6b611d7d
-
Filesize
77KB
MD59793672da488413a6ef79c427b72e1f3
SHA167cc7056f9d844e4a32414bc655b45d9c4f48eca
SHA256f21b1dd056e1361dbe899620f242dbb338de5a7a89a708cf4201aae1230ee3ea
SHA51277f68e6069f03e4719e2c12645691f2783dc768613d03478a086a2f4348af3427651649922e50ebf5ee97fe07cb9c895d0eb1b3907b33db2c90ed06661a5b931
-
Filesize
22KB
MD550237a81239365f13bce1191c9dcf4a1
SHA197d18ee2715a1cd6b4672b16c4403280bd3998ad
SHA2565c0f4b3ca7a2be7fc226631c4d7794d616f7b582ab8e74c397738f949be4850e
SHA5129076efb2e4b24c9641af352fce663c2a9bd21e08ea846b1a161be7e4d8c8bc9bc4ee76f58ce40bed9e44a90f08a70a56b1b69013ced50eb04f81bba23e749da5