Analysis

  • max time kernel
    292s
  • max time network
    299s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-ja
  • resource tags

    arch:x64arch:x86image:win10-20240221-jalocale:ja-jpos:windows10-1703-x64systemwindows
  • submitted
    22/02/2024, 14:46

General

  • Target

    batexe.exe

  • Size

    9.4MB

  • MD5

    cdc9eacffc6d2bf43153815043064427

  • SHA1

    d05101f265f6ea87e18793ab0071f5c99edf363f

  • SHA256

    73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72

  • SHA512

    fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6

  • SSDEEP

    196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\batexe.exe
    "C:\Users\Admin\AppData\Local\Temp\batexe.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:216
    • C:\Users\Admin\AppData\Local\Temp\94BE.tmp\b2e.exe
      "C:\Users\Admin\AppData\Local\Temp\94BE.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\94BE.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:652
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\96C2.tmp\batchfile.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4652
        • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe
          cpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 3
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\94BE.tmp\b2e.exe

    Filesize

    2.5MB

    MD5

    7e30e37ac55d637f10e9904f26d0b9fb

    SHA1

    2553418ee1a73db5f201a96ae3fb61be005a74f2

    SHA256

    4d81483934ef53c58a413afbcd0aaac750c9ac367b7809e16c4930d8c527d06a

    SHA512

    8b6d1e2c4f789a9f05a770ee53415e318f0595d0284693f9a849d6bf87edad43fa24da0b662a1c9ebba9a4c57fa84f3584bd3bbadffb08ea99d25941cd378a88

  • C:\Users\Admin\AppData\Local\Temp\94BE.tmp\b2e.exe

    Filesize

    2.0MB

    MD5

    fdeff16ca964a2e9a2203979adac8aef

    SHA1

    63fd594b64440d14c8bbb531f900073ca93d6f24

    SHA256

    ec3b54b18cd56dc7a31df8ba96620e24f6ba98f305481e310b7f159ce544f7c7

    SHA512

    e892709e7c3ff823345cdbde2b4be9f51b3769456baed5ab824bda5ae849dbcff8c2a5750c7db79baa9636eda2542df5df5421b6e8629c827fa4db1abc188e92

  • C:\Users\Admin\AppData\Local\Temp\96C2.tmp\batchfile.bat

    Filesize

    136B

    MD5

    8ea7ac72a10251ecfb42ef4a88bd330a

    SHA1

    c30f6af73a42c0cc89bd20fe95f9159d6f0756c5

    SHA256

    65e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9

    SHA512

    a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0

  • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe

    Filesize

    1.1MB

    MD5

    1ed6649893f9a7a5988b9b0a0c0025c2

    SHA1

    96ddcaca86aae873a976c7b297e4c608d1a2d78c

    SHA256

    6eb410093f6f5beedae325e95fc296eb82d737033e68297aa320d9556c796d6c

    SHA512

    d684cd845b0768b146ba441109e990f3db4c46488c07f34071eb12ba301b985cfa346c79caecc8e32e81902f19511016b78647173d0e400718e1f06d3ec3f7b1

  • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe

    Filesize

    521KB

    MD5

    cf28b0bfb8348a98c7288bef167b1748

    SHA1

    0af5f9bfda12a1b715fbf4deca2b476c5b9c1411

    SHA256

    58a71da4d3b8dd6eb1fca29a64116ddb5bf00ab102c27abb38187e375fb667c6

    SHA512

    3ebe7703821b26cbb0629a31547a7ab13dec020c14db93d7d2a029fd61867d4def0650d18a2f61acccebfa939ac05ab7513abcbacdf6b298b0c0c9c3197be88e

  • C:\Users\Admin\AppData\Local\Temp\libcurl-4.dll

    Filesize

    647KB

    MD5

    26913718ccbee15ec8265ae25e0d26ef

    SHA1

    e8c78e55580d6d71691c4c800cf61be976b8a060

    SHA256

    970a8a269044f067fd92146c27df905baf744ac2bad5da9ac45385a051a95796

    SHA512

    01b296ae43d3f62d7d799154a44a002c401edd7d2cc3dddd35f9bce8bd41bb9c4d457c3944c5dfa7716210b4818150c5fdc28f1fa723dc672c1f7e14b272f648

  • C:\Users\Admin\AppData\Local\Temp\libgcc_s_seh-1.dll

    Filesize

    577KB

    MD5

    34e4fce3f9ee1eab696a05f88653604f

    SHA1

    8455b6dcb0e15f3212150b06a3e399381b56aef7

    SHA256

    9ba3d65161094ac51e5c8f6ef3da08c5807ae0e2aa007f9bd67faf9f08e7aa0c

    SHA512

    0401cf0dd67d273b69702f1f73cea7e3de5d3e2f7cdde7367f2cc8d875f727535dc6988f25009baee0b8a15c704e4badeb04b9fe709c6e42f3335d0ce7545527

