Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
293s -
max time network
295s -
platform
windows10-1703_x64 -
resource
win10-20231215-ja -
resource tags
arch:x64arch:x86image:win10-20231215-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
11/02/2024, 19:04
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4316 b2e.exe 2892 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2892 cpuminer-sse2.exe 2892 cpuminer-sse2.exe 2892 cpuminer-sse2.exe 2892 cpuminer-sse2.exe 2892 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/2964-4-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2964 wrote to memory of 4316 2964 batexe.exe 74 PID 2964 wrote to memory of 4316 2964 batexe.exe 74 PID 2964 wrote to memory of 4316 2964 batexe.exe 74 PID 4316 wrote to memory of 3784 4316 b2e.exe 75 PID 4316 wrote to memory of 3784 4316 b2e.exe 75 PID 4316 wrote to memory of 3784 4316 b2e.exe 75 PID 3784 wrote to memory of 2892 3784 cmd.exe 78 PID 3784 wrote to memory of 2892 3784 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\9143.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\9143.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\9143.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9366.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2892
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD502125b6c2e9e4b6ba6a8aa4e16032ed7
SHA128e6adef412f0914edae61e1226bdbfc3f660315
SHA2561f99b4e3ba6d2e1458b0bb0c25b131c67e73a523fa9ad6b0aa1fb62eafc98b71
SHA512d35105531c275833f8bea03dc78947de592434ddf08c98548c8f6059416b4fc919165bc8d80a3faab749983d5902eed07ede49f30b4a50ce6d7a84b7311b1b06
-
Filesize
4.1MB
MD51c458199b7dd89a20e616d210316ae6f
SHA1c0c6d67e624014e4128aca16fec5ccd60c5ed9b7
SHA2568f52e46a46a685f4e4ab71514dce8555c7c10ee59e3923f36159e72d182d1177
SHA512f52a749b33b9ac6e5da241cb21f02b2a4685cb0802dd97fe02cfe894f1c9255652c9dd6888cb0708eaad0b72cb1d9a9fac4a908c7cc6ea8a3ace3596b956161f
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.7MB
MD523537c706ab35dd3422af00662a094a2
SHA1810c655354d14db65f7398c8c8fe36963134dae1
SHA256914f668bf324c79b6369b5631e5a9c0b8ee1693351b44e37426c7b8065deca21
SHA512d4c517ab3a5d1939d8c5b9e522a1b5a3d38268154557b6d324d69e9162fc2a65bc3631d3e00c3baa3ea6dcc42e4f69a50fb3b61e6fc2d6170957f349b379d408
-
Filesize
2.0MB
MD57dfc28190e84e723d050dd5ffac269eb
SHA18465ea2dd50f9b0fba9348caf4906dd582b5189e
SHA2567377e37928a9ea05272a63c71f5d3db572e476de25bf54d821983c5fc6e070f4
SHA51285f3700db4fbd4a69e4fe3c66f2bdf7c3a1d51840c95e967e685f3d34b3e186597c663ac50867eec8d967949d77a741745e48cfeee1c9751a8dfac403028b51e
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.6MB
MD57075e98846335160cbf731697ad9af79
SHA15cfc8f1917cde652d75936de4bf8021f8c3da8f8
SHA256c92d8c0d21a0cbcd47ff8cdf3031b083d7ef531f66f265c4c13e1b1e3af83a78
SHA512c5ce18b7cffc53f7e0d7218c4ae3bc4af24b3789a19b9bad1159e482fee5db592b9429c864f3e1cee1770bc292df9479f6fa2e2dff89083cb734aa3d4bf63750
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.4MB
MD575ea3407bd16dc3416eccb6a8dff5e1d
SHA13134c309c1d823e8a8a1c883ef240cb596e2995b
SHA256c987ce9b919e7ad1d3f60290aeac7c65a3da995182bc15133a73430a7c8d01fb
SHA512ca63a364f2bf9afec796af1e722273d49991ddee62a1df8268833767818c0ae00ee9acbafa5f6575884faa5def6c4ccd71a18180bec2812bed440d378f607d8c
-
Filesize
819KB
MD508bee49462e1177fbf4bf39536d1e53b
SHA12e84d66f422068ab02245cab64511f01892d508d
SHA256036d3c5eeb1f9daef9a2a6aa8e03cb4eae351431bd07cf445b14c87ee760f4d0
SHA512d724308ede5388e0805c4df70b2fa0dcda640e735cd97f8d626cdf4cc3eaee03246f50f8ab4508a6665a76f1fdab8873c03a22be9e376d8ac9987e9ebe9557d8
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770