Analysis

  • max time kernel
    293s
  • max time network
    300s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-ja
  • resource tags

    arch:x64arch:x86image:win10-20240221-jalocale:ja-jpos:windows10-1703-x64systemwindows
  • submitted
    22/02/2024, 12:33

General

  • Target

    batexe.exe

  • Size

    9.4MB

  • MD5

    cdc9eacffc6d2bf43153815043064427

  • SHA1

    d05101f265f6ea87e18793ab0071f5c99edf363f

  • SHA256

    73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72

  • SHA512

    fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6

  • SSDEEP

    196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\batexe.exe
    "C:\Users\Admin\AppData\Local\Temp\batexe.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4108
    • C:\Users\Admin\AppData\Local\Temp\A2B8.tmp\b2e.exe
      "C:\Users\Admin\AppData\Local\Temp\A2B8.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\A2B8.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3192
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A6DF.tmp\batchfile.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:168
        • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe
          cpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 3
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1944

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\A2B8.tmp\b2e.exe

          Filesize

          3.6MB

          MD5

          2fa0d7363399bec4ce8ff0645c4d8006

          SHA1

          c6cfdafdcd9e40badfc659f44b476b7637fb00be

          SHA256

          31b938c76807da297e1989e279479c58c504df0b0aeaf9c75beab52ea43b5e66

          SHA512

          7ef2a541be2c382af9cb40eb1a7e1f375dd0ab0be91e3015f37bae81789a0f65aa67ce571dcb34a4ac605b5aba37e46982cd418368fa1cb2e504730b67dd444c

        • C:\Users\Admin\AppData\Local\Temp\A2B8.tmp\b2e.exe

          Filesize

          2.3MB

          MD5

          6e022637e8149c916295e9791a309bc1

          SHA1

          8d2850e7064c4f2c6a0c2826a79ed3facf71eb91

          SHA256

          8ff15d04422df0afc6a03d5c9e324e618c10c4d2e7de1b8ed82727e28aa0a0ac

          SHA512

          78d1166896019507b276c488a9898a47cebb09b4db3e76402a333dcd8167acb10fe802900dfc4c5188499f6274cc98bb866bc45d85637fad7465d83e9fc21d0b

        • C:\Users\Admin\AppData\Local\Temp\A6DF.tmp\batchfile.bat

          Filesize

          136B

          MD5

          8ea7ac72a10251ecfb42ef4a88bd330a

          SHA1

          c30f6af73a42c0cc89bd20fe95f9159d6f0756c5

          SHA256

          65e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9

          SHA512

          a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0

        • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe

          Filesize

          2.3MB

          MD5

          4c04147c386ba8792ac6a03069572a8a

          SHA1

          dda67789fc1d0f2469ca95f01a5c81034853ca6a

          SHA256

          c7739a1e940a282703d06eccda7110426d306f390e97fdbbd9df18472fd132cd

          SHA512

          a8b5a0b878a9a7d30cb38feff814e1f4dce24d000158edc10a43ee9a89920bedf7adc92eb7e3913098b6aab7fbd0531f56fc09f508b5c2769992a94e55d153db

        • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe

          Filesize

          896KB

          MD5

          9f9a8fea08bacf3a1d155567fead5940

          SHA1

          9d9ba8746c585446f53f442b800e1eb28a0df86a

          SHA256

          a22f9d8fb953e4f6bc93cdcc8aa650a5a093f1dd400fdc501d5aa7b00bee0289

          SHA512

          d41a048619373832c616d48f919595ac50dfbbd68095aec008b30adde91ceeeb86326c7d412ab20d937bab7096fb8165d3da8b4fdc40a03cc32da9ee3e9dc2a2

        • C:\Users\Admin\AppData\Local\Temp\libcurl-4.dll

          Filesize

          832KB

          MD5

          9b527cc7775e3fefc75ebd6cf497b81b

          SHA1

          7405b4528854589bc404f55c0e591d2e534d8d63

          SHA256

          eb4270d5203fe07ee63a7161093d69577ada5ad4ca659a6181d63953a69bca72

          SHA512

          6471f61ebc78e6ab30cce7cb444c582a8a24cbcbff1a8cc3d22d20d299d53c6377127e76bcc2a1e2c9108cd65d6fb89d42ddf89b04140c8e225f5115984a4b85

        • C:\Users\Admin\AppData\Local\Temp\libgcc_s_seh-1.dll

          Filesize

          64KB

          MD5

          7fcedb6e973c5df3b6652a2afafa6a13

          SHA1

          116728803559ab58a8127544df80b75a0dd1c6d2

          SHA256

          fd7191afdecd35b78a0c0ca0457cbbf42ffda1e52263cd785abca5f047b18825

          SHA512

          05c86bf84079a2cc13dc7a1a917a0839ccd2b18e0440c4bd419c99f65c4161ac69a9447f56bdf6051b2fbbc49b7556fc3717432d0e293dfae2921c0701fe64fd

