File name:

Bat_To_Exe_Converter.exe

Full analysis: https://app.any.run/tasks/8b73d73f-8692-4560-93b4-c027502a2bb2
Verdict: Malicious activity
Analysis date: October 29, 2020, 23:38:58
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
opendir
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5:

603F241C0CB4530ACE1F37F3E8D86D04

SHA1:

389B4135578245D0D938E883A5FD5B713DB57EB5

SHA256:

D853C4B83A9C8180C16FD22C3D63A899B101B9E7B5D9328777F37484C8649402

SSDEEP:

49152:wju1jBAZYEZAgMujB8v+mPEL1b2DlkNXNdcmuCpjil+0ugm:wUjBI7TVOELk5kN/zuCpj++0ugm

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • Bat_To_Exe_Converter.exe (PID: 2664)
  • SUSPICIOUS

    • Reads Internet Cache Settings

      • Bat_To_Exe_Converter.exe (PID: 2664)
    • Executable content was dropped or overwritten

      • Bat_To_Exe_Converter.exe (PID: 2664)
    • Application launched itself

      • Bat_To_Exe_Converter.exe (PID: 2664)
    • Reads internet explorer settings

      • Bat_To_Exe_Converter.exe (PID: 2664)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (64.1)
.dll | Win32 Dynamic Link Library (generic) (15.5)
.exe | Win32 Executable (generic) (10.6)
.exe | Generic Win/DOS Executable (4.7)
.exe | DOS Executable Generic (4.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:02:01 21:50:01+01:00
PEType: PE32
LinkerVersion: 2.5
CodeSize: 1781760
InitializedDataSize: 147456
UninitializedDataSize: 1523712
EntryPoint: 0x327340
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 3.0.8.0
ProductVersionNumber: 3.0.8.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Unknown (0)
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
CompanyName: Fatih Kodak
ProductName: Bat To Exe Converter
ProductVersion: 3.0.8
FileVersion: 3.0.8
FileDescription: Bat To Exe Converter
InternalName: Bat To Exe Converter
OriginalFileName: Bat To Exe Converter
Email: [email protected]
Website: http://www.f2ko.de

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 01-Feb-2018 20:50:01
Detected languages:
  • English - United States
CompanyName: Fatih Kodak
ProductName: Bat To Exe Converter
ProductVersion: 3.0.8
FileVersion: 3.0.8
FileDescription: Bat To Exe Converter
InternalName: Bat To Exe Converter
OriginalFilename: Bat To Exe Converter
Email: [email protected]
Website: http://www.f2ko.de

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000080

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 01-Feb-2018 20:50:01
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
UPX0
0x00001000
0x00174000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
UPX1
0x00175000
0x001B3000
0x001B3000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.99984
.rsrc
0x00328000
0x00024000
0x00023C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
6.57072

Resources

Title
Entropy
Size
Codepage
Language
Type
1
4.92322
611
UNKNOWN
English - United States
RT_MANIFEST
2
5.72897
67624
UNKNOWN
English - United States
RT_ICON
3
5.71122
16936
UNKNOWN
English - United States
RT_ICON
4
5.68138
9640
UNKNOWN
English - United States
RT_ICON
5
5.92516
4264
UNKNOWN
English - United States
RT_ICON
6
5.98264
2440
UNKNOWN
English - United States
RT_ICON
7
5.99869
1128
UNKNOWN
English - United States
RT_ICON

Imports

ADVAPI32.DLL
COMCTL32.DLL
COMDLG32.DLL
GDI32.DLL
KERNEL32.DLL
MSVCRT.dll
OLE32.DLL
OLEAUT32.DLL
SHELL32.DLL
SHLWAPI.DLL
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start bat_to_exe_converter.exe bat_to_exe_converter.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2664"C:\Users\admin\AppData\Local\Temp\Bat_To_Exe_Converter.exe" C:\Users\admin\AppData\Local\Temp\Bat_To_Exe_Converter.exe
explorer.exe
User:
admin
Company:
Fatih Kodak
Integrity Level:
MEDIUM
Description:
Bat To Exe Converter
Exit code:
0
Version:
3.0.8
Modules
Images
c:\users\admin\appdata\local\temp\bat_to_exe_converter.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
3500"C:\Users\admin\AppData\Local\Temp\Bat_To_Exe_Converter.exe" /?C:\Users\admin\AppData\Local\Temp\Bat_To_Exe_Converter.exeBat_To_Exe_Converter.exe
User:
admin
Company:
Fatih Kodak
Integrity Level:
MEDIUM
Description:
Bat To Exe Converter
Exit code:
0
Version:
3.0.8
Modules
Images
c:\users\admin\appdata\local\temp\bat_to_exe_converter.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
Total events
475
Read events
466
Write events
9
Delete events
0

Modification events

(PID) Process:(2664) Bat_To_Exe_Converter.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2664) Bat_To_Exe_Converter.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2664) Bat_To_Exe_Converter.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2664) Bat_To_Exe_Converter.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2664) Bat_To_Exe_Converter.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2664) Bat_To_Exe_Converter.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2664) Bat_To_Exe_Converter.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
Executable files
4
Suspicious files
1
Text files
31
Unknown types
1

