Analysis
-
max time kernel
292s -
max time network
299s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
22-02-2024 00:31
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation b2e.exe Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation batexe.exe -
Executes dropped EXE 2 IoCs
pid Process 1708 b2e.exe 2476 cpuminer-sse2.exe -
Loads dropped DLL 6 IoCs
pid Process 2476 cpuminer-sse2.exe 2476 cpuminer-sse2.exe 2476 cpuminer-sse2.exe 2476 cpuminer-sse2.exe 2476 cpuminer-sse2.exe 2476 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/3896-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3896 wrote to memory of 1708 3896 batexe.exe 79 PID 3896 wrote to memory of 1708 3896 batexe.exe 79 PID 3896 wrote to memory of 1708 3896 batexe.exe 79 PID 1708 wrote to memory of 3752 1708 b2e.exe 80 PID 1708 wrote to memory of 3752 1708 b2e.exe 80 PID 1708 wrote to memory of 3752 1708 b2e.exe 80 PID 3752 wrote to memory of 2476 3752 cmd.exe 83 PID 3752 wrote to memory of 2476 3752 cmd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\658B.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\658B.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\658B.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\76E1.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2476
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.1MB
MD5b4bb3dbc7760dc304a726df1c20f54ab
SHA1a9abc30f928d27fc96b091fd4d187aa26470f0ed
SHA256bda420d773630c497c99cff9350b782093121029874b4b739091903f0b3e8e06
SHA512102ae2cfdda1a7d2889dbdbfdc4f41cbc9690660401bb69a7f7a32fa714f15d12991152ee4052d105409712420bb2dddfd8f1594299af958872789f5a57986f2
-
Filesize
506KB
MD5e0d651977721bd82011d2d2f31ab6801
SHA128c611c8d37d9279d513c4a0ce356c9d2205145a
SHA25657309eced0b0291b4fcc8cc8b04bdddb4d16f00927b5b058a16e0a3849f4ac8f
SHA512fd5628f63bc70f2f98aaf30d5925a78f7ac43d84745420787ed80ec42bc5a3cc1f28be050bc73d286360c3a1c7fe881afb56840159d52902c810a5327f09d93a
-
Filesize
960KB
MD5d15ecf39e70d4d6e278b0da9ff36ba87
SHA12139694bf96cc3b6fbfadb8a9c8745b8901bff6a
SHA25604b2e6191d36dccb7b93c7d207ff16c0702cdec9b64b98206f9ffc7dc7633d54
SHA512326cdd9b35aa3dbd39d2fd4a22dd78f732d481f05ef6dca085cd086d8ca91502f3be961b44e5c4bbf2ebf947ffc4f1b4d4703593951fce22acaa418a77741434
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
240KB
MD526dc70c30f912bac6fcdb0b43b9a50f1
SHA11054d4d133d39b65f20ad8c6ca6fcd0a868167b5
SHA25697570cecf99d7f7b7ce32a9713294a9175eae826265cc4e82078c1d8b8907986
SHA512de4892110d7c56c463b8d340cd676790c909386582d59b027f2f4a2023c0fff3a2f2cfea54e90c18fae4baedb63de3ea6e7500941eb9695596c5242a15dc19f0
-
Filesize
164KB
MD5e7b49138f1c9aee463ef54f028477e33
SHA1a704932b8fc0eb2f7cd0fa5be53f0e54c10b9c56
SHA2560e690cc8fab1f878c2c75e8fcd2004f28cdec63224f60e48dfe4276bd6d39469
SHA512269bd5dabf7ba6db2eb1762b5c341ffaea03046cdeff9c2fc4a29f5bc3eb6e3bcbf6c72450c90ecfc454082f841fcbcd7959ddbff0f23c4596fd21ed6ee3bf3b
