Analysis

  • max time kernel
    295s
  • max time network
    305s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-ja
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows
  • submitted
    22/02/2024, 14:44

General

  • Target

    batexe.exe

  • Size

    9.4MB

  • MD5

    cdc9eacffc6d2bf43153815043064427

  • SHA1

    d05101f265f6ea87e18793ab0071f5c99edf363f

  • SHA256

    73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72

  • SHA512

    fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6

  • SSDEEP

    196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\batexe.exe
    "C:\Users\Admin\AppData\Local\Temp\batexe.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4396
    • C:\Users\Admin\AppData\Local\Temp\9E72.tmp\b2e.exe
      "C:\Users\Admin\AppData\Local\Temp\9E72.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\9E72.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1588
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A558.tmp\batchfile.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5056
        • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe
          cpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 3
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:3660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9E72.tmp\b2e.exe

    Filesize

    4.4MB

    MD5

    9b2a4bb1a3c9a77cde0b088709eb73ad

    SHA1

    fbe406209e546ee563ae5ed7aed0183ed2ed2a8d

    SHA256

    dc57351853f0f5e1b3c2dc9635aedba1e0faf86237d6da79b0c77afa73272caa

    SHA512

    5bc777ad17f4825e408bff69597299903c67c73a819631ba99ca31229fe745139aace3845cfbc40c78548bc6f155e76738ab65f8a77248856a74dc861c2970d2

  • C:\Users\Admin\AppData\Local\Temp\9E72.tmp\b2e.exe

    Filesize

    1.2MB

    MD5

    7b3805db6db875cca56c40c0b269b726

    SHA1

    4c0c85fcbb66f7793c050d2ab2428865c6776192

    SHA256

    d9fb4b56dc1c536a161fc2a5f4cc4890cdf6db399d50137a8c7054b11326f25b

    SHA512

    c45442ee36249d1ce0fc7c664ef5b545c20318b10d39aeeb22b39ac28068dbffd64593a574052fa7f646c635648e2a78a36ab87792523175b8219e7571683f2b

  • C:\Users\Admin\AppData\Local\Temp\9E72.tmp\b2e.exe

    Filesize

    1.2MB

    MD5

    7ade0d5cdd8abd773f16fc60152cfb23

    SHA1

    c4b899e22defcaf2e1c27cbb349120c9c0461802

    SHA256

    ad046d44441e283ea22e5188f579d1e5da73f610f60ac12fd6814adfbbc0544c

    SHA512

    23e452e5972f00932c0323a6f9e48cfda120ad3acfb067556e9c8c991c35490601994da42d9265276d8647b350d7a56463562ec55f3b68c658592156ecdf375d

  • C:\Users\Admin\AppData\Local\Temp\A558.tmp\batchfile.bat

    Filesize

    136B

    MD5

    8ea7ac72a10251ecfb42ef4a88bd330a

    SHA1

    c30f6af73a42c0cc89bd20fe95f9159d6f0756c5

    SHA256

    65e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9

    SHA512

    a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0

  • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe

    Filesize

    548KB

    MD5

    e4a6d2224fc10456bf7fc2b2fee62045

    SHA1

    393132664ba38f305d024af68d62754126e74954

    SHA256

    3f9ed75df1938746bca20ac5905512870afe68d7e603ad8b1c5fd6730b22a3af

    SHA512

    22d2bc29c6468076384eef4f593095e407478996a60b3cb305907f9113ee4003dd7c110dc9d0a71e8db8715cd8801687fdf5b3244dc4cb5a7858607b3bdd6142

  • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe

    Filesize

    781KB

    MD5

    d63995ff99b693c9fbbab2404929d1c2

    SHA1

    a08df85567f1b764aa04a19bc47c0cf097ded3b0

    SHA256

    0c554332e755fc7bd5395f99ff8194d0f2f444add67e606c68844488142f7615

    SHA512

    f3e08c4874af60bd61f5287c2c6c4db78d28eb5ff170819e3443f8d2155131643d7af341608d98b522eb742228a18aba7b24cda346e402c810b5ee481f21376c

  • C:\Users\Admin\AppData\Local\Temp\libcurl-4.dll

    Filesize

    369KB

    MD5

    2cf914e0f10b4bbe74f7e8a7667cbeec

    SHA1

    77f5e94e3d3198329de80905eceae68681956a69

    SHA256

    92bd19e1f2c2f51d63d956e2fa32b8f38759eecd47ffa63734bf9b584c2a3ffa

    SHA512

    a9ac6ed6dd50690a3040b02b8bfa7b2bfc8a562513abdd50fe0912ceb10cadb7cf65868aa4adda32f15d7dc4d6f64e795568ab3dc0e7a127fa0f83ac303b06f3

