Analysis
-
max time kernel
295s -
max time network
305s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
22/02/2024, 14:44
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 1588 b2e.exe 3660 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3660 cpuminer-sse2.exe 3660 cpuminer-sse2.exe 3660 cpuminer-sse2.exe 3660 cpuminer-sse2.exe 3660 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/4396-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4396 wrote to memory of 1588 4396 batexe.exe 87 PID 4396 wrote to memory of 1588 4396 batexe.exe 87 PID 4396 wrote to memory of 1588 4396 batexe.exe 87 PID 1588 wrote to memory of 5056 1588 b2e.exe 88 PID 1588 wrote to memory of 5056 1588 b2e.exe 88 PID 1588 wrote to memory of 5056 1588 b2e.exe 88 PID 5056 wrote to memory of 3660 5056 cmd.exe 91 PID 5056 wrote to memory of 3660 5056 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\9E72.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\9E72.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\9E72.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A558.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3660
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.4MB
MD59b2a4bb1a3c9a77cde0b088709eb73ad
SHA1fbe406209e546ee563ae5ed7aed0183ed2ed2a8d
SHA256dc57351853f0f5e1b3c2dc9635aedba1e0faf86237d6da79b0c77afa73272caa
SHA5125bc777ad17f4825e408bff69597299903c67c73a819631ba99ca31229fe745139aace3845cfbc40c78548bc6f155e76738ab65f8a77248856a74dc861c2970d2
-
Filesize
1.2MB
MD57b3805db6db875cca56c40c0b269b726
SHA14c0c85fcbb66f7793c050d2ab2428865c6776192
SHA256d9fb4b56dc1c536a161fc2a5f4cc4890cdf6db399d50137a8c7054b11326f25b
SHA512c45442ee36249d1ce0fc7c664ef5b545c20318b10d39aeeb22b39ac28068dbffd64593a574052fa7f646c635648e2a78a36ab87792523175b8219e7571683f2b
-
Filesize
1.2MB
MD57ade0d5cdd8abd773f16fc60152cfb23
SHA1c4b899e22defcaf2e1c27cbb349120c9c0461802
SHA256ad046d44441e283ea22e5188f579d1e5da73f610f60ac12fd6814adfbbc0544c
SHA51223e452e5972f00932c0323a6f9e48cfda120ad3acfb067556e9c8c991c35490601994da42d9265276d8647b350d7a56463562ec55f3b68c658592156ecdf375d
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
548KB
MD5e4a6d2224fc10456bf7fc2b2fee62045
SHA1393132664ba38f305d024af68d62754126e74954
SHA2563f9ed75df1938746bca20ac5905512870afe68d7e603ad8b1c5fd6730b22a3af
SHA51222d2bc29c6468076384eef4f593095e407478996a60b3cb305907f9113ee4003dd7c110dc9d0a71e8db8715cd8801687fdf5b3244dc4cb5a7858607b3bdd6142
-
Filesize
781KB
MD5d63995ff99b693c9fbbab2404929d1c2
SHA1a08df85567f1b764aa04a19bc47c0cf097ded3b0
SHA2560c554332e755fc7bd5395f99ff8194d0f2f444add67e606c68844488142f7615
SHA512f3e08c4874af60bd61f5287c2c6c4db78d28eb5ff170819e3443f8d2155131643d7af341608d98b522eb742228a18aba7b24cda346e402c810b5ee481f21376c
-
Filesize
369KB
MD52cf914e0f10b4bbe74f7e8a7667cbeec
SHA177f5e94e3d3198329de80905eceae68681956a69
SHA25692bd19e1f2c2f51d63d956e2fa32b8f38759eecd47ffa63734bf9b584c2a3ffa
SHA512a9ac6ed6dd50690a3040b02b8bfa7b2bfc8a562513abdd50fe0912ceb10cadb7cf65868aa4adda32f15d7dc4d6f64e795568ab3dc0e7a127fa0f83ac303b06f3
-
Filesize
690KB
MD50f2577e9e7ed6e9b81f7a80c8fb5670d
SHA1eeeaeb20b4ea99fc2b412714d8ffce6140a07438
SHA25686745ec5b89ad08e08997d44f226e9c954bd22d1497b29e7b1daefea7c9f8f87
SHA5125bcf7ecd2e328914b4bf339091a355009c21493f0750c5fda76dceaa1ce773e53141a1aea90fcf056d1a86b5057f3b122322a9cfd875d7b69cc235a56a4daecd
-
Filesize
704KB
MD54acb381cc4f98fde7e00c433b4ce0163
SHA1eeb11fcb16e337abe92ab9b28d5ee574d4ccf137
SHA256205c7bb70cf6da6475fbeb0da9986b061dfdae547e054927ea95ee138c89c717
SHA512feccc4a128bb5480bd8dc4fa620e13fd807a0a02813bfefa9b3a9ca77e4e672d2b3b4695c2c8cbc7b8ff681790898fbe17717377621938be7a0038ca6e0de4e0
-
Filesize
593KB
MD58a4582dcb84df04c28bc05a3229b7074
SHA1f4a9482bd31371fdd6cc8b2c3f590fab375a0f97
SHA2568fecfe62d7e388807e5283a4a7ffa625f27130eb5e0b81a88b9ead5e5777013f
SHA512003749f6b83ea2e7e3fa389f4aca8b71991b469e75dc197bdefb748e5971dfc583034a95a5cb0bf654890246a3245077b9aeca10425abb23f4e3b9547f5fd93b
-
Filesize
850KB
MD5eddc406c769a8568bd7892695768952c
SHA1214bd3ff6e91dd699d6c5701838066fdd53da514
SHA256c9d823214dcb55157871d140c17b26b2af8b4ac75deef2e890b60d2e3bab81d1
SHA512722e107fd82e8d257ce9eb14872d27f0716bb4c7d604803a24912ad0c1dc7f603c98013ba958fb889afd5d89dbf0d2119e2d57ef48875afa9bdfbc67d92d752a
-
Filesize
546KB
MD5e638deb02c7d3214b9b68aa4c2cb7755
SHA16e5a5204fb6d13fbab5ba35c29b3a6e28455cf49
SHA256db83978c3e7b3597db4f498ba3c62167d941db269c4a288f1db3de8c90a7ebb5
SHA51291358403903149dacf9c5ba6ed6e3b60a8fffa627e8e82bbfacae3d89f17c2aa3f67cd0f8ba4b8208134ef545d6c7493df9eb7ad3aa7ed3f0498aa09c5af2f7b
-
Filesize
706KB
MD502ce8b74ceee76cb91d893a5559ed34d
SHA16beb65e66cd4387b3bacdd1d4e354e9d91d65c3d
SHA256367e90aa7951d676efe26e4e725dcb43f22c26d625333b8d37dc0dce6820ff92
SHA5123cc3890d15b238987d9479e8638d80cfbcf7a6b6bd157c72b016c7a7e9cf4e40c92d7c19f936ddfc302b9e9cebd360129f8c16f223fe16f487ab1fc5523606f6
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770