-
Filesize
665KB
MD5646a9977b257f268ceb627b293b5e31f
SHA18ba31ad721467ebdb922c00afdbde44d8a0fe6ed
SHA2567facf0c1cb96760a7ad4131918d588c8eda683cfaabe06c05bf45aeda99fc74e
SHA512a05bc6864fbdfae237b7689ab0a2dddc822a14f2c1a6c17b39640ef4d3124a979a56bcbcb9a0e512f114f6481a2229b2caa4f92008b4d49d37711d2a7cf52864
-
Filesize
815KB
MD58fb35f73b847b36e3092d115cd061598
SHA1067bd0dc6507c08a7d8a0464dd6ce0807ed823c7
SHA256e48e9a30a3933835fdf10544b206d669da7fd687aff0d434eb6e84f3cf09279d
SHA512d7cbda4f5114a3b9564ee418286124c6f809d7ccd8e2cbdee77bb63cf6ef4a09601cb64ddf4e4858a5ae2bdeee0b686f8e0b2c8886a0bb88c9168f7fd9410ddd
-
Filesize
472KB
MD5493d1bb97855d432a148e7568d97c699
SHA1397c69073b7347b0925cc64fb0547879536f92e8
SHA2563445f9cb5e2d67c29ff3115516e3677ff6bb1850a7e875baca16367a6ed7ace9
SHA5121876739e47350e47135bde747d34f11ff3d32ee1cea9ab68af4268f2e1bbea7f515a03a74f6747c04805a451729e0632cd75aef393f59ed29529a72d8157cff1
-
Filesize
268KB
MD55d73818c44c5b1661796ec0f3e777a95
SHA1234c311e688ac172fc9832a935813909bd61daa6
SHA256241288535efe19024c1d57f48e6085974191c9a0dd44af3a8b568c890c3ed12a
SHA5124379e6b7c6d11f3cbdd5d5241b16670fb5517b223e6fbdaaf3fe0b922b9cfa97bc14c5077e775bfc05f2f1a9aa725e1c8bf30dc90bfc8531deff86baa8922b17
-
Filesize
61KB
MD567768c32fd76afce5e1967afb5185180
SHA1a536b361a9965f1e298e5a03f0af9e6dab65c42a
SHA25606e9909c90c952cb4aeed7464c1f0879ac649ccaa116c98d6ba34a10d68b4b7b
SHA512e5a65035428ac55592252db4daf75276021242ac444ec0676dc4dbcf90906a72f9885779af39dd53be40797f4f31b655fbc8ab5a5dd8f5786d8a2cc7b67f2ab4
-
Filesize
55KB
MD56c5ab8dfb88137d26766b8e0896eeaf6
SHA1c6383daf39f51d3438c4449cbc02fc2d51b67e94
SHA256cbccbca96ae23e5d5c0520a856cc8aea1711eb697cbb48bc97d05874561578f9
SHA5129a3e7d99b1e9e5281a5b5dea7b2d81f4b3813587a0788c63d5607a334558ece658fd1d5535055225d9fa7b6a1337ed72914e57a67a801c493408bd1bb5db0ec9
-
Filesize
215KB
MD5352dbf3e595714fba32b96f02c55713d
SHA1e388070189ab5c2c97822cec0e2eaf6077647765
SHA25695d0e82115bfb361274aeb05f15c1ca9c36d933ee91356c4b8f36b82653debce
SHA51283b1b7c5423fca2fe52a35f5dfb16805c78696c0a0cf2f7caa6bc9c32563684a5ffb42e4a29b304b1e6477f83c454c782745f5cdaf2fc33058e1c92497a39300
-
Filesize
79KB
MD563b4c298dc21bb64d878b401fb291bd8
SHA18b8fac890baa8da16ea796749ca121ffabc32c4d
SHA256c6d51ab66d61646c44d2c6258cea9406e689538a59e69ebb8b831c4ec7f32bf7
SHA5121dc8805dd27b6ef1a6b0cad12eac44e0e80a102bf1bdcabd04d94633549e76fb0d20c175680462cdebcf4545199c7db2b96133f8d0f61fcf393a6b8059c12a54
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770
-
Filesize
318KB
MD59391d2fe2f21fcb34bb10cf30f08bcf0
SHA12d74fd4ea9c8990452c80fe63d1ab99c2cc66c3d
SHA256609e0b051f0c2a96adfb8349cd67bff04b9921965b8fc55507276bdb4f0b5d61
SHA512992ca3f76db3cb6030eab2cc027a528d12dc875c0084d677af972650f323b53d928b6f0be3e4a2aba1526924fc1601e77b3447d21c956be1078890a1d57cd766