Analysis
-
max time kernel
293s -
max time network
297s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
22-02-2024 07:18
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-910440534-423636034-2318342392-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-910440534-423636034-2318342392-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 4504 b2e.exe 2632 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2632 cpuminer-sse2.exe 2632 cpuminer-sse2.exe 2632 cpuminer-sse2.exe 2632 cpuminer-sse2.exe 2632 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/2932-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2932 wrote to memory of 4504 2932 batexe.exe 88 PID 2932 wrote to memory of 4504 2932 batexe.exe 88 PID 2932 wrote to memory of 4504 2932 batexe.exe 88 PID 4504 wrote to memory of 2692 4504 b2e.exe 89 PID 4504 wrote to memory of 2692 4504 b2e.exe 89 PID 4504 wrote to memory of 2692 4504 b2e.exe 89 PID 2692 wrote to memory of 2632 2692 cmd.exe 92 PID 2692 wrote to memory of 2632 2692 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\591C.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\591C.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\591C.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5B8D.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2632
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5a5bff2f3815f72c0780d1fc9e6bdcd5c
SHA179b7598d5504bf1de4c9b6869b3d044885b7885f
SHA256f21d2adfbbda006f061d23bf1f99f20271a26845c7d61462cc0b08c3168d1d51
SHA5125e4d59c3343754a8ead6588ceda499c9d375e9c653b779437334fd9249d0b81a0e46b04f154bcf7f1033381492ce7f70cdcc3016a4c7724f7c089deba78849f7
-
Filesize
1.4MB
MD58d27090f74cd16e974fb892f39173888
SHA1cfd25f4ebe133a9568583ec1d65761bf1eac33d7
SHA2563b25767d8c3b15807b5bafc2e9e1cf38758aa92f9cf2203e12e8f0b3d470120d
SHA512b1b682e721f9bcc8b62e2f5c41b2d3c50d62e3ce7ec1bb6414e2b1e4e7d5afd831fc3bc614d2536bb511307f4e1e1913f676ecd858a4c0c7beece4e82d149f7d
-
Filesize
1.3MB
MD5960649df657c687533c77b61bc4c2be7
SHA1cbd7ffd0c4b7babf947e69391b1131f6eb86887d
SHA256ceca10fc12b7a964ff27bb27f60cd46b7a40ec91fdc5b3efe85152d9647e1851
SHA512bf3cca7c5d03aeb37b07316368cb03d8e472a3768d03317847fe9d8b749f51e9c950e6f33caf338977d63da26aac8bcacd291ebc990754a5aadc98c57ca5300d
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
248KB
MD5e2130d57d5372f5a4203ae37d55d4ab4
SHA1dda23b675fde8ce00609b5c21d30875a71844270
SHA2569cabc45eb0a4b14529978a78e1ae7bab11dc21fb95247354b906f32ee741cab6
SHA51210464b9e96f9fd31d19fd7e8cffac8fde69a3e0de07875f8eba4beff0493562eee39569fc50cf08ad45ab7ce68bb23315d4765de964732544380f69ebcc7da06
-
Filesize
254KB
MD569cba3d420f95ff1fa50b460b1feab08
SHA1e7b81d7d0149a6087a5cf62c5492b4e93b97f2ab
SHA256f2b85448039b18fec27050aa8f83afd2560cbbe1c4e574eef8f087e4a44a049e
