Analysis

  • max time kernel
    301s
  • max time network
    314s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-ja
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows
  • submitted
    19/02/2024, 15:59

General

  • Target

    batexe.exe

  • Size

    9.4MB

  • MD5

    cdc9eacffc6d2bf43153815043064427

  • SHA1

    d05101f265f6ea87e18793ab0071f5c99edf363f

  • SHA256

    73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72

  • SHA512

    fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6

  • SSDEEP

    196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\batexe.exe
    "C:\Users\Admin\AppData\Local\Temp\batexe.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5472
    • C:\Users\Admin\AppData\Local\Temp\54D2.tmp\b2e.exe
      "C:\Users\Admin\AppData\Local\Temp\54D2.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\54D2.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\74AE.tmp\batchfile.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4968
        • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe
          cpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 3
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:5432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\54D2.tmp\b2e.exe

    Filesize

    2.8MB

    MD5

    9e406b77a591fa5892e99f0d214e0cf1

    SHA1

    f3130e13eea546e86ac855fbedbebca0c90a7cdb

    SHA256

    1d828ad46280e908e988c7057090dfbeb8237625a9fbf5cf64f8d5d46fa7af64

    SHA512

    145f0520fd28e8be7831f2bbc0749d9edf3dc6e8e7fd6d942c27203934ed19ce429931d414399d6bf5a6c909f7a224394e935609f552584b8ca06cf8dd7a14b6

  • C:\Users\Admin\AppData\Local\Temp\54D2.tmp\b2e.exe

    Filesize

    398KB

    MD5

    d541e0d3fb44d3255d5422b796749d6a

    SHA1

    6bda9f66624fc40c8cb9f5fbaee2edbd229bf6ca

    SHA256

    0a84e329f263ce09d6db481fdeccf62b34cd57080960030618861604a2a0d528

    SHA512

    870a2fc94716cc61788e424108f0e94e9d1fc084b07bddc6c6fd96476b46ac9de414f49023a04ea247a503325331a9d2506b37e7ce51fad836270ca17a124de0

  • C:\Users\Admin\AppData\Local\Temp\54D2.tmp\b2e.exe

    Filesize

    422KB

    MD5

    c79c4326aa9a997b1c6fd1813d0d3a72

    SHA1

    175a38072f2fc2b68a62bdbee129d46b2a517338

    SHA256

    85990b6c923082dc0bdf55d544f78048c56fdac9edfeff400b82767cd403ba61

    SHA512

    1702ecade82562ea98f58375aa417b2e8e320e886f49e4b7eb19f4f73ee6bbc852de8407d819a817cdd06286edb9a0072ebf38d14de4ef117ed38ad086a91b0e

  • C:\Users\Admin\AppData\Local\Temp\74AE.tmp\batchfile.bat

    Filesize

    136B

    MD5

    8ea7ac72a10251ecfb42ef4a88bd330a

    SHA1

    c30f6af73a42c0cc89bd20fe95f9159d6f0756c5

    SHA256

    65e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9

    SHA512

    a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0

  • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe

    Filesize

    438KB

    MD5

    a3eeb070a881306c3c90f9bea2b52849

    SHA1

    360974dc2d7e83e860c016470487f8998e27c781

    SHA256

    e705c0dd900485ddc2fca16336c1260af9dd8bbf73cb8afd5bffdab94286221c

    SHA512

    477e9ec1ff54e0ce5f47e7642f45a1b192ac968c195f47c2c06562894b14f9cd89caf9aceaf0742f5dfacdb7ad0dae6cd2897072df3ae8e825b736c039437e2b

  • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe

    Filesize

    370KB

    MD5

    07c099cbf79f9f075beacbd4f7255793

    SHA1

    fa59febd30a7c62186033f7515630a823bd968fd

    SHA256

    fa0e02dcf45b2d293f7b157c14fbac2bd8d9cd47e2c4cc78441db7aa4d1da6c9

    SHA512

    eda75b081339aed93360f8788b42a1db6a3ce058d24e35a6599010239ef8a838b3fca0bd4d63ed11d832ac9a331ac22f6f8f702a0a3f07b550aac96333253d92

  • C:\Users\Admin\AppData\Local\Temp\libcurl-4.dll

    Filesize

    182KB

    MD5

    bf7112f3d3b4fd5016ac4a6842b513af

    SHA1

    7bf4e40058bdd1699d1b7f73c747c7ff3b35f29a

    SHA256

    273c31efb8667bbd10bda50c42b0b86f54a39ae2213e4a8db30049093707cd5f

    SHA512

    9f7ff6fcc3af0ec80049fe855c0114045945d511ebc69ef8dff60add240aa0deb08d0e334b8046c43cb96f24d88fe2afc6816b5fad9b4a020885cc0f88b7de10

  • C:\Users\Admin\AppData\Local\Temp\libcurl-4.dll

    Filesize

    197KB

    MD5

    190612499421b8087e7fa2fb8941e79c

    SHA1

    0362387d630c15410b43bc399dbe3bb5c08363e3

    SHA256

    f36ecaebb28f6999db5df8169857fe37b5b6202fc80cf52eed62aa6c5c55d7a4

    SHA512

    dcfc528601520dfa2702dc7aea4d216211cc4348f78dfa2f6f6efa4b2b85341fa96d38dc8bd619d15d2535cb630e3dce9e7d705ed3cf3cdd13b1957ca3e1f705

