Analysis
-
max time kernel
294s -
max time network
293s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22-02-2024 07:50
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-en
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 3228 b2e.exe 5036 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 5036 cpuminer-sse2.exe 5036 cpuminer-sse2.exe 5036 cpuminer-sse2.exe 5036 cpuminer-sse2.exe 5036 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/3264-7-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3264 wrote to memory of 3228 3264 batexe.exe 88 PID 3264 wrote to memory of 3228 3264 batexe.exe 88 PID 3264 wrote to memory of 3228 3264 batexe.exe 88 PID 3228 wrote to memory of 4804 3228 b2e.exe 89 PID 3228 wrote to memory of 4804 3228 b2e.exe 89 PID 3228 wrote to memory of 4804 3228 b2e.exe 89 PID 4804 wrote to memory of 5036 4804 cmd.exe 92 PID 4804 wrote to memory of 5036 4804 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\3950.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\3950.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\3950.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3CBB.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5036
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15.1MB
MD5519cbcf5daaab133d8ed79b8a40edfe9
SHA175376dfb46fff78ad75971198e395f0db9750d6e
SHA256a2c2eb423852f3fbdf147bc95bca463719966662ec0d8560dee08fa2a2a425d8
SHA5124517c6f77e5c837164364934583787fb586dc2199ab72e427c1fb3eb95a71361aa6f1a43790a773d982ce801339c7dd0af1e84e83777d3df7834d177761da1ee
-
Filesize
4.5MB
MD515fe3b622166db04c27b3fcb5ceffb24
SHA1a794100da106418811d553ba4bf0827f5db2a1ad
SHA2565607b3451e0f482583e6ecab18a8220ca3adda2ae9cf33d4de26b2ad52702343
SHA512a1568593ceba6c60da1fda21ae76e2c154db826f85163663a2aa02cd70ffd4dc1577060fe320bf0cf07bdf83945cd52a57f417fed60a730b7c2a38569404f2c4
-
Filesize
6.0MB
MD5465b4422d9ab65fb00e6780dd675048e
SHA12157a662a442951c3f61a94b6ef84c410b3c3797
SHA256e19e7faaf6925fb691c14467df65a798db09cc8900e8afa798224ff3e75a6743
SHA512e9636f0451634807a9fdc24f9818fa08611632c508487228583a4e5992a25739352339c9d26077610219d6da430e735499cc4fe18385af142df7737e12c8c267
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.3MB
MD503b9e7e873e1ebb7271617820d669d6e
SHA111712347b8d31505967f51bcf4bd138ae9d3c4b7
SHA256b26fe04e255b0e499a5bf8afd56a9f5e6008531c9cc5910a4c72920d04ffaf0f
SHA512d6ea6c0e0574ef1f3e5d4f35c331dfaa6536bfb77569d9ae84af6bc7cf9ad0efceb48e0d3b1440e6dcc8a686742277484d98d07f01e42a1efed18c3de687bdc1
-
Filesize
1.1MB
MD59e5427d2aac7d2f9ffb593dd466dc672
SHA1e7b5099d169e4f5ed4d697ea74913c7d73bcb779
SHA25658cf5dfe6285cd0227f23f6c9981668c3e60fe2503fa06e7158fb35d3dfc6bb7
SHA512e0b768f72c20c84854594ff42d1d42769c88140578543f994a71b7dacd763331a21d3e641b24f602be9358d2c004b4b869ca032af1109401eaabc9f54c776cb9
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.2MB
MD5a4936181f096180416f7d5f16ef56c74
SHA1efbf69b6700b0dee0e53b5b5a968f02170eddea8
SHA2563a60aa1eddbf677fed989455aaf47ad108b51f92c7b8e017332cbac98255490c
SHA512ffe716220ade048221f4c8528fe199308fde60ae6010e73dac10dec486b4317390e0b635173fe0b57caaa6ebef5593a517cf00490c1fa7f3dc0535a268a86320
-
Filesize
1.5MB
MD5db3542b57d926bf4a571fcff00c50e34
SHA1742bfc8541247c0a5335b37fe1361fc47b993d96
SHA256312e0a344358dbe18afa1ac760f1e33d6fc7dc3125a898dde7a78603aa8eed4d
SHA512efa145661c8622dfc4ad3870ded9dc1dfa1b47bf9214daa2fffd3a058079e69a19a792ae06bebfaddba3d2438c7030affc84279c4edfc0b79bf19099efa68145
-
Filesize
1.1MB
MD58d5b07ded1f7766b43364213b3170138
SHA18edd29f7bfc4ceb37c0ae3aeb7b78630543650ad
SHA256189d10d2a5127954248051de96e0be72f5360ab6774b42d56801d3b9e06636a0
SHA5129bf59a6fd17bd5f1ab3a66ca53a77ad59e22d4ca363b9e5f8ecf6fcfa394b4ec33c27464670b1f6cc80951fcbdacd28c0018d46f11fe9715cf774d3f40c1e085
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770