SHA512809ba0de9a8f38257015db9e68696945056ae7f77e1df2c2f177d03c84e4c550c6ae1cbccbc8b5ca742590d785243fc1b1f722f08766152d1530a9f1b5a56a15
-
Filesize
283KB
MD549fb56b1e13abad75ff01a6bba134589
SHA1a58298886fe6e485459e76337158fe993b02e660
SHA256d47cf2e743950bf9e0bc62df6c3b8bd99cace97e7ed9c77ddf8fad6c982ee51a
SHA5122e9787204561cf841242b93bcba843c7cfa636acc3c77f60b19cd34e8bdff61682476bd7ac4b76d86c66339813a51480587c07d2c0c75f0d74bf124dc94bea3f
-
Filesize
342KB
MD55c9f355aa61e5857cf3e843d48d8b8a3
SHA1d2b3aca965625d259db72f02a8990633b3b3283d
SHA256b2ff7ed8ee84ffac57b6c0b607a32b65e1c68dd69c352e557f124ddb6cd39845
SHA512e9d559ed0fb20e202c532c30e69ef82a6ffef52643c8efd953400de76ac54a0b295c72cf2569b1afee8ec4107477af409be4de62f61cd5239df710adb40bcb83
-
Filesize
233KB
MD54ea0a43078b80efbbd665dab8f154c12
SHA1bd410c3d972711291af034b3427d616bb4225a64
SHA25649000c87dd6bd2504e4c7f3e805f6938bb203af7f9793be5a62431da97b7d207
SHA5125fdf7c35be959f65c097fca471de615f3f80b97a94ffd3e4646e8d4a8f0ba5fdf2238cc365e80221d3bad1419caccd88cd5c9f31cf03e155a06120ce98630c92
-
Filesize
444KB
MD5d60e5b56eb15bf5b7fc056f2c9711b77
SHA1382f2035fed876d6b1a046f707877a8a62f2962d
SHA256176224f598609596b75eeccfbdf080dda446b314114dfa451f60eb9f90e404c3
SHA51212ac42fa0423e575055c5b05fac427b751a77909668c24ca902d6de3a53b59ac34b227949a577f6f04f4d555961a9987011194401e5cb3f367d7512a30f90728
-
Filesize
310KB
MD51365811b839d21e9ba373d31256a74f1
SHA16dfe5d01ac65343d5764155c1ddea5cfff5eacb9
SHA256b44aa0bd6fd811b6be6728dee696a13cb250fa0186de69e956ec431d582d7b2b
SHA5129cb7d8ae273ba766a0a6f40615e76965364eda88551f98f691d3aefb81960a77cefb5cb2c8b6f388aca3d77888003c7efd60bc64462acba405fd7846d918697e
-
Filesize
298KB
MD59c7cf351be4de4992f71db2693e1d05b
SHA1951c50b34f3968b149f4a50ec643106f518e08d5
SHA25675b86a9a90ce9fc63830ee1192b6fefb05346ed76a398cfd1c61636a47a38155
SHA5126a96ed250ca09ae8579bc1c47a3b7c3bab718e60a2c81ca6ec00dc05e3f9f6ce9a10006057cda2c34745c84bb6cee2c3c616b34b9ddd7c878a8b67cb5186b57b
-
Filesize
223KB
MD533bf0f6fe32f7ac1771cba072ac988c0
SHA1eb161528cce63314ef4aa5b13f0959d39d6e73a5
SHA256b23a7aa8685350589fe7f8b8bcf7bbeb394c1c21e770fcb71ebe9b3d501ef907
SHA51257eba82355a5ebc4d23f3be7804ee9eae9fe5611d2780f4aa53bcd242deaa3f38c556dcfd2a30e94fd0ced961d5f6bad55c1caac0122cf9288360c9593b7a2fd
-
Filesize
338KB
MD5bf2e06db53da54bd1e27baf739675b0d
SHA1a6f466aa386f0c6836a51d9393488d3b804a855a
SHA256a4b3a860353b9569f6b0e6dffab0fc5633ba4de9ffeb77fbf894286b6c09b0d5
SHA5129788fbe8ae0f46b0926343315497f3a1e4327388d29b8b16ec85a73fe3ce7fffa26b1cfee6374a26162d6b9377374e7b1733860e2831a66b8f449bea50c3556a
-
Filesize
359KB
MD58c710f4dfa3762311b0d391934167a6f
SHA185e26216dac4d4ee5f14454290f7ec4ec2323d13
SHA2567c54fe7b9665155be1d8c4e65635e61ac520acce645e839d269d06a241404f1e
SHA5128b2e33d74f75c52cf54e658f53e384821795885743ba584859a610f3a9ec18898f1d8a2bbb19d93cf276a5b4a62f789953ef3f4846537082db3ba43de3f2bf6e