Analysis
-
max time kernel
290s -
max time network
307s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
24-02-2024 13:44
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2828415587-3732861812-1919322417-1000\Control Panel\International\Geo\Nation b2e.exe Key value queried \REGISTRY\USER\S-1-5-21-2828415587-3732861812-1919322417-1000\Control Panel\International\Geo\Nation batexe.exe -
Executes dropped EXE 2 IoCs
pid Process 4280 b2e.exe 1456 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1456 cpuminer-sse2.exe 1456 cpuminer-sse2.exe 1456 cpuminer-sse2.exe 1456 cpuminer-sse2.exe 1456 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/2148-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2148 wrote to memory of 4280 2148 batexe.exe 87 PID 2148 wrote to memory of 4280 2148 batexe.exe 87 PID 2148 wrote to memory of 4280 2148 batexe.exe 87 PID 4280 wrote to memory of 4328 4280 b2e.exe 88 PID 4280 wrote to memory of 4328 4280 b2e.exe 88 PID 4280 wrote to memory of 4328 4280 b2e.exe 88 PID 4328 wrote to memory of 1456 4328 cmd.exe 91 PID 4328 wrote to memory of 1456 4328 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\A2C8.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\A2C8.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\A2C8.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AD57.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1456
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.9MB
MD52f8f9061964f3ff9d0f60c5b506985d0
SHA135f100a08f36d0c9b7eb85c49a0ced82d55e1ed0
SHA256c8abc2d15d8ba11d4e2c3e65d1509920176e14885477c8603238ae177f9d1dcf
SHA512abc139a60cacde922d04e3bffa4031c317d4d90eb7d3ce34817630f742711213084d67678448adede4342738371d0a9ad648ebbcd8c54de3444ce8ca5070b9f1
-
Filesize
2.4MB
MD5000f75482a8f3c361e1ef9b58a16ee5f
SHA14e67fd460b9fa59dc5c1147833ad2f40f94d0279
SHA2565143fc3449d84ea5cf510321dc92e2e28e68385863a6b07da646a406b53a875e
SHA512fe72c633e123cea33c480746a4534fe6228f2c1f6184edbc75c144a201fb556ba0d68415c2abaa9c844a39bb900300f24476e38a4e13825829da54d629eaf152
-
Filesize
2.5MB
MD535ffee4e793de9e8635fb4a825da13d7
SHA133e645756e7bd58ca2b085febdd3abbfc9e0627a
SHA25646ff93e4e4951c8f7bcd739c955a7175131da5abb67c7e57cf339265aa6f63ab
SHA512edb5cff501f7558320ba7644d226753cdcee3b2ca390ccd5a218ec3442766aed66d82f12d4d20ce264c89bc1f3f155afc60ee6c2e58f024ff556f65662f3366a
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
896KB
MD59f9a8fea08bacf3a1d155567fead5940
SHA19d9ba8746c585446f53f442b800e1eb28a0df86a
SHA256a22f9d8fb953e4f6bc93cdcc8aa650a5a093f1dd400fdc501d5aa7b00bee0289
SHA512d41a048619373832c616d48f919595ac50dfbbd68095aec008b30adde91ceeeb86326c7d412ab20d937bab7096fb8165d3da8b4fdc40a03cc32da9ee3e9dc2a2
-
Filesize
576KB
MD56e18fc4eda8ed0e6aa6ed56f84803ab3
SHA1e4a0a4432fcf3184baae1b01a8cb771ed580dbe2
SHA256f51cf1f35d722b4af4bde30de5008d67d7256d271953eeb2ff63780978f4a53f
SHA51225f97a3a07fd0aed4a5e6bd58e4cc3ebc2c56c0a314103536e9342ee10aa3c01baa24b459fb58d7154808594203e2b4fddc23f6c424182e2e8bb3a978b4dc256
-
Filesize
581KB
MD570cb1017dd8f1574c828c48e22b27ffd
SHA142a603cb8f53c2abf463038839d3673870b13402
SHA256fa04ec0903ec32b49fe036bc9838b658a710341411cc2e1cce53f16bb31d29f7
SHA512eba64276ebbc1679d1506465a25b4daa9fdf5932e5a68c317a765fae798e91542e09fc7df463ac20acf3b2e01370d3f4df3593b146e12ed284e60c4e14536d02
-
Filesize
512KB
MD5a5993c0dd7587f1716037dcfe1f63091
SHA19a4d23ce36f5fc5791692b47d977c0bf92842879
SHA256568cec1e1bdccf401232a78c8ecf2081fdaea221f0a7c777a69ec61307cca3e3
SHA512c5457590162dc1a0fd6b179ba94f19e6265e2ca226ea1ec553358f568690bbc158335ee92c297ce699b2928d44702733269f82640d86bb499c1981a5903afc12
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
12.6MB
MD51a6b03f7b95cb00b964d954a311b3b88
SHA10af5b1cafe966b5b01817341574781460e5f0434
SHA2567c61fd8215264c20e7a6b813166d5e435b566a88a542bd2f5cffc33c2973480f
SHA512b7f5889a9f6826f4c6f2b2f1d06d4340680066cdc08388248516521b7e93c7a8ac0fe71e5f8328301881f31a97ca5b416d5bd577985db91c6e52d761de762834
-
Filesize
15.6MB
MD57e0ce30809f5886354a5ec5b3c89c15f
SHA1897de8d3ddb9f04cc69166432fe16f322873d34e
SHA25618d9bd28201e9fa3576b116ac641dff73cf076a8e022b8dc709e53263e2466a1
SHA512edf63b7c76072801e45d0555d541c69b942b5f2a1953d907c22ab5b66dc302845cb94537494d27824a55bff7e3586e7fbff333de7312e22d7b3a2459336113e8
-
Filesize
12.7MB
MD52cfbc53a241e740ec716a5bae1cbb42f
SHA1231cd313cd1b1c726cc1326c032fec888cd2bafc
SHA256d29e3fbb1884128eea491247a3a043deafb5cab339e23e66e5fb334bf376c04e
SHA5126ee46ddef1140514d87f1a2dfe7c09d7fcfa2840214c4835f4e0270c1ba8fbf3b6d9d5da83ce1837ac3a6b96a012b48c1272376c58c7ab019c80cca0dca079f5
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770