        • C:\Users\Admin\AppData\Local\Temp\libstdc++-6.dll

          Filesize

          448KB

          MD5

          ca123cec7f705c0af114e462349dc686

          SHA1

          75f90b4d95f6774b2f66e4ba790755ef118ab222

          SHA256

          7f141cdc0be9c965e21310bcfb0484b20d31ffd8a6a970f8b5a53c0e8974798a

          SHA512

          650125faa9ae6733f1118caf3101ca6850473f78f9bfc3a87e908eac1c69935e3bc269ffb5de4dd6e867429c1af35c7f3b9e62eb698fa7c9695d68e7115f3f1c

        • \Users\Admin\AppData\Local\Temp\libcurl-4.dll

          Filesize

          448KB

          MD5

          19a61444b6e2d01755ede80960bca19c

          SHA1

          e0c7222784d3e2b3329ec3280648b17fd60ef209

          SHA256

          13fd488b38f3b75438e9ad0a033df005cd397f3c92f43275714a0a7eb3fb4db8

          SHA512

          bc02c82bdac19f10f3e3a93d3f507bb7838c9255b7cff5af6e3a7f3b471dae9c45c52728c3c23857b3402dd1702cb51a20f225a4da992c26a997c26d86b6b1d9

        • \Users\Admin\AppData\Local\Temp\libgcc_s_seh-1.dll

          Filesize

          576KB

          MD5

          46e1c7531774dee6a7125727095ea354

          SHA1

          2248bc2bd821aded068d2e5e55f5e7271b50ab91

          SHA256

          cecc229ea9e416207638b67d03bc6846fa188a14fe1c9e75028afb48ff4e2081

          SHA512

          fa9dc86df3e0a8f7b2579785c03717a43eec14beab8ca3176f73d4ecb0716d047241ab30cd53518e7acd645e9f8282a20552a6fa33824c34afc5c5210cc69f2c

        • \Users\Admin\AppData\Local\Temp\libstdc++-6.dll

          Filesize

          384KB

          MD5

          4cb3a8d3af58faf78da4dd33a03029db

          SHA1

          5356e4fb04a7047f6fc82a4e071e4803f97a0f3d

          SHA256

          86df790940bd442466ea58a434a31aaaadd1d23a9e9bf5e6fe625ff49049d620

          SHA512

          244237f4a13a7666e9f9592451dbb8bb18ca1f828d66f97e2890fa8f6be690d8890848102a8be253542c9f4b154d9f0e1aeeee5a867c866b78b64f9949f48c89

        • \Users\Admin\AppData\Local\Temp\libwinpthread-1.dll

          Filesize

          512KB

          MD5

          5fd46a66845c804b88dcd97ffcd66652

          SHA1

          9556ce5607bdd245c8e4d6a24b8217def653f57b

          SHA256

          b7fd85a2268a4d62fa15fde3d9e51d6fa3bc865cb4d8e5fdca309be7b027f193

          SHA512

          0896697d588401a6d29c30e77574ece4f0ba699b082b1bad93964748313a5903eb4994ec81c61bfcbd75f2be3f5200dadda3fd1454381cc5874a9c8952ebeedc

        • memory/1944-43-0x0000000066770000-0x0000000066808000-memory.dmp

          Filesize

          608KB

        • memory/1944-71-0x0000000000400000-0x0000000000667000-memory.dmp

          Filesize

          2.4MB

        • memory/1944-40-0x0000000000400000-0x0000000000667000-memory.dmp

          Filesize

          2.4MB

        • memory/1944-41-0x0000000061440000-0x000000006156B000-memory.dmp

          Filesize

          1.2MB

        • memory/1944-101-0x0000000000400000-0x0000000000667000-memory.dmp

          Filesize

          2.4MB

        • memory/1944-42-0x0000000070800000-0x00000000708BC000-memory.dmp

          Filesize

          752KB

        • memory/1944-44-0x0000000001030000-0x00000000028E5000-memory.dmp

          Filesize

          24.7MB

        • memory/1944-86-0x0000000000400000-0x0000000000667000-memory.dmp

          Filesize

          2.4MB

        • memory/1944-51-0x0000000000400000-0x0000000000667000-memory.dmp

          Filesize

          2.4MB

        • memory/1944-56-0x0000000000400000-0x0000000000667000-memory.dmp

          Filesize

          2.4MB

        • memory/1944-61-0x0000000000400000-0x0000000000667000-memory.dmp

          Filesize

          2.4MB

        • memory/1944-66-0x0000000000400000-0x0000000000667000-memory.dmp

          Filesize

          2.4MB

        • memory/3192-50-0x0000000000400000-0x0000000000405000-memory.dmp

          Filesize

          20KB

        • memory/3192-5-0x0000000000400000-0x0000000000405000-memory.dmp

          Filesize

          20KB

        • memory/4108-6-0x0000000000400000-0x000000000393A000-memory.dmp

          Filesize

          53.2MB