  • C:\Users\Admin\AppData\Local\Temp\libcurl-4.dll

    Filesize

    301KB

    MD5

    424bbead14cb39454f9ede14326fe6fa

    SHA1

    0264c85817b6a7db8dc0c651df04e4189b8d0478

    SHA256

    7b9bf401019a0c184dd9ffd541cdef24f6820cef00f3c9b4ce5afdff33531020

    SHA512

    e3e83100c0818799c9964a2d594103fa2ccfc5ec035461efdb4d65fa50963de8c70a5da91afdda704a35cff9f5947426c917d6cede22682f258d41c744b7e059

  • C:\Users\Admin\AppData\Local\Temp\libgcc_s_seh-1.dll

    Filesize

    312KB

    MD5

    da7606a9315a25b02a4585784d11caef

    SHA1

    581b6337342cf7c07b68a13a7a3ddb84c161a2e3

    SHA256

    1bbc700b16acd6b6cdcc513f8617e123ff000eba7370b4896e6352aa422327ae

    SHA512

    834bf0c93688aead48129bf5842e8904b9fca119eba97d0c6e2eb614a2d06f140b685db0e593706ddca3fbee5888fe384e2c73ce59d9378e11478212633df0ff

  • C:\Users\Admin\AppData\Local\Temp\libgcc_s_seh-1.dll

    Filesize

    278KB

    MD5

    2cc72f5131897a36ebe698c12de4f4f5

    SHA1

    fcf05d44eb08581e9cef4a70613e4e38edff6501

    SHA256

    4d82725fb6e036ec017f0600837536898efc3e5ce4a36bf73ecb92bf76fd5d12

    SHA512

    67a075ce18394a0caace5a9473471ba684ea058088d7922177c8cc07b6f1c77f64c436f4f0ddf77dc1c6605cbf5875f410759859209a02af42b7ba9d4298330c

  • C:\Users\Admin\AppData\Local\Temp\libgcc_s_seh-1.dll

    Filesize

    299KB

    MD5

    05874f8812847a15bf464ea53fe526a2

    SHA1

    407ab40f08700b40891e75292eea11da946a3b17

    SHA256

    0ece53d28e01db64decd371cb01c4baa950d88cb6b69ae2d1560443b1bea5f90

    SHA512

    91b157639298caaa314db558b34b3ea79b674da495fd1e04d1b16105be5ae8760f3e782df9fe42924de057268cfa40ac2a7b7e4a5659c75b19d35f03865659e7

  • C:\Users\Admin\AppData\Local\Temp\libstdc++-6.dll

    Filesize

    413KB

    MD5

    e6fdcd0a0c365cf37eec75c95e22bfd2

    SHA1

    8349f2b7baa699d743ac911babfd137ca36ebba3

    SHA256

    153dd10eb57d7ef5608dc3ff320e24abb311393f8cdcce972cbfc6c11111d3f2

    SHA512

    8741845ca5bde14d9074781a4236f816cee975d88fe00e696d6b87494b0c198ba40515a85fab8acd3540ecf92961a14f3983c0e29170a7c065f88c3835f71457

  • C:\Users\Admin\AppData\Local\Temp\libstdc++-6.dll

    Filesize

    85KB

    MD5

    a369296b578ae864dd5874b2959b3b93

    SHA1

    0b01ad28dc0d208984f68623ee33ec3efad93d67

    SHA256

    d73b55a764ca7ca42b36a9c4610382bea77b474d30aa9a723974c955454bf4a1

    SHA512

    aef0e2bdbedca33ac73274f209ff346650d9de69d0730bc5d42bc2240f850470a70ac957ef182089f60beaa0db671e0eb55b3eb1413ed5df29304e86e1b46536

  • C:\Users\Admin\AppData\Local\Temp\libwinpthread-1.dll

    Filesize

    153KB

    MD5

    f276be48a7e80f47611ad06559286f48

    SHA1

    972f08ba1c836412627a37feb1f08d7d383e6021

    SHA256

    ef7218d83c6a5416c16fd82ff71c47edabc1de0e12a439d8c89f3fe8990b8dd2

    SHA512

    d22d645c38a109dd95bb48c7eec2204c110f9b159e5921f77037f9e297ea2d46c537733d917a8bb612100bc2b7f7bb2067ab8500bf810683e899f7445afd38a9

  • C:\Users\Admin\AppData\Local\Temp\libwinpthread-1.dll

    Filesize

    96KB

    MD5

    3aff9a6e042b10ba6d881e1fd12d20e1

    SHA1

    6d2d520b117a034cbd0fdcda93c71569ceeb52dc

    SHA256

    60a0d950810acd0de49f22a8d381595cead015e38090b6f54140de06fe06c7c0

    SHA512

    15033f00b0599af92f2f584b16c86a679b4cfe7866c74db666ddff92edcbc8a9e62ca615fae7e8e7152f290e684931ed83ce9f71c49577639657b79d3c29202c

  • memory/2832-8-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/2832-56-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/5432-50-0x0000000065FD0000-0x0000000066068000-memory.dmp

    Filesize

    608KB

  • memory/5432-77-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/5432-47-0x000000006FC40000-0x00000000714F5000-memory.dmp

    Filesize

    24.7MB

  • memory/5432-48-0x0000000061440000-0x000000006156B000-memory.dmp

    Filesize

    1.2MB

  • memory/5432-49-0x0000000000870000-0x000000000092C000-memory.dmp

    Filesize

    752KB

  • memory/5432-43-0x0000000000870000-0x000000000092C000-memory.dmp

    Filesize

    752KB

  • memory/5432-51-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/5432-102-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/5432-57-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/5432-62-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/5432-46-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/5432-87-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/5432-92-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/5472-1-0x0000000000400000-0x000000000393A000-memory.dmp

    Filesize

    53.2MB