Analysis
-
max time kernel
297s -
max time network
305s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
23/02/2024, 22:32
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 4728 b2e.exe 3988 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3988 cpuminer-sse2.exe 3988 cpuminer-sse2.exe 3988 cpuminer-sse2.exe 3988 cpuminer-sse2.exe 3988 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/4792-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4792 wrote to memory of 4728 4792 batexe.exe 86 PID 4792 wrote to memory of 4728 4792 batexe.exe 86 PID 4792 wrote to memory of 4728 4792 batexe.exe 86 PID 4728 wrote to memory of 5056 4728 b2e.exe 87 PID 4728 wrote to memory of 5056 4728 b2e.exe 87 PID 4728 wrote to memory of 5056 4728 b2e.exe 87 PID 5056 wrote to memory of 3988 5056 cmd.exe 90 PID 5056 wrote to memory of 3988 5056 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\95C8.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\95C8.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\95C8.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9D49.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3988
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.6MB
MD57d7868459691a2c328873b785a431e5c
SHA16c3ff9e0d21a95df0900c498d1bd6b29b6a780d9
SHA256fc1461f288f8798085b382f92a49c1f41127d18a15ff96d5c772f58a34c032c5
SHA512e6cd8ff58d9b05ea241678f213047b679b1df9787d5f3608015764a4bf3b46bfb6c76e6b6c7407cde0c1200d5c95720a602a857710b3fe615990f4cab5269b63
-
Filesize
5.6MB
MD5d009ea00d4e481b5cc36d8b9902ebaed
SHA19ed7f0293eb58a29c6bbb5b93a18f4c030c63212
SHA25622b6a093155754f8007ea4e1814e299a927d3a32187eaece9cbf13b228b48bbd
SHA5128f98ab491d94d63d9841a7ab7cc0c4842cae342938fa710dafe00cab6c8b6e044b1bd1b58df7854c08672529febdf225dbde5a3c71733f7d91ba9185dd4a5fc4
-
Filesize
3.8MB
MD51907494600a0089f7fe4da3e9c229852
SHA1de657fc02f17438f70d08627148862f8c4df714f
SHA2565b0dbdc609c71451abde1f74554dbf7f2f98bf7fe73d114d9ed146dfd037abd7
SHA5129a582e7f773b37dc09dd51877f77173c2e612a6bb6c6f40bf1bf5a662a2dd03e3630cf8f06ad49761e322551b47f3e742c449dad76f7cec927f690036266cb27
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.2MB
MD5428cc01114950a6af2b4db69de6d8732
SHA1ad3d862a3d6c7e361a87ee1c9f74230f7fed585b
SHA25621006ffb09510ecc7b2ab0b79e28edc9fbc3d6922ad1693861691a63837c1d6c
SHA512bc238212897c381677e5df9566daa42f90e632d8b838c7fdf412f7a56d18aa013918014bd87f801b8a8f7352a538ddf6cdf4f017a4ec2a8c41adb9b891f2ff62
-
Filesize
977KB
MD569fdaefcc1be1f2a0d5a91dd4513ce14
SHA10aa920eb1a34253f1c1ba3dcc7bcc2985070e6ee
SHA256557c34aba713674cb1c00d4856e059063256e147d89c9c73ea5571da8253d446
SHA5123d5cd023af726c8e0bd9e59fde0aa660e7c7ad55d49be1f333a82517e759118ecb635663345880d99eaa670912499db2561f6dbc54e3dc184dacfcb95f97284f
-
Filesize
704KB
MD5903e2cfee96d720dd5200a922b637d07
SHA1f6d639d7b6bb586abcb5f97b1b212252ed6c85b2
SHA256443ef0fe0e5e9cff04e267b1bbbbc98b547e5bd38a853eb79d06a43a8e7d17f2
SHA512c9c357be28d1d97bd5255d88bc64255f452867407c3aa4c99b286913286780da1204691a0344514f070b8bad391980a88b165eb1e8e9ee97f77ef02eb85071c2
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
197KB
MD52e53369c290b3981fec08370e8aa7666
SHA15e391bf54790eccd1de4574f547001de152a3d87
SHA256f9a914b8f34e8ebc1bbc13b8b09a37b2a2fb90124eac675f6c05ad0f962c40fc
SHA512706db7d87343aac8eee680e5481751cbc8467f7d71b91000f1f17e6d4b0afece801f9315f4b1ee471466a932a88a2c1c4d9229cca8e4584e5477009a3b02a55f
-
Filesize
640KB
MD51bff0defeeb9f4bc5cf01e916a8d1379
SHA1bdb668928be0a339e01e3aeeac813fd26b44b950
SHA256d7f49e1dd346940049b753b856759608013f611624432c7ea57b0872239d35c0
SHA512edb3e22bb4d6f3376d73ccd538a61292c5a086fc8ef9b8038b663c93d9ec991bdca297e3c6febb9d18fd16f5304e4fa532d603c68739598f4b65af320ffb3878
-
Filesize
934KB
MD5864a55b756b93def9322bf181423fad6
SHA167d43af1b1bccfa0d81952289fde11eb951222db
SHA256bc84115f1d75c5d6a042e60f7aad514433913bf7a6382c6f9ae8351f21235870
SHA51270d18b92a92d3ffba8e505f8ee34a4c63d14b904b82f78bd98736cb11022e0f0b92843c59f6ca4cd32a4500ca1d39e63b9efc3301fb77fb7a901ebcbf42e4657
-
Filesize
704KB
MD5ceb1ee23d68e973e400b41e7324c71b6
SHA10ad5540864cf9bcbf52870ba72566625ca54e67a
SHA25666f2f5bd30986e28a4c43ed44264cc56f63bd7a3ecd6aeb5845ac7bcd724aeee
SHA51251ce4a101517339cb1f5c23fc953dde73f871cec2bde8ea5c9fad9376366d7b8aadaa8668ef2f7bf9d873e8817345e4e337a7a94c42c3ddf6a168377af060e9c
-
Filesize
640KB
MD51b7339cbcb5b756c15c05fe0cc6443f3
SHA1abdba01c4526a9bbbb7fd3853e09bce3cbb5287d
SHA2565fcf0fb116f77206758e3a669ec4fa52648fae431a5c2aa2d7ee69944142e019
SHA5127661b5e8413e74432a00089b1556b2f49e268b6b5c8cefd839cbe19074bffd138c18e8078627420f4082f579a9e3f8d02b199507ae36380b5375162a4d4ba439
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770