  • C:\Users\Admin\AppData\Local\Temp\libstdc++-6.dll

    Filesize

    769KB

    MD5

    9b8cc02e1b04614b681ea043d62c988a

    SHA1

    55af4ac7411985adae0261ba18bb43db0d8a4edc

    SHA256

    dfc49300fb5409d450b468fb38e7f367e2b0b35c8c5537423ba8cce0dc80a481

    SHA512

    ab91d23aead62b3f8028708076feceb83eefe056e492c8866c4b1f37a020541c76df06f09504fa7038b585b8220fb85c2d8fdf74fd4a3c18c2ac1e73419629ae

  • \Users\Admin\AppData\Local\Temp\libcurl-4.dll

    Filesize

    559KB

    MD5

    709b8804da173ba7f578f78421a580e9

    SHA1

    8a929902eef1bf813e0a4c7f8b8fcf1f60c0806f

    SHA256

    1379b66e002ac5e279875db6c91d010106acfd0a16585cb844f2e618c3abed4d

    SHA512

    6199d2d37397ee6d3e00c748948d803325df1094c2b0c0b3aff35c6b978495358c08888ba6b03bf7b33aaf9fd7b5bf00c1680deccd567189122c04b7fe621e62

  • \Users\Admin\AppData\Local\Temp\libgcc_s_seh-1.dll

    Filesize

    531KB

    MD5

    7379e275f4cc6e16059361b9a7d04681

    SHA1

    46fa8a3b4290b1194bd76ebc9ceab8897b1b44e2

    SHA256

    fa52827e76a48e7ab8ff307c5b5facdd4913f6eca69af46cb0368f861509569f

    SHA512

    a87a3785e50d71da90f595334f34c33b89934e0d53e9d5b5dd944d77ae52bef2009d7b1a3ab90fac9a25c2b8e75cc533a47ba410d8c650fdce87e924cb9e66c4

  • \Users\Admin\AppData\Local\Temp\libstdc++-6.dll

    Filesize

    342KB

    MD5

    009dc739e2f91ed994c67cbff424ba82

    SHA1

    41ba69864489c95b019bc1ed4b1a7e9f697cd880

    SHA256

    f27117d7485160b0932c5db3ad6994c8b9a79cddf6fa49a95c92ca724b9ed975

    SHA512

    0f44ec1ff3bed95a26bed77f99fa7ae8b115807383e5e8f1d76cff791883e6300df0f617a06b1db0fde6223b2550dbc3b15a0bb3210df765a5c4d86fa489b6c9

  • \Users\Admin\AppData\Local\Temp\libstdc++-6.dll

    Filesize

    809KB

    MD5

    3ebdf0c44b8a4834e51701e2d6eb07b9

    SHA1

    7cc82e6ae3808d31a5a28669da1adaa6dd5a02d7

    SHA256

    5c944d853a66348ac77c9187c0613f9a0f5f052928c9abde1a5076a937af25d3

    SHA512

    8ebdbfa9f15f9de41a2d56bfbdfddb01627eaf7f93def2b00f1674c676f173bcad832f7f6020c061c1a4ac3ed381bf8f07177517474551329f95fba3047c5418

  • \Users\Admin\AppData\Local\Temp\libwinpthread-1.dll

    Filesize

    606KB

    MD5

    585efec1bc1d4d916a4402c9875dff75

    SHA1

    d209613666ccac9d0ddab29a3bc59aa00a0968fa

    SHA256

    2f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232

    SHA512

    b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770

  • memory/216-4-0x0000000000400000-0x000000000393A000-memory.dmp

    Filesize

    53.2MB

  • memory/652-6-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/652-50-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/3028-40-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3028-66-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3028-42-0x0000000070800000-0x00000000708BC000-memory.dmp

    Filesize

    752KB

  • memory/3028-44-0x0000000000F40000-0x00000000027F5000-memory.dmp

    Filesize

    24.7MB

  • memory/3028-45-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3028-43-0x0000000056F30000-0x0000000056FC8000-memory.dmp

    Filesize

    608KB

  • memory/3028-56-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3028-41-0x0000000061440000-0x000000006156B000-memory.dmp

    Filesize

    1.2MB

  • memory/3028-71-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3028-76-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3028-81-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3028-86-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3028-91-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3028-96-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3028-101-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB