Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
292s -
max time network
299s -
platform
windows10-1703_x64 -
resource
win10-20231215-ja -
resource tags
arch:x64arch:x86image:win10-20231215-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
11/02/2024, 21:50
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231222-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3172 b2e.exe 2500 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2500 cpuminer-sse2.exe 2500 cpuminer-sse2.exe 2500 cpuminer-sse2.exe 2500 cpuminer-sse2.exe 2500 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/1312-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1312 wrote to memory of 3172 1312 batexe.exe 75 PID 1312 wrote to memory of 3172 1312 batexe.exe 75 PID 1312 wrote to memory of 3172 1312 batexe.exe 75 PID 3172 wrote to memory of 3844 3172 b2e.exe 76 PID 3172 wrote to memory of 3844 3172 b2e.exe 76 PID 3172 wrote to memory of 3844 3172 b2e.exe 76 PID 3844 wrote to memory of 2500 3844 cmd.exe 79 PID 3844 wrote to memory of 2500 3844 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\9971.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\9971.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\9971.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9B65.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2500
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.4MB
MD51df03b053229315d4dbb37e5a38e3445
SHA1d723a542678c2cc63412fba314aa6e1ee7c5ee64
SHA2561dc835acffcfbf0663e926a1c899a4b3730d1509076adee76185a6a6b5df92d0
SHA51274180c3fe2d1f2f3d502878d28161ffa414f0a6739ac8d6f0181606a8f41cfc11a1dc81be0cb0b5d8873d1f677f030b1521264c64805d977583ac6b3bc1df03b
-
Filesize
12.2MB
MD5279b7a8422da571481fe522c5af327ef
SHA1bf285b9e4d2ac5fcc1289c11397e90e04d7b7aa7
SHA2564078b4647158a788fa26bc35bb411ec84a087c1649ef475368a82e29efa0d6ac
SHA5120c45af14d45633582326e7f0f274eb1a6d8923b716faf9422fc764f4369e1261171ae069884c6736c89ca73d25aeac1d50a758d139dc3d2cfd3f9b68cc2e49f0
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.3MB
MD54c04147c386ba8792ac6a03069572a8a
SHA1dda67789fc1d0f2469ca95f01a5c81034853ca6a
SHA256c7739a1e940a282703d06eccda7110426d306f390e97fdbbd9df18472fd132cd
SHA512a8b5a0b878a9a7d30cb38feff814e1f4dce24d000158edc10a43ee9a89920bedf7adc92eb7e3913098b6aab7fbd0531f56fc09f508b5c2769992a94e55d153db
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
14.4MB
MD5bb5f23af2c2c83dfa560baef7e5b69f0
SHA156156e2e02492a14b1b0f3c16d12eaf35f5de79e
SHA256aa653c3d3965a34ebf331e533db64a52a5aee1cead533143ae925d3718bd7825
SHA512d6b5a02fbc08b2062d803e0b5907317d50de88811b1bef230df935fc8266f9583a5531bcca5527dce4d7f538c68ac9afb29f581fcdc277060bc41ed48f0d9ebd
-
Filesize
15.4MB
MD56a596fa6e2abc5ca8d9bff592dc4bb07
SHA1aff9db1795a4c535088368797ced04f2113b295b
SHA2563ef0d0c58ac1b03f86bf441b72fe0b5827cc721a010a1b4b2a9b7e1b6a851b31
SHA512762ecaadc8d4912b1764994e9406920c8336e03224941a5796cec197905189f1572ab96d6bb66d5cefac17a8498b9fc58c53599caa3b01f078a13348fbcf44e8
-
Filesize
12.1MB
MD591442e55bdc80efa282e847d8d6962ce
SHA1ef2439e2bc76deaa924cac4d94d9fe1f4b9b0e27
SHA256f237e79ccb7db31f8617956fb1a687587da3c2a931ba90db3d2f4b0e2fdcf103
SHA512870074163b5833d32b4050c9bb10f7958eb35d23f184f7f86d9c216b66ee88a1e359fd36d00a76a2725207a8db80518fc2b0c820876e1750608f1d3b61addd64
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770