Analysis
-
max time kernel
301s -
max time network
305s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
22/02/2024, 02:10
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation b2e.exe Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation batexe.exe -
Executes dropped EXE 2 IoCs
pid Process 1228 b2e.exe 3608 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3608 cpuminer-sse2.exe 3608 cpuminer-sse2.exe 3608 cpuminer-sse2.exe 3608 cpuminer-sse2.exe 3608 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/4692-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4692 wrote to memory of 1228 4692 batexe.exe 88 PID 4692 wrote to memory of 1228 4692 batexe.exe 88 PID 4692 wrote to memory of 1228 4692 batexe.exe 88 PID 1228 wrote to memory of 2288 1228 b2e.exe 89 PID 1228 wrote to memory of 2288 1228 b2e.exe 89 PID 1228 wrote to memory of 2288 1228 b2e.exe 89 PID 2288 wrote to memory of 3608 2288 cmd.exe 92 PID 2288 wrote to memory of 3608 2288 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\487E.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\487E.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\487E.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5704.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3608
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5ba41ebbd19690895b00288ce1a21d231
SHA18b276bff5964dd82148b77def75e3772ffe42465
SHA256fb21bf70cdc7bea0d6117c926e0ded1a630b6c34ca6e58ea3e4b3f61574dedce
SHA512b7970e0c7d5fda195e9054c8969e52eb998965ff3d16c8122022d2b3d6922cced80cf80ef3f81a460e329207e7710610d1ee0712c4c674d9af201edb39f19a9e
-
Filesize
3.1MB
MD503fbe488e90292750d70168f6f50dba2
SHA1cd3eb668a0b8ea196c1bb61e8c4b18c95feb1866
SHA256f81d27a74a8911d57d52584cf025f711657d69107aa82606564c1619730993c7
SHA5123f867d9f57b004664f12b2cfdf54f938d57667c7540d87c320564f084c8358b09ea9bc8839eb37ce22405d5d0e9e02f77383d7d8548fe242a58a8ee4937d78ee
-
Filesize
3.2MB
MD56363f8515a1bf2213dcb7991798e9d9e
SHA1643d5481cad3709881a11f8a0792bbfc9ee33240
SHA2561159f6be226fff282ccb1b0fafd0ec026265fb0dac34343d1bf8b47cb73a22fa
SHA512186242c296034fdbab1391b486c9cf8b479e3212e07bf4e71067ca65d818f61a9eb5c3729f55cce49641b0bd2700ae1fed1e4427760f30485183518870622d4f
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
671KB
MD5eef9437394eef789084f219de6ce21d6
SHA1bdf47d654b1fe2cd093bd24a9f1988764efbd44e
SHA2560c964c8cf28dad51a404aa671143f9a32165269ce09ca9279c3eb9cda869e501
SHA512d6b008b8c2e870fb791359c3f9af57e5925bc14511ec479cf689804a2a9c7feec211102ab32be00e74c98def8cc1625f749163f07045fecce61f8ccdc9a9071d
-
Filesize
568KB
MD553547c258414854fa771461853403e44
SHA1a2982a08e9489c30909ce2e40924396fc5d4e16a
SHA25624a1b84c0f54114b0a1bc3817f60ea5ba9f3373a6e7d2bdc5ed121d3db00a09e
SHA5127b2fe4353e99ce29fe087f177635e947986a1ec1ac0cc8c66fca716677572bfacfc09ad81acf4451ce4e98583c9d34ec077226d10d97461abb31ffdd79224be8