  • C:\Users\Admin\AppData\Local\Temp\libcurl-4.dll

    Filesize

    690KB

    MD5

    0f2577e9e7ed6e9b81f7a80c8fb5670d

    SHA1

    eeeaeb20b4ea99fc2b412714d8ffce6140a07438

    SHA256

    86745ec5b89ad08e08997d44f226e9c954bd22d1497b29e7b1daefea7c9f8f87

    SHA512

    5bcf7ecd2e328914b4bf339091a355009c21493f0750c5fda76dceaa1ce773e53141a1aea90fcf056d1a86b5057f3b122322a9cfd875d7b69cc235a56a4daecd

  • C:\Users\Admin\AppData\Local\Temp\libgcc_s_seh-1.dll

    Filesize

    704KB

    MD5

    4acb381cc4f98fde7e00c433b4ce0163

    SHA1

    eeb11fcb16e337abe92ab9b28d5ee574d4ccf137

    SHA256

    205c7bb70cf6da6475fbeb0da9986b061dfdae547e054927ea95ee138c89c717

    SHA512

    feccc4a128bb5480bd8dc4fa620e13fd807a0a02813bfefa9b3a9ca77e4e672d2b3b4695c2c8cbc7b8ff681790898fbe17717377621938be7a0038ca6e0de4e0

  • C:\Users\Admin\AppData\Local\Temp\libgcc_s_seh-1.dll

    Filesize

    593KB

    MD5

    8a4582dcb84df04c28bc05a3229b7074

    SHA1

    f4a9482bd31371fdd6cc8b2c3f590fab375a0f97

    SHA256

    8fecfe62d7e388807e5283a4a7ffa625f27130eb5e0b81a88b9ead5e5777013f

    SHA512

    003749f6b83ea2e7e3fa389f4aca8b71991b469e75dc197bdefb748e5971dfc583034a95a5cb0bf654890246a3245077b9aeca10425abb23f4e3b9547f5fd93b

  • C:\Users\Admin\AppData\Local\Temp\libstdc++-6.dll

    Filesize

    850KB

    MD5

    eddc406c769a8568bd7892695768952c

    SHA1

    214bd3ff6e91dd699d6c5701838066fdd53da514

    SHA256

    c9d823214dcb55157871d140c17b26b2af8b4ac75deef2e890b60d2e3bab81d1

    SHA512

    722e107fd82e8d257ce9eb14872d27f0716bb4c7d604803a24912ad0c1dc7f603c98013ba958fb889afd5d89dbf0d2119e2d57ef48875afa9bdfbc67d92d752a

  • C:\Users\Admin\AppData\Local\Temp\libstdc++-6.dll

    Filesize

    546KB

    MD5

    e638deb02c7d3214b9b68aa4c2cb7755

    SHA1

    6e5a5204fb6d13fbab5ba35c29b3a6e28455cf49

    SHA256

    db83978c3e7b3597db4f498ba3c62167d941db269c4a288f1db3de8c90a7ebb5

    SHA512

    91358403903149dacf9c5ba6ed6e3b60a8fffa627e8e82bbfacae3d89f17c2aa3f67cd0f8ba4b8208134ef545d6c7493df9eb7ad3aa7ed3f0498aa09c5af2f7b

  • C:\Users\Admin\AppData\Local\Temp\libstdc++-6.dll

    Filesize

    706KB

    MD5

    02ce8b74ceee76cb91d893a5559ed34d

    SHA1

    6beb65e66cd4387b3bacdd1d4e354e9d91d65c3d

    SHA256

    367e90aa7951d676efe26e4e725dcb43f22c26d625333b8d37dc0dce6820ff92

    SHA512

    3cc3890d15b238987d9479e8638d80cfbcf7a6b6bd157c72b016c7a7e9cf4e40c92d7c19f936ddfc302b9e9cebd360129f8c16f223fe16f487ab1fc5523606f6

  • C:\Users\Admin\AppData\Local\Temp\libwinpthread-1.dll

    Filesize

    606KB

    MD5

    585efec1bc1d4d916a4402c9875dff75

    SHA1

    d209613666ccac9d0ddab29a3bc59aa00a0968fa

    SHA256

    2f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232

    SHA512

    b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770

  • memory/1588-53-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/1588-8-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/3660-47-0x0000000001130000-0x00000000029E5000-memory.dmp

    Filesize

    24.7MB

  • memory/3660-46-0x0000000055A20000-0x0000000055AB8000-memory.dmp

    Filesize

    608KB

  • memory/3660-44-0x0000000070800000-0x00000000708BC000-memory.dmp

    Filesize

    752KB

  • memory/3660-43-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3660-48-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3660-45-0x0000000061440000-0x000000006156B000-memory.dmp

    Filesize

    1.2MB

  • memory/3660-54-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3660-64-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3660-74-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3660-89-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3660-94-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3660-104-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/4396-9-0x0000000000400000-0x000000000393A000-memory.dmp

    Filesize

    53.2MB