Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
294s -
max time network
301s -
platform
windows10-1703_x64 -
resource
win10-20231215-ja -
resource tags
arch:x64arch:x86image:win10-20231215-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
11/02/2024, 15:21
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 768 b2e.exe 5048 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 5048 cpuminer-sse2.exe 5048 cpuminer-sse2.exe 5048 cpuminer-sse2.exe 5048 cpuminer-sse2.exe 5048 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/2224-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2224 wrote to memory of 768 2224 batexe.exe 74 PID 2224 wrote to memory of 768 2224 batexe.exe 74 PID 2224 wrote to memory of 768 2224 batexe.exe 74 PID 768 wrote to memory of 584 768 b2e.exe 75 PID 768 wrote to memory of 584 768 b2e.exe 75 PID 768 wrote to memory of 584 768 b2e.exe 75 PID 584 wrote to memory of 5048 584 cmd.exe 78 PID 584 wrote to memory of 5048 584 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\A25A.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\A25A.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\A25A.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A50A.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5048
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.8MB
MD53a8dc661fb92beb56ff1072d448af4b6
SHA1139eedc3387fba747c15ba1b8b5f8f5928b2b14a
SHA25666a6a5fd3626a32b052730c8d2eb109728a3d5f2dacf6dbed026ed1b53a523b7
SHA51203c2cd0c377df305fedad33cb84f4f58bee8e7d0ebb4b6d91bf88d2c613e305d41cca97b8abe4fe494a925e764983bf79c8876ed7f9d25bb09397070ebcf8aa4
-
Filesize
6.2MB
MD5358f627d2cba148ff5cd248762ca4b3b
SHA111493bf87b1a3903d630014732467599143c7f16
SHA256a860295037064afd567dd25f33c5c6e0b766500d6830be9b0e9b704da715ab30
SHA5122716b845c7d813aee21c173af250ab902211cdda4c9e31db620bd609cba265948e5cc9777eaf8f465bafcb9c6b3a4275a924a9ab0f05de149a1ba486c42f1f00
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.9MB
MD5266934ae713d718ca008d2b53bd23bcf
SHA1d21491e5aa51004cbd91f338ed5ae3a3c09bae6b
SHA2563a054bfc647d7cb3b80802a0f15b75315f0184be49c3d416524629da00b07125
SHA51212722d0c47128215a5a639f2477509d0141d7a8c7ac00287354d0c49e0bd2635a1e862d785612d7dd0cd6e02aec8b82ca750160f5e8d738c14f0d50b2d15041f
-
Filesize
1.2MB
MD5f1ca0e4f8c80894a61a5945f2fc27c61
SHA15d8469a5db2409fefd4dd907e3f4e21d888212d2
SHA25685a6a3bf0a70ef299bf81f721b492de7d5dc9a8f73a7157c6c41bd4d8bf2957e
SHA5121859c39c68c69f7d76e987b8593932f0a059fcb48d5be21bb8bb8649bcafcd4f1951043c70be114484650d08deaa1b90bd35510db7ee6a1af1cda75b6af9f3c1
-
Filesize
1.5MB
MD5cfabb24421c8ae50ad2ef7490749bda3
SHA178767209d420e60abc6551748cc06aa1c5d2fac4
SHA256148985929507a3e6f71c1be1c16c255f8468946db59c136d603ba5654304bb85
SHA5126452aa418714e1c5cf962dc4a68d04b4e33cec990a3c3ba4e9ef0fa537f7d20b345bc999d159e1de7fc45ad39f9bc2f518cd4cc04a5de77468f23c369ee22fbd
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.6MB
MD5aa4970e63eee1877fda89b5bea84af54
SHA177fcc10be25cfce6839907ab0b56fbf48b8f5b22
SHA256d2d6cafcd2bd73d085fff90c7e7c409a0a416b6dc98ed69b99618b7ed8d90758
SHA5121125ac5756b885f99f296a32c23b9c728c3fddefa367b9b9d983723e5b73d7c9a17aac59804bc8977def4c8d2d473b8fb2d9875b0dddc95fd8f60bff81f193b5
-
Filesize
1.3MB
MD5e1a9d82d7caa12305d5f7c4fb332a51a
SHA19322829df3f667cc363be9060f753d5266ccd45d
SHA2563931b7ea00e9fe70c49a6a69b0fc56bc756634538d36d6662a1844983fde9f1b
SHA512e605a9818226b04cac47b6f677313f48fce0a1db87bbdb248dd3e0ee663614fa15d1087ae575a8f6ac16d75cb81f4ad8890e49f8edc76ab72394e44d8d58a923