Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
293s -
max time network
299s -
platform
windows10-1703_x64 -
resource
win10-20231215-ja -
resource tags
arch:x64arch:x86image:win10-20231215-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
11/02/2024, 16:46
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 32 b2e.exe 5096 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 5096 cpuminer-sse2.exe 5096 cpuminer-sse2.exe 5096 cpuminer-sse2.exe 5096 cpuminer-sse2.exe 5096 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/2236-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2236 wrote to memory of 32 2236 batexe.exe 74 PID 2236 wrote to memory of 32 2236 batexe.exe 74 PID 2236 wrote to memory of 32 2236 batexe.exe 74 PID 32 wrote to memory of 4436 32 b2e.exe 76 PID 32 wrote to memory of 4436 32 b2e.exe 76 PID 32 wrote to memory of 4436 32 b2e.exe 76 PID 4436 wrote to memory of 5096 4436 cmd.exe 78 PID 4436 wrote to memory of 5096 4436 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\9402.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\9402.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\9402.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\95C8.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5096
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.3MB
MD50278846669e335d20dd0b7a2c2a4a52c
SHA13deff80e98a8ac13c4776343a95b43ef542a0050
SHA2560d8ea83dc7f110539ed4f1bd1966be5c6304ee952aa7fa59d2dc7de0487f0537
SHA512a2e1ea69a702a6cf8b83c9002ff9744d84ab69a5a3901d8a876067d1fb4de4be431689d80ec2169dd4678a53689d24803541c960c108619fda3dda08d48ee301
-
Filesize
5.9MB
MD59741f0fc9ca7d7e06f59597d98f0c538
SHA19d6771ce292333f848e88c26ee3f0e3e1e39aefd
SHA2564983ef5ed33c087b977a1c1490ff047c2631c6056dbadfce306fb7ebae108d94
SHA512ecac3f059cb70b990d22b10b1ea0070ffe3d803a2705727b1d59906a801af396034dff6620939559ebe5bfc47f7037e8e98dfacebdc0bcb7ae81d6b822f0575e
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.3MB
MD54c04147c386ba8792ac6a03069572a8a
SHA1dda67789fc1d0f2469ca95f01a5c81034853ca6a
SHA256c7739a1e940a282703d06eccda7110426d306f390e97fdbbd9df18472fd132cd
SHA512a8b5a0b878a9a7d30cb38feff814e1f4dce24d000158edc10a43ee9a89920bedf7adc92eb7e3913098b6aab7fbd0531f56fc09f508b5c2769992a94e55d153db
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
3.7MB
MD5f90a90f8d67e9de0ace14da292db798a
SHA1f1efdd76b062321e604fa7b83a780be9e970a708
SHA2564dc9bd5b3e64dfdc6d69dcecf35e0314f59231dd6f9e3b7f009aad3c888f40ee
SHA512f67a9cd48e496f1eff9aef4f957eb05e0ef59ee830f503aab17a88214c480bdc770482c55a53c716f6f92baeb72d1bf154d5f59b038c79508f90a62e69d281c6
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
3.5MB
MD5cbe947ce482e8c3c6063d5d04aef8957
SHA170b96c48d019f66652f4b5fded7a6b393460cde1
SHA256af5f81a00918ae2208f9f768dca2175c2d96599f32302a6ab91f2b783bdc5cfb
SHA5127dda4acfe4335c91de658a4f07accafe92e866de84c40a84a1f9f3edc484b7339aa70d4ceeb3fe7124169e7b99d51895335ab7223a6f891bec689b787810d5ca
-
Filesize
3.1MB
MD579a19e09ee63c8ae493a99acd290fff5
SHA1dba8103ce6edf419cb32fdf2a5ff314afe3f02ca
SHA256e4d18f6cdbe47272bb28637f33890b4a34a35feb6c9b9ebbb6fd797c32745beb
SHA512426a474c8318815c66e5a70354dfb72031a81d3b39eb6727a60b9cb25f025a30d68c2d33ccf57a5545b01a3ec9b5fa5a7402e215d492c0d768e63096e2bd3c98
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770