Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
293s -
max time network
297s -
platform
windows10-1703_x64 -
resource
win10-20231215-ja -
resource tags
arch:x64arch:x86image:win10-20231215-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
12/02/2024, 03:59
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4596 b2e.exe 4104 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4104 cpuminer-sse2.exe 4104 cpuminer-sse2.exe 4104 cpuminer-sse2.exe 4104 cpuminer-sse2.exe 4104 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4224-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4224 wrote to memory of 4596 4224 batexe.exe 38 PID 4224 wrote to memory of 4596 4224 batexe.exe 38 PID 4224 wrote to memory of 4596 4224 batexe.exe 38 PID 4596 wrote to memory of 2212 4596 b2e.exe 49 PID 4596 wrote to memory of 2212 4596 b2e.exe 49 PID 4596 wrote to memory of 2212 4596 b2e.exe 49 PID 2212 wrote to memory of 4104 2212 cmd.exe 52 PID 2212 wrote to memory of 4104 2212 cmd.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\9848.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\9848.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\9848.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\99DE.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4104
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166KB
MD576563bbb7e8b1b39b4f8671722baae52
SHA1d9977606e76b28bdf2c39cd268ca571ab746469f
SHA256bc1a5c426f1fae8fdc691a31132ece8747e2936735b23367a5e24bd52d6e5960
SHA5128cbe3b757b35efe17ce666f1014cc3dc36a19511ae5185edf84f045da869018370e367ce6d40852873ca5c2363f7b8e7c244666bcce5a208c79f29e3d3c377cd
-
Filesize
89KB
MD51f86057a46aa0d3095f80a313d63d656
SHA1377a41597770aec04993ec425e88a04b4e4656ae
SHA2566e9fb7b3d7b09b7322cdda2eb4f4ac9dd7ddfb692c3dd155d8403839a4860f33
SHA51253dc3dfe9a98fa2b5c13d30a8e61e9b7882ba11314712f68f7d60db97a6a73f44d94f7d66bf2a27d2b4e414355e6bc5fa2bd0ff0b7c9cea053a1b70df1357cb2
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
11KB
MD5cfa72f5f80ca3bf7cb369c67a0ed8efb
SHA1c90fa69c8f501d3fa3e69c1e2d9e10860292ce09
SHA2562727c02dde4b98c6ade092d56178ed872276af6019539cd10c29e968bc402566
SHA5129e46f6c1699319785bde41d3bc28b94a87e46d12b4c3bf9a373cc6c87761154aba5e3c62a0485cc6376596e411b65960c48a281bf59ebc8cbf859828c3b71ea0
-
Filesize
488KB
MD548d6afd4f11f598b71657e7f2611a823
SHA1baa169ca6d9f02b810fcd60a1282200f376d86d3
SHA256ec95232a90a6d1c0804209c9fd8e70d6a1a13487b40eaaeecadacc4e16186502
SHA51232fe05cf4d421628fc930450b8082c17dafce114db53d88db4f24639632a8386226cbe5423f5e65261441fe80494e0dcd6679c404a80acdb7914a1fe3bbd89d7
-
Filesize
325KB
MD5234044dc478892e3d429a22c11cc1abf
SHA119f60ef25feea388ecc5fe85e9d79565c51421e7
SHA256c7a5aa74705c9310c5748d9d1f21007cb46537756b01baa664907bd2972c95f3
SHA512dcc01e7fd1c5a3e63dda3d5cba172302e4454ad0c03701713c4ba90a73d7e7cf766b7522c0aecd3eac3416372335006f21293feda7844c8bdf51f2f96a7eb0ba
-
Filesize
458KB
MD5aef10187a5cf39b3877e994818c9f770
SHA15e4990bdaa628d731b7b609d7426454e285795f8
SHA256e96f99c993bb1124800ddb311c5722605dbc078eeb5bf1994ec78d8a60d6ee87
SHA512efdfa72161ca7a458bdc36cce0471f3b54ded7b9a85b7172344e45699e975bd2bc3b7de2dde0551ed449b759838f21e33b5fb02800f613007603fff7f3ed8de4
-
Filesize
486KB
MD57c65f0450d9ed2990ee2f3f818e95a7d
SHA1ec32db905da2304ce45d57557598eab2d096ed9a
SHA2566ade8489459cba3a0f7fcf657370193710245b3709e3126e1412572358b5ca2a
SHA51257dcf90befdf219aadee1e206275892aeb167b79fc6a9a792c58de9259e52a34316ba5ce07a25611531c7772a22a34671bf33d7a924d0cafa45f2ccafa985204
-
Filesize
491KB
MD5d9c188e3aa1bcd8126f93b6bceebbcfd
SHA1faa72a3483f2cf3726afd8c9a41413d04ab71366
SHA25614b32c0a177a8e66688708413255c5c5455e8710c979964032bbb830df9b1aa2
SHA5122b2a6d95bd075fe81b55754943ea2d1935da973d0887e0247d97884413dbc90007ccc77f61016cd87be561524c1c359886127afca146cdc1688cd25a8c67f21c
-
Filesize
508KB
MD5d33a9c289cbe0044fabced888ccb7e59
SHA15b9e3904a8f0ee85a5ed2f51d47e5b53acb87a86
SHA256bfac568c65b4d2ae5fae0d97106dc71b2a8cbb5d807b08868808768506743597
SHA512a190fccad7494fce1e778fa010cb2fe3d9752884ca80dbe28d8015418fb136b3a6e3f46e8f28d4e74bc8dcdd84c2e6813e88dd655ff79d140520815dec2b3c7a
-
Filesize
403KB
MD5e0477a13cf62a138493b7491f0e36f7c
SHA101fbce207ccc15a019d0a28d09a1713dc95c453c
SHA256de19566cac17d7e8f44427b4439fda755c5bd51e4b10531959419adfdadaf567
SHA512f3fecb889741d1270cf5650906101a385a6d53f91c8246ae70ef1f4e4bea50b9f37a402e4aa210ac3751eeb73fca80f977da99da91611c5e65524dfe8871d1d8
-
Filesize
525KB
MD5b742e5ca7f5dd9a679434776f9189938
SHA12cd25fa3ea9e7283768ebc49476a866f7ba58710
SHA25674ee5fbfddc68441a57b2a5c2e958e7506b6773a5f482b690d7bb1958edb255c
SHA5122bdd3bb248810b9d81df314d5dd5bd1987d2aeed53885784122436d88a1605cd668cd926b6dffb24cd9ee781ae466be47b2a740277cfb2ddb222890400d9b604
-
Filesize
74KB
MD51ea9a212c7d0cda19c5dbe7985dc1cd4
SHA14a29ae561ff93f0ac89c2f431693e21d6a75beec
SHA2560a42869a7f33e5db20ec5c68f090e1bd0bc0f29150a7e2be705d1bcbdc95bc26
SHA512c8217ec34e506806a2b1be13fd0d0233443deb43b836997f203341bea129274514fc1da82c4a11c2b7ebc8ca7f44b982d718fa33a719f9c9dfb7ab076920ce7f
-
Filesize
533KB
MD53496da7cdd8077ae7b4f7b007333e843
SHA1ac31766fe447d430d5c11cdf79805f587713b700
SHA256b9e526520b72bd7371ccc9219a5d2d2bcfd07a05c01b4192733fa268f7467403
SHA512e71e5746ed99b0f2ef04d470c18a18f031f9de1c5ec3ceb5baf9bca2aa7c3444857391334dbebf587935f4448c6d04561491b5482dbdc4f73f58bd4261a987be