-
Filesize
445KB
MD56ee664c25d0135125405be1233c55b9e
SHA1a7da734b65dbcdf1d3829e4f005293d600c5e74e
SHA256db84e5461b5602509de760187b27cd7c2d579e24d974297332aab2613fa0fa4e
SHA5122b3b9b040522ad0735769ec4dc0b9a04c43d7d93ddf670d35f5e6a512a90ffa99be6b3e5728afc325946bdc7c4ea3b3563a4c02bc9594147d905b637301503ae
-
Filesize
322KB
MD50d47e0ece70d9cba8e9d74c37f22ac06
SHA113a345cc49178e7cc840f2628f19b6c082a23ab3
SHA2560c8f4aa9374a0634224e4d1820494086805d7a0663d3db96cb5e11ffa6973f27
SHA5129fe8a34735663c407193a57056ca1c32a07444518cade73103d12edc4c22ba73bb3d97226de9e214ac00d48ad735a533c53996d8e7d0b64c9d14afa20bcd0325
-
Filesize
547KB
MD537ed36efb5325fa8be7d540e25e2813f
SHA1b89e1841dfbfdd57a7d08948ad8a2338669d6ea7
SHA2562a3cf110097cc74ccdb426017f6fc6bedc3d62837422384b570f6e4b1a22d615
SHA512f438f009c56058105938810ff7efb9843e4e5b65baf7aaa7fe4cb0eba9682b32a91a44cab5cd864f997b006c802f29acd359a30f035f50801cf5ee114818f20e
-
Filesize
346KB
MD54f68de3792efb487889743125fd62b14
SHA1132830d3e89c1c2364a1e1fad369f17b99e37c59
SHA25629d7c520880acd020befc239d869300d33c500db3b29aa1b188dbfb30d84cad5
SHA5122030e6844b82b662a16dde9c58fb47711ead25d09c52a7d81e79ff9e951fb721c7650846aac5badd933c7a34eb9e44971eb0db04447cd83b8557afa7e600e2b2
-
Filesize
486KB
MD52c45fea223291c9ebdbd3aec1c729bbd
SHA1c0b4116e550745b572190661ac2315fb67dfc223
SHA2565aa463b99b0d5666ed52eb73db0b731a7f336b7964ca11809780244f4f9ad672
SHA512465062068cea99445984458a9870788cae275a960b4cafc4c7731646adef898b0582c2991a573f2d19e2fb89a0e60243880d69c82571aac7ef56d7d660563d5b
-
Filesize
124KB
MD5ae578751044edc43065799069805b36a
SHA1b9dfbcf80f03695ce454e9ba8ee642c300f5123b
SHA256e472804a6d02e361422b51c627b026bc20a5e6af7a20f29387f242a97058bc3a
SHA512b93411a58a96f84d8aad4afac4dfa701dd22a03793fd1ca25b4bc13813a565acc5afffc29f35cc502716d61cf722ac076d3050a93f6e7428f9db95a845e3480d
-
Filesize
128KB
MD599d07bed333da7b46a08e2c5b235271f
SHA1cd9aa4732431da378eafc0b0f12fe32174e821b4
SHA2560246989cbd6ea5aef4a7fd08becfa4e716fe37804c74d225dcae4953b83848eb
SHA512a31add68a89a2d02f59f51b17d2ce18703b2a29bbc17a0910f7db18e4e6f9823bb8a1e2ac1079f4bc6db47f42d0abc8fae093c4df7db299f16a1881766e2159b
-
Filesize
314KB
MD560ad29c92f4eb90c37fdb468da9c4b16
SHA1a26f9fe2f4ffcee3105f9d6327cc5834d9b6d0a8
SHA2562795777a8cbb945386f87d10dcad51e9d9864a5bc412cf32d67b1a2a877ba151
SHA512ef62e4bfa1b9b3b12229c79612d495fa3e1dbdb7978653ab077e9a5d53c8a9846814be9c62beb682a51d21a0456e44b7361799ea9ba63b1038f7fda798bd88fe
-
Filesize
298KB
MD583bdae70416b92cf0e45568db9b7d333
SHA1d2effbe2e160cd0feeabbc07088cd15a9c3b7b91
SHA2561df5f53da9f07c5492254ace4c28599c401aa044aad0ff56d2ea224b5f80cdc0
SHA5127c24745b2349b9437858eea080b52bb84fdd09829f4542d19d536e7b880181bbe2b11650f88de0d12c0950110936ff8b1668d52f2a4d60aed4ee29167826ed66