Analysis
-
max time kernel
296s -
max time network
304s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
24/02/2024, 06:39
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2200714112-3788720386-2559682836-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-2200714112-3788720386-2559682836-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 1492 b2e.exe 3188 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3188 cpuminer-sse2.exe 3188 cpuminer-sse2.exe 3188 cpuminer-sse2.exe 3188 cpuminer-sse2.exe 3188 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/2616-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2616 wrote to memory of 1492 2616 batexe.exe 90 PID 2616 wrote to memory of 1492 2616 batexe.exe 90 PID 2616 wrote to memory of 1492 2616 batexe.exe 90 PID 1492 wrote to memory of 2148 1492 b2e.exe 91 PID 1492 wrote to memory of 2148 1492 b2e.exe 91 PID 1492 wrote to memory of 2148 1492 b2e.exe 91 PID 2148 wrote to memory of 3188 2148 cmd.exe 94 PID 2148 wrote to memory of 3188 2148 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\7F23.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\7F23.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\7F23.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8695.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3188
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.9MB
MD5ac3a9a4685d161b272440b0f08b2dc69
SHA174971bf8e20bc4165e0362ab85efa624a900f26a
SHA256e3bb6966464dfa5a795d7377c4d0a5de8b21615e1f71f7627ccd37c7db7abb8b
SHA512a66cc69285393992cce82eb92c2fa7850f33408a7e9cbba21785d875d3eabda6059139a6f9095de9ae96e348c196c793106b9a0e1eeccfa41e65ab5a23da85b5
-
Filesize
1.3MB
MD5cd2e147246a8f0dc58bad676a15048ca
SHA10382157b28b479809d4848771f63f209292dea25
SHA256eee07142595f07a70af1c63f13f60f8d09efd8a1f565490bf5cf7cbee1bffc1c
SHA512196cff5a99ab1de4fd542abf69f2416c59127edefad5b875b229f1744fa9591f1ee7b3730cf7822919194ea893624c97236dbbbc5b05c3f270cc8f66c59acaaf
-
Filesize
1.1MB
MD5dcc2b68f35c860886b00b8c9cdd9661d
SHA160dc2bd50a857fb300beefc205578967ab61d7b1
SHA256b69093ad043a23447563a60eb97d1ba664d92ac5c670c2669c5e19271d1cf2ab
SHA5126c8f2aad37efdca7f52b0748b61cfd19ed2e8a4f84efeb3e6573abfce608cea67ff6460cb50cdfbaeef2076a87b6234345cab9f109ed87b9ef8a071a47cc0cac
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
868KB
MD5eab02b32fb3d8db1dec12bc4b48dbb8d
SHA1b0d66cf47332c49a92278f1be1ad9069a6b830f5
SHA2565cc24e3a28bfb1c5c20619fb3fdb97b0a8f7cfd3bfb5eb30bff04fb8a11a79c7
SHA512fa93e66ae15104f4ad85274fa30271792c327d8a68d41a9af332479b705f89a6a96a1ba435b1361bb41e184d66953c1a09f407cccb800ddec4cc52e34eb31b59
-
Filesize
796KB
MD560c6d611a45144d9d994ae29d0b0a2e1
SHA11e415ba38fcb27a16ac9e1443e1c6cc6cc9d97fd
SHA2568469f5827f85e3bfb2af165b098b2c40fe0ce12e19dda20a29f21839bd54b7bb
SHA512bd21aa0121ab8b38e15e92e55d1210838c3dd6d13b65ff33e4e12129f2e9a06a922cf3d6adcc3ebbc8565778be9786f60406ffaa2b5677944e24d8466ae7fe03
-
Filesize
768KB
MD5e3f15c79f945604229fa814f57c79274
SHA119a7015dfbe622ab86c48693ee1605b26112a3fa
SHA2567b09ee53447ccf77a0f2d7bfe25908f963d681433d3cba5a16c7f45646c42175
SHA51212dc1df8a947caee13a12eca5a976feffd7408402b0495e4971d4bd7181e8d353ebc17da044d2ce6d1c273bb05a0ca5ddf7492394b355786d8b14b0997de162c
-
Filesize
832KB
MD59b527cc7775e3fefc75ebd6cf497b81b
SHA17405b4528854589bc404f55c0e591d2e534d8d63
SHA256eb4270d5203fe07ee63a7161093d69577ada5ad4ca659a6181d63953a69bca72
SHA5126471f61ebc78e6ab30cce7cb444c582a8a24cbcbff1a8cc3d22d20d299d53c6377127e76bcc2a1e2c9108cd65d6fb89d42ddf89b04140c8e225f5115984a4b85
-
Filesize
778KB
MD54186bc4a4fc6ccf5f74d7e86c189df13
SHA1ad0f57068081c9399c0f0729b438f68af75952fb
SHA2564100710b944fcdcd814dc55bb2204f026f096d8ba405e46f0f9dd480c61a2c88
SHA512adca5d810a5c2bde05492a376a9b016ef7e048ba073a7dfc9a8b669913fa4ea439f0a0a5f05350f09c2f48aaa06e731b40fa62fea667a927116669c391d57bdf
-
Filesize
573KB
MD570d30602e3f907bc9212810471e080ed
SHA1a7656cbecd2ec61144c78c5d13a876bbb53a2856
SHA256227d0c6701298c3104834f776853a4ad281bbb022e318385ff0ba03bec6395aa
SHA512ae89d1d7a42860e879f77365cba75e43628a9f3917a0eb10772e11cfc3a4cd415d13a436c20159a18a837588a903a632b8bcdc4f7f8011dfc5e5a8345a3d9aae
-
Filesize
651KB
MD535199fc86dc950ba7711820436480be9
SHA1c8d2025ac9c6efc03c8c12f1d53ab7f4fed97d27
SHA25662ddbbf476646adb7d493af07e957013d79854f58ed01d8f49130134ad9fb932
SHA512312f263f30f54d3622e1f1fe74c9330c14950006b89169d5689a225b2d928da5378b6d7f3f7865ab4489251afcffa391657cc84f1d18e15e49aad9a29c134a31
-
Filesize
473KB
MD5c03a4615f68a333da661da050be29f68
SHA1dc5782413cf552c978bca3499e89a9ead3d568a9
SHA25665204236ba9e2fb02328ed64bc768733227c6866f5ee268b1e6e03a408be31da
SHA5124b4424314ddec5ae12c2bee8a7595305da5b5712f58340e4af8f07dc4fdcfd574bda6bd91a6a115191051eb0a3714af485587b18d22f26fc6d23c50d02d830b2
-
Filesize
516KB
MD51550945e0304e2f7d0f74326075c6baa
SHA1703c9fbad2b7c2cff607492213a4b13e12b518ba
SHA2569a1940de3d75e224f4ec6426fb30aba78c9ac3857f34b2b1c67dc84a6b87c3f8
SHA51266daf71a84f4e07a6b0ade6407a6d4dd387c673d7742c1667484ae717668dfa1e390f12bed94347f8be8b69b9375c2d778a40716b2f825075a8f9d42cdf003a5
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770
-
Filesize
538KB
MD5dce1f3a6551c19859669f53b22c7b21b
SHA1d46a1e195a059f83cda06a25ccc45ca032bd6188
SHA256a51c4fe36778f9cd3a28f2045564c909bb89182574aa26c24600cf31640a9790
SHA51220e0a9f95f4113b2954e8b764f2f74a9128b00fa4945a63b71903fab2629aaac6189bcba7290434d67a2cbe2a7ca21eb25fe0e7237fd35f19e1bd145186880eb