Analysis
-
max time kernel
300s -
max time network
307s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
23/02/2024, 20:36
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 2068 b2e.exe 1728 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1728 cpuminer-sse2.exe 1728 cpuminer-sse2.exe 1728 cpuminer-sse2.exe 1728 cpuminer-sse2.exe 1728 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/1792-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2068 1792 batexe.exe 93 PID 1792 wrote to memory of 2068 1792 batexe.exe 93 PID 1792 wrote to memory of 2068 1792 batexe.exe 93 PID 2068 wrote to memory of 3700 2068 b2e.exe 94 PID 2068 wrote to memory of 3700 2068 b2e.exe 94 PID 2068 wrote to memory of 3700 2068 b2e.exe 94 PID 3700 wrote to memory of 1728 3700 cmd.exe 97 PID 3700 wrote to memory of 1728 3700 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\4B7B.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\4B7B.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\4B7B.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\589B.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1728
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5582771372f7e7cb635784a0d59597602
SHA18611922ad4e757072e524184bb048f60b9e2dedc
SHA256354bcd0f37cdd33c0a1692eab2c6e892a9118bdc54b757d56e1d5a2e859f09cb
SHA51202e6c6a03b4ee2c4019a91533a4cdbe83df4028795b8db5d5e9e495d813a1cf16cdba4f2f339580f6b4fbff3e575dab0536a9a23d196a54bfc1e26099003d145
-
Filesize
1.4MB
MD5fed05298eefa03a0265d9130478c15ee
SHA1c4a980874839d8199be4ec5752598aab81bdb94f
SHA25615bd5a1c50c2a1680f3021b468e1ca82606f07740fb95657b1d21d1cf63a6a0b
SHA51236c2f59732e9955fa19ce263b502eca843d89b42461ce354732cc16d627fc5845a2799b677eb27cef35505c8393c77d19cba6847a1c9c3d85981d03ff860ae7c
-
Filesize
1.5MB
MD53fd43adc54beada5a6ff423000f705e2
SHA149f1841ab7ab5984a88b8af3cbc7f8c5147fc2fd
SHA2563a471f44bf6bf7059e8336c267bba2a2f9aaebfca21161f953b56cc4dd36fbc4
SHA512e35ce3a60fab37fd787a58b0748e71ea199f0c57a288ea89b08f86afc33b0530a0282a690357f5930ceb7d9ebbac168fa7e67d84066ddfc0a157cbe264d94999
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
514KB
MD5e1c17fdd27c48e9e99529a1761ab87af
SHA1267ce90e2aab3e72cd2e7a6110e23a6fcbff3baf
SHA256f3868ca15c4979b184953e6a9075173d8c41f55321c342ca14cfb49226470148
SHA5127aa97989cb9537e512992b2564ad2bb8e999c1b7c4b0da16dcb35160dadaf53c58f2ab8b4e9d801bc44baf965fbc78649083a5e8ff8c49af09f2f111e3a641f5
-
Filesize
947KB
MD51a1f6034e7182cea97df57b8810694ed
SHA18657f83c20e2ff147de720e6ce0ed22f24696984
SHA256a2134bf915f2698e98e3e028c58aae2ba657f3f3d26f62a3d488960e904f6cff
SHA512dad35bff1ac185a147f20a04ac58eeb4720119c5792abccb2153b8796141b3d942e2948cd70cf48e51300644fc37a707e46602d8f1a5aa2a3c6ce7251a1c4e51
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
757KB
MD57c42625726e198800e1470d6c3f37234
SHA1f6159bb40ea0e1da93a9d790563d6f9adf53a6e1
SHA256a2e20d4f09b1cd177372eca32f6ce907addccbafb4bd191bbc7df7944bccedbf
SHA5120f758fc25f153540faeae4d8ecb707b298c00e68945b422b15bbaff913010960bb102979f9142c44e538f2f932b70e98221a75ecb26b3102acc8dea7329db1e0
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
996KB
MD5df0f170bc277143212252b8045b93aac
SHA168e2a8accfc6dbc278d6de70eed9d2597d0489c0
SHA256d73aeabc72c663fca15e3c45a7cb106a66ad745df7c15a2942745ad12cbb1378
SHA512f2c548390c3ca8a8ab6aa84aa953e03db8405530e0cd0c27ae9cb7eea88ff177e64269bca7fd73d9de893953114881bb466e55b90b6e8be0f673721d1050c28e
-
Filesize
928KB
MD59f93acb728630b444e1509413cc1461f
SHA144ae42d53f3b8986e2d3d0d69b944847c1309f69
SHA25602abd65a162d8a6cc57bf80af171b90e04a63e2db596cb9427ee73baa62c7eef
SHA512f1113a61896680329fc690e825672fef023c2fe7d5ce763168f3bf318ea81b772739816986df2ba24f5947ec0a673e487109c16451df99c360acbb7a09cd1e28
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770