Dropped files

PID
Process
Filename
Type
2664Bat_To_Exe_Converter.exeC:\Users\admin\AppData\Local\Temp\41B1.tmp\1960178370.cmd
MD5:
SHA256:
2664Bat_To_Exe_Converter.exeC:\Users\admin\AppData\Local\Temp\41B1.tmp\374600396.batbinary
MD5:93B885ADFE0DA089CDF634904FD59F71
SHA256:6E340B9CFFB37A989CA544E6BB780A2C78901D3FB33738768511A30617AFA01D
2664Bat_To_Exe_Converter.exeC:\Users\admin\AppData\Local\Temp\41B1.tmp\Scilexer.dllexecutable
MD5:9092CC0FA27603C620DF12B58C4C89DF
SHA256:6468CDF465B47C64EC621F548FFF5E32CA24E21F50A331A17014F68006B12F0E
2664Bat_To_Exe_Converter.exeC:\Users\admin\AppData\Local\Temp\41B1.tmp\lng\Magyar (Hungarian).lngtext
MD5:0427E675DAE96193FBBD2575B25E4ADD
SHA256:A9EC95138C89144FAD7304CCDFA22E30F4552F42EC5F87EFBEC17E6B45227886
2664Bat_To_Exe_Converter.exeC:\Users\admin\AppData\Local\Temp\41B1.tmp\lng\日本語 (Japanese).lngtext
MD5:2125B2D9BFDA91CECA3ED41F4C861B4C
SHA256:876D4162596D4EFA962D5E214A3A801EAE4C8BFD36439D20880D5098F602321B
2664Bat_To_Exe_Converter.exeC:\Users\admin\AppData\Local\Temp\41B1.tmp\lng\한국어 (Korean).lngtext
MD5:CFC7FC230EA20DC8E11BB17389FA57B2
SHA256:63D5C6772D8998FBD0331092E96151CA31662A6A7AC7B11AF4F5E2FD30ED77F4
2664Bat_To_Exe_Converter.exeC:\Users\admin\AppData\Local\Temp\41B1.tmp\lng\Slovenský (Slovak).lngtext
MD5:F19CD4F6CCE52F99B6C62802E0D690C4
SHA256:9442A4ED768B0F65D4A8DD5C1E91C9E7EDBEA4235C8C8E5C6AB44A54F93297A1
2664Bat_To_Exe_Converter.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\wp-emoji-release.min[1].jstext
MD5:EC33F485BA2D4767DAE9D112B78F8B02
SHA256:96D33F532112177EDE6BF262DCF6D0140DBE29F05A4595D17B0BE4743205B5EA
2664Bat_To_Exe_Converter.exeC:\Users\admin\AppData\Local\Temp\41B1.tmp\lng\العربية (Arabic).lngtext
MD5:101A8B4AE341C9D9ACD37626BA3909F5
SHA256:F12BF0E1FF2327107B92DE4D69234D0364B530B34761E01CCB021805C3ABE562
2664Bat_To_Exe_Converter.exeC:\Users\admin\AppData\Local\Temp\41B1.tmp\lng\Português Brasileiro (Portuguese Brazilian).lngtext
MD5:60B2F5E8EE608D48E23A7F0096F4FAC9
SHA256:42C56325E83DFBB8112FDF93F56584D91D3FABB4C56C3EF710FD427F2FA6A8DA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
3
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2664
Bat_To_Exe_Converter.exe
GET
404
179.61.149.162:80
http://www.f2ko.de/donate.php?app=b2e
US
html
5.99 Kb
malicious
2664
Bat_To_Exe_Converter.exe
GET
200
179.61.149.162:80
http://www.f2ko.de/wp-includes/js/wp-emoji-release.min.js?ver=5.4.3
US
text
5.12 Kb
malicious
2664
Bat_To_Exe_Converter.exe
GET
200
179.61.149.162:80
http://www.f2ko.de/wp-content/themes/twentytwenty/style.css?ver=1.5
US
text
29.7 Kb
malicious
2664
Bat_To_Exe_Converter.exe
GET
200
179.61.149.162:80
http://www.f2ko.de/wp-content/themes/twentytwenty/print.css?ver=1.5
US
text
1.03 Kb
malicious
2664
Bat_To_Exe_Converter.exe
GET
200
179.61.149.162:80
http://www.f2ko.de/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
US
text
38.4 Kb
malicious
2664
Bat_To_Exe_Converter.exe
GET
200
179.61.149.162:80
http://www.f2ko.de/wp-content/themes/twentytwenty/assets/js/index.js?ver=1.5
US
text
8.00 Kb
malicious
2664
Bat_To_Exe_Converter.exe
GET
200
179.61.149.162:80
http://www.f2ko.de/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1
US
text
4.20 Kb
malicious
2664
Bat_To_Exe_Converter.exe
GET
200
179.61.149.162:80
http://www.f2ko.de/wp-content/plugins/contact-form-7/includes/js/scripts.js?ver=5.3
US
text
4.55 Kb
malicious
2664
Bat_To_Exe_Converter.exe
GET
200
179.61.149.162:80
http://www.f2ko.de/wp-includes/js/wp-embed.min.js?ver=5.4.3
US
text
784 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2664
Bat_To_Exe_Converter.exe
179.61.149.162:80
www.f2ko.de
Digital Energy Technologies Limited
US
unknown

DNS requests

Domain
IP
Reputation
www.f2ko.de
  • 179.61.149.162
malicious

Threats

No threats detected
No debug info