Analysis
-
max time kernel
301s -
max time network
309s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
23-02-2024 04:55
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 952 b2e.exe 4696 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4696 cpuminer-sse2.exe 4696 cpuminer-sse2.exe 4696 cpuminer-sse2.exe 4696 cpuminer-sse2.exe 4696 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/484-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 484 wrote to memory of 952 484 batexe.exe 93 PID 484 wrote to memory of 952 484 batexe.exe 93 PID 484 wrote to memory of 952 484 batexe.exe 93 PID 952 wrote to memory of 3392 952 b2e.exe 94 PID 952 wrote to memory of 3392 952 b2e.exe 94 PID 952 wrote to memory of 3392 952 b2e.exe 94 PID 3392 wrote to memory of 4696 3392 cmd.exe 97 PID 3392 wrote to memory of 4696 3392 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Users\Admin\AppData\Local\Temp\4B6C.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\4B6C.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\4B6C.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5A31.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4696
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD586d925eddb869ad5a56efb06fadd6d15
SHA16e9b2bc407730f141563cc9708055322c983b349
SHA2562f15c9d453944a704e6cc97d3f5c8c8a1f98ce76a8d9ff60b3fee90430673e17
SHA5123f44386d0916fafb565b744b78d3230af0f8f682a099407d7ce458e92b2e8843628ef8c2179c29bb97a9f885cbd54552d8348eee983bfdeba8a44349f0671c6c
-
Filesize
2.1MB
MD51bdef8e9ce7f3e628166464711339ace
SHA124cee4fa14f77db497819bbb84663119659c5cfe
SHA2566c44c56b022ac067c272a0854d0b0c0e17ef7ef50989b498b56e7acb3b32727e
SHA512165a480e0fa5bf7af6a9df32eec7e12c79a38d75d9305bd012bc2e700ec1d57e1a862a162b733b2db7dbae7307e8dbf9cd1bd5698d1d56494a6bed0bbaa506a6
-
Filesize
1.9MB
MD564b4b118068208dd20b79f80af15437d
SHA133bb4ce8a59e7b91de16b5dc5220b0644b4d6a21
SHA256320e9ebe65b058debb02286d5ef2826588e324209969431c9ac8bda1705f2df3
SHA512781626bc5ca3e5f6751fc6e2e006d9ad833e42346415b80de7c561299d5caf4437a846a0e1a8d82737944a14235a530b62f987e12c5c3b829858cf7af1bb2877
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
57KB
MD564968247286b64688de0b75553f688bf
SHA16f798a947c22dfa41f91d65ad9d87e42d6f7d196
SHA2564caa70964618e1d2a1778da3bf6bfa1a50d3cfbb61572517e8cf8416b96c65a2
SHA512a8533d40dbb38fba66b6f3e89c3085d457ce93a98a18f3276b85436f74581a877116fcb35faddd77dd929a6561ecad5209226a013b0dd8f52da82c7fcff944fa
-
Filesize
1KB
MD5188a47d70938e27a394a0bc7ecf0369c
SHA197eb7cbcdc7fa30dcd99fd3866d5d2ff9e2e36d9
SHA2567e026af94439b7ce11daaacbe7ea28359476d6a91fcd49ae1eefce611d8bec45
SHA512166e254351f7aef46a4c1c4630f89992d4d87bb6b5b0f65054fc1c00c52ef44e9f1ab47d19558ad299a2557f6640a7e56c917b5e239ae5e85f2cd50191bde1d3
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.8MB
MD52c0c245e79ef4a18aeeb24dca980b4a9
SHA1609617535c492ee761807128a774538671227494
SHA256559dedfa1d45215bd45cb43a238ab562ed1bf6e0f31674abd003ae6060a731df
SHA51289ddaa69413f1684d464301ecf548499efaa2e5e405eb78aac9adf78f5ecdd29f15b7793569a2af97611bd4de5b8de58301a287c1a0aa6a669108aee2f274881
-
Filesize
1.9MB
MD5c21322ede5bbe3fad0e19a07b95b8485
SHA1a49c3a437ce6c4aa390f8e58e1e5803207aa6fd7
SHA2564c69aee2868e78af1e4800198e801d14ac7a7d26bfd07be23b662c461384a0b8
SHA512e611d41cbd2cbbd23a56b6c952a59487e6960560efc3a866b3eb125d90b045c72fd054cf32af6d1e3de3b1f9b7bd29f9deccc9a4b7f3d847d71ba0e30afe21ba
-
Filesize
2.1MB
MD5173fdd3d918364561ed54b087a63270a
SHA185be7f3a2ba8d650c5a859382299df6effe9b033
SHA2567dff05f6037d8431a7147898d9358ad1ed79f1456bff58ea971568f8c874a585
SHA512618ef7fb74c70e7acdd8f53952aacafd20f23e66f87a81a01eb2c62aa1bdec4a17598bfb21c0ad88deb5332854a1ebc33ae1dc11add612eca55f2edff1848d3c
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770