Analysis
-
max time kernel
295s -
max time network
291s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
22/02/2024, 12:52
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3316742141-2240921845-2885234760-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3316742141-2240921845-2885234760-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 6040 b2e.exe 2852 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2852 cpuminer-sse2.exe 2852 cpuminer-sse2.exe 2852 cpuminer-sse2.exe 2852 cpuminer-sse2.exe 2852 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/6076-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 6076 wrote to memory of 6040 6076 batexe.exe 90 PID 6076 wrote to memory of 6040 6076 batexe.exe 90 PID 6076 wrote to memory of 6040 6076 batexe.exe 90 PID 6040 wrote to memory of 2468 6040 b2e.exe 91 PID 6040 wrote to memory of 2468 6040 b2e.exe 91 PID 6040 wrote to memory of 2468 6040 b2e.exe 91 PID 2468 wrote to memory of 2852 2468 cmd.exe 94 PID 2468 wrote to memory of 2852 2468 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:6076 -
C:\Users\Admin\AppData\Local\Temp\8676.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\8676.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\8676.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:6040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8B67.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2852
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.5MB
MD56499e9431a90f2511ce4237306d99215
SHA1cca7917118bc66584ccd8b1476a7b4a0cca110f3
SHA256c57936d1a32ae00c83eb59fe9788d52191a51cc8f7ed188b7c364ebc1f660c25
SHA512b1eb022275cefec01412d9259781640fd896e69ec9c15ee5f6da1381e210abde476301da8c6e4becc9e6e3486a198256069359f9d3be6a28666d050d0c5fc8a5
-
Filesize
12.3MB
MD5e06c656a3544be6b663de42b3099c756
SHA120b95509658827ff952be98f94dcf2d4e821e17d
SHA256abcc6cdd93257c50263cca51d3b715a75a813d5c428df2d8b5195f02f6da5cd2
SHA51265b03591530b789cca9cdbb265d28eadb9ce44d84ff5d45aef99f9dde5fe98c28b4579087d614657177d7fa4fbc779455c1b36cdc457e22c16065b546a1c05aa
-
Filesize
9.5MB
MD5f013d1481f3daca0d30bea71b3e54ee9
SHA1afc0f31f4c314b4f43c3faef7a598bd22fd3c6d6
SHA2562ed90af424346a8e1efe13b8a1ad60657211d12e833607c9ffa78820e2188c6b
SHA512b8e5957697d52f963ec32078151ba705b4d7ef9163681c5f1d9ad14f14a8de41d87fd09bd6851ed9c16ee86f3bed2a7b491b033f35d5d6393069d167958801d8
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
613KB
MD50cdee8ba9e49be1d6ff206e3b146e47d
SHA1a68b0654f70eb975f5a03119cf91b03f7d0e9807
SHA2562e8f3c69cd15590bca4c19b77e7ba202a9b9b72a4e8ffecf2e94a81ec739597d
SHA512e17c6eb3b1a6d7b4bcbefa6b07ed665d650025e48b69ca74ca71b60e701ffb3e8bdc0ef122ab9728ad1c67e6fdde983651e12073686a00b1fb04acdce3d4c324
-
Filesize
2.3MB
MD54c04147c386ba8792ac6a03069572a8a
SHA1dda67789fc1d0f2469ca95f01a5c81034853ca6a
SHA256c7739a1e940a282703d06eccda7110426d306f390e97fdbbd9df18472fd132cd
SHA512a8b5a0b878a9a7d30cb38feff814e1f4dce24d000158edc10a43ee9a89920bedf7adc92eb7e3913098b6aab7fbd0531f56fc09f508b5c2769992a94e55d153db
-
Filesize
256KB
MD511e8812bfa1d698cdeb73a16c1d7c963
SHA1e8708fd452ab5946b380d0c353ac26acf289e548
SHA256e0f9ddf8afd30511763f0cf792369e32c955f15d9529c00c5fe9298a80d74402
SHA512fd54c9c6f3520b2ced6b42235ebfce6d8b622c53f1fbf810baace657a7d44430968b5ff90cd1d860dbdf7550dd8cd467636c862ff0dd0832f25145efccc7731e
-
Filesize
192KB
MD58c933a591c8d0c1fec1da393587d09c9
SHA165f4672c0e0a6a20436fbaba57dac8c1a5fc5e51
SHA256c22ca427c0e65a0bb3e011afeba5244dd5a6e9c0327cfc7d15c4875083206b10
SHA51296b84267fd9b7c5587c74e30d5f647acabbf6b09feac19784de4e046619fcae78f2e6aa98eb7f06fe13197bfd9207b9044b09d5248480421ceb23cb01d511881
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
192KB
MD562069650d62f76a4cdf0e81172d99993
SHA13b20ec5b4a4320ee15b0f7b9715a9ab90f68346e
SHA256779a5590c667d9a704b79e159259c0646737394fd66a9c0b12d13f9445ca091c
SHA512ae1954a84fb7543465e77a4cd5cc1bdeee0cf848592958633e6c51702b42131daae64c302d5c9537c59a9b3ba9498e5bf913d1f6f757ccdb8c4183b33224852b
-
Filesize
128KB
MD59746d1ac79c8b499d8b2224394581fa7
SHA136b1985eabfd8131ad9f2b7f69c903a3fce67629
SHA25677941fbe96e0c797e6cf5419ee32bd3fcee69629cba37750146656a660c37182
SHA51261a6174e2aced5b85cd614ad2f9d3da24c6b91e1fc04e10ff818222c4323cd043a59708bd35af0de84b004bf492fbc157d72907cd1e7ddf7082fc2a3563ef183
-
Filesize
192KB
MD5625f906456510afaf916dd0384d76eee
SHA166c56574aff02fb199caa60ab71ca9f1c9e7fc92
SHA25627baaef233592b03722c7d64c26d2270c0300ffb8e7f08a8e0d65212af4b848d
SHA512041399c5ddc614d8b1a359238df8fb09258c95a0013e5139dbf4093b892395f5f78fa31fbecfee92966c5e78a5c5894005c98e559b8b5735ecf9c1995df51b17