Analysis
-
max time kernel
295s -
max time network
298s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
22/02/2024, 08:14
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 2344 b2e.exe 3860 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3860 cpuminer-sse2.exe 3860 cpuminer-sse2.exe 3860 cpuminer-sse2.exe 3860 cpuminer-sse2.exe 3860 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/1388-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1388 wrote to memory of 2344 1388 batexe.exe 90 PID 1388 wrote to memory of 2344 1388 batexe.exe 90 PID 1388 wrote to memory of 2344 1388 batexe.exe 90 PID 2344 wrote to memory of 2288 2344 b2e.exe 92 PID 2344 wrote to memory of 2288 2344 b2e.exe 92 PID 2344 wrote to memory of 2288 2344 b2e.exe 92 PID 2288 wrote to memory of 3860 2288 cmd.exe 95 PID 2288 wrote to memory of 3860 2288 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\57E4.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\57E4.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\57E4.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5BBC.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3860
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26.4MB
MD5cf99e1ad77ce405566a0536126408680
SHA1022b20579eda24208f645cdd86e055284bc7c77a
SHA256a43413a8c79a8632834e40a61c365ee2ab65f8ca9951db46dc852578c5b7df6e
SHA512fae51dbb3ca7dc6bb85882d210d6917e628aebd63e6755a090b13868fcaebf69a8e903425be156576b214d13be6466e4c245957f82f0a74d63d59cc26c024ba0
-
Filesize
9.6MB
MD5b040b616665ab19474313141578c5dbb
SHA1c6a236d60457f620abccc75af2ea06e6ae0afffa
SHA256859691b8507279e5caa04a02257391e49511fac78eeaff4cc4d110d66df2cc6e
SHA51244e68b9c9d791ac70140ccf09718a372a25f5d0b973673defab1d9eb6cc83dde46f68f6653eeb5343e73484e6d042c3e56dab14ed000d321da289236cb3f8f65
-
Filesize
10.3MB
MD54f65746c5155649200369e0bb0d744a4
SHA16c845da6c8d584aacc6f83bb97fd7110e22450fb
SHA256110537d50246e0bba7ffd6e8df34c7fdf3f3a9b8ada51be535b1502df4d20efb
SHA51244af6588ab1eca0ada4584dc51f5604f9656097bd52ba59bfde5604c3a57735e9dba28a0943564c2069482a764f264dfcb162b90c21c6e2fa267144d099dadca
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
832KB
MD543dd8ab1a0fd7f177db516faa81a9635
SHA166a8b6940797f3396a4f1a6deafca1fda5bffcdd
SHA256d4b58fa7e09511b58f312b57e2067823a7f31ff5cd6369cbf5ef3667c27b60ea
SHA512064753e38fb6e2d64a8ce067a52c24b55eb11cf714a534f3557a0e2bd2f5fba16030d8496c7787f4b272ae6a696f4b017d99771488832d12711a7158c927f772
-
Filesize
64KB
MD542871db599b90c630b2d75268c8b0116
SHA1fb3a97b9517d4abe248a7c1a0fe0f528f40b29bc
SHA25680110dd27dac90724987601037bc7d4bccdce1afd95aeffbfd8cacd813b891cb
SHA512c32a1b46ab54abcaf179759b2aaa5aeec58a353ebe552b09ce1980ab54a9c702ae1e348c2a9c2020f74fa7c7bfb4d4bac78396f76b6bac04227436deca800438
-
Filesize
752KB
MD5ce457c5caf8ab82eccf3407b720a3021
SHA1f7b087f7db0cca48bb04e29558646776283fd276
SHA25668f1c510aa0c1f4cd4a39168f0168fd082cf64d77c0b10118c07908c14f0a0e8
SHA512a40f19cd65d61a119e591061dc65f388262016506599cd2c9ca63478d829690e4eea3dcfa5ed02edac2fdbc05e0e8cc5cbf036b332f8edf56e44cc971c1abaa6
-
Filesize
448KB
MD519a61444b6e2d01755ede80960bca19c
SHA1e0c7222784d3e2b3329ec3280648b17fd60ef209
SHA25613fd488b38f3b75438e9ad0a033df005cd397f3c92f43275714a0a7eb3fb4db8
SHA512bc02c82bdac19f10f3e3a93d3f507bb7838c9255b7cff5af6e3a7f3b471dae9c45c52728c3c23857b3402dd1702cb51a20f225a4da992c26a997c26d86b6b1d9
-
Filesize
768KB
MD5fe316f2b417e142dffa0e03efb65e1a4
SHA1907805b2c3bc0a0791086cb5fc8e3a950bc78e6d
SHA256aca06866767d9e0bbe1e9bef7efce1152d34243e1acefc5f7ac4f6a245456671
SHA5128ebfa0700b00c4064d1ded11fc1b4001f01238ee0c4cf88a873e0ccf38c30a574d600649bfdef85f2e3aec5c279a43680f7a66604bc6f27bbda0219e3786774d
-
Filesize
512KB
MD56162b21c54b88c5c990e82aee951ebb4
SHA1477384ab8ebe5f5a5d5a91603736d9ef53c12fd4
SHA256462eb68967c7205145d0b92e4f3b69297f616187b07a189178f35f288063aff4
SHA5126264ee49c4b8a6eaa69241e10ff9ab39445f85a57b756b8bc0530b45d77827d05e669dc06b689d4693db34e4161ef11b2cfe6f1954b0b90bcd434e81a938a40d
-
Filesize
768KB
MD5613807ad6d525aded318b643c33bc17e
SHA12c9a4180140838c69c20bc4047c3d2d777d3bee4
SHA256896775bd33edafb0d219d1ae3e973e71aa29a4937d0252bd3a4cad074c004971
SHA512d688b0f2570944898097dcc6acb56b3a4c901073f0ce22b5ea260b05a37fe2840d84b44e7aa74c7d73078b0e5a45c24994852f5c03f049982b6ddca6ead89539
-
Filesize
448KB
MD5ca123cec7f705c0af114e462349dc686
SHA175f90b4d95f6774b2f66e4ba790755ef118ab222
SHA2567f141cdc0be9c965e21310bcfb0484b20d31ffd8a6a970f8b5a53c0e8974798a
SHA512650125faa9ae6733f1118caf3101ca6850473f78f9bfc3a87e908eac1c69935e3bc269ffb5de4dd6e867429c1af35c7f3b9e62eb698fa7c9695d68e7115f3f1c
-
Filesize
448KB
MD59d1a04f05f75671a5a3ffeb995176c52
SHA1a45018bb6a5dd52b310c1eb77262354365925a76
SHA256c777e9d786f5d1d13f78a925453804bf53ee430a38f893f115c2d1ac0f2f07ff
SHA512d19ea63c26c1d41edd5947d0c5ae70e2461c876563c2baeb1fd4a3986254f7919f8d4c32a9d6b9f4c51c4d5a23ffa90a2011d293a106a0a8813295b2bee06e1f
-
Filesize
512KB
MD55fd46a66845c804b88dcd97ffcd66652
SHA19556ce5607bdd245c8e4d6a24b8217def653f57b
SHA256b7fd85a2268a4d62fa15fde3d9e51d6fa3bc865cb4d8e5fdca309be7b027f193
SHA5120896697d588401a6d29c30e77574ece4f0ba699b082b1bad93964748313a5903eb4994ec81c61bfcbd75f2be3f5200dadda3fd1454381cc5874a9c8952ebeedc