File name:

bat2exe.exe

Full analysis: https://app.any.run/tasks/556183b4-a9b0-457d-831e-00aa684c6588
Verdict: Malicious activity
Analysis date: April 20, 2021, 09:23:01
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

7A56C8B9FFDD23E6F7A2D0EE422E0EB7

SHA1:

ADA737E537318F5FB900865B6ECD5DE9B8AE58F6

SHA256:

A80C25D09BFC8BC4AFFB8E394A7254574B7E7E39404404775382F005E6A067C6

SSDEEP:

24576:MddFMz0EHPf4R9urwd1Hj+2mZ1j6wF320ujMw91SnA4eOm4Bd7x:Mdd6z0sau41D+xr3O4wiA424Bj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • bat2exe.exe (PID: 2588)
  • SUSPICIOUS

    • Checks supported languages

      • bat2exe.exe (PID: 2588)
      • cmd.exe (PID: 3316)
      • cscript.exe (PID: 2704)
      • cmd.exe (PID: 1744)
      • cscript.exe (PID: 2152)
      • cmd.exe (PID: 3652)
      • mode.com (PID: 3172)
    • Drops a file with too old compile date

      • bat2exe.exe (PID: 2588)
    • Executable content was dropped or overwritten

      • bat2exe.exe (PID: 2588)
    • Drops a file with a compile date too recent

      • bat2exe.exe (PID: 2588)
    • Reads the computer name

      • bat2exe.exe (PID: 2588)
      • cscript.exe (PID: 2704)
      • cscript.exe (PID: 2152)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 3652)
      • bat2exe.exe (PID: 2588)
    • Executes scripts

      • cmd.exe (PID: 1744)
      • cmd.exe (PID: 3316)
    • Application launched itself

      • cmd.exe (PID: 3652)
    • Drops a file that was compiled in debug mode

      • bat2exe.exe (PID: 2588)
  • INFO

    • Checks Windows Trust Settings

      • cscript.exe (PID: 2704)
      • cscript.exe (PID: 2152)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

ProductVersion: 2
ProductName: BAT2EXE
OriginalFileName: bat2exe.exe
LegalCopyright: Islam Adel
InternalName: bat2exe.exe
FileVersion: 2
FileDescription: Created by BAT2EXE.net
CompanyName: Islam Adel
CharacterSet: Unicode
LanguageCode: English (U.S.)
FileSubtype: -
ObjectFileType: Executable application
FileOS: Windows NT 32-bit
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 2.0.0.0
FileVersionNumber: 2.0.0.0
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: -
OSVersion: 4
EntryPoint: 0x1373c
UninitializedDataSize: -
InitializedDataSize: 36352
CodeSize: 82944
LinkerVersion: 6
PEType: PE32
TimeStamp: 2010:11:18 17:27:32+01:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
7
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start bat2exe.exe cmd.exe no specs mode.com no specs cmd.exe no specs cscript.exe no specs cmd.exe no specs cscript.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1744C:\Windows\system32\cmd.exe /c cscript //nologo bin\browse.vbsC:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2152cscript //nologo bin\browse.vbsC:\Windows\system32\cscript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft � Console Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\cscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2588"C:\Users\admin\AppData\Local\Temp\bat2exe.exe" C:\Users\admin\AppData\Local\Temp\bat2exe.exe
Explorer.EXE
User:
admin
Company:
Islam Adel
Integrity Level:
MEDIUM
Description:
Created by BAT2EXE.net
Exit code:
0
Version:
2.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\users\admin\appdata\local\temp\bat2exe.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\usp10.dll
2704cscript //nologo bin\browse.vbsC:\Windows\system32\cscript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft � Console Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\cscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3172MODE 90,50C:\Windows\system32\mode.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
DOS Device MODE Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\mode.com
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3316C:\Windows\system32\cmd.exe /c cscript //nologo bin\browse.vbsC:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3652C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\7zS9155.tmp\bat2exe.cmd" "C:\Windows\system32\cmd.exebat2exe.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
1 368
Read events
1 355
Write events
13
Delete events
0

Modification events

(PID) Process:(2588) bat2exe.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2588) bat2exe.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2588) bat2exe.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2588) bat2exe.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2704) cscript.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2704) cscript.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16B\52C64B7E
Operation:writeName:@C:\Windows\system32\NetworkExplorer.dll,-1
Value:
Network
(PID) Process:(2704) cscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:Browse For Folder Width
Value:
318
(PID) Process:(2704) cscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:Browse For Folder Height
Value:
288
(PID) Process:(2152) cscript.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
Executable files
5
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
2588bat2exe.exeC:\Users\admin\AppData\Local\Temp\7zS9155.tmp\bat2exe.cmdtext
MD5:DE17828363C64B86228226D8DD6B125C
SHA256:3D86572D4A0F14634DFB2B1EC7CAED5A55D053C25B32D840BC2DE0130CDBC3C7
2588bat2exe.exeC:\Users\admin\AppData\Local\Temp\7zS9155.tmp\bin\7zSD.sfxexecutable
MD5:9E1DDC27083E1FFA5F7CA058860CF131
SHA256:5EF5C39D7EC09DB365F24984AFAA80D1863F5056E20BB13E9B97A8D2775ACEE3
2588bat2exe.exeC:\Users\admin\AppData\Local\Temp\7zS9155.tmp\bin\browse.vbstext
MD5:8580D8CAB38506F200F4D935EDCC19BE
SHA256:CBAF396FF11D723E0FFF497C6B7AFEDABE6975BCB32B7512058732911111AB15
2588bat2exe.exeC:\Users\admin\AppData\Local\Temp\7zS9155.tmp\bin\7z.dllexecutable
MD5:23A37370F275AA63255DFCC703951C37
SHA256:15B10608AFFD4442D0E2DDB9B2FEA847CD15D5405928D78AB73D81DAE66DB9E4
2588bat2exe.exeC:\Users\admin\AppData\Local\Temp\7zS9155.tmp\bin\7z.exeexecutable
MD5:F17D0D9999EC81F734AF19D721C8DA96
SHA256:EB021240D46F6C12E53FCF92F095EE87AAE055A82AE0D986318E8F8B57E463CB
2588bat2exe.exeC:\Users\admin\AppData\Local\Temp\7zS9155.tmp\bin\choice.exeexecutable
MD5:E8F8B1058775103AC8BA6381345A4A57
SHA256:4A1B84960EBB5E98F945A1935952633CD805A86B199D2DBCD140D75033636EC7
2588bat2exe.exeC:\Users\admin\AppData\Local\Temp\7zS9155.tmp\bin\rcedit-x64.exeexecutable
MD5:C1501B8075A6495634F6FA41C59F98DE
SHA256:02E8E8C5D430D8B768980F517B62D7792D690982B9BA0F7E04163CBC1A6E7915
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info