Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
292s -
max time network
301s -
platform
windows10-1703_x64 -
resource
win10-20231215-ja -
resource tags
arch:x64arch:x86image:win10-20231215-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
12/02/2024, 07:30
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2376 b2e.exe 2264 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2264 cpuminer-sse2.exe 2264 cpuminer-sse2.exe 2264 cpuminer-sse2.exe 2264 cpuminer-sse2.exe 2264 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/2368-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2376 2368 batexe.exe 74 PID 2368 wrote to memory of 2376 2368 batexe.exe 74 PID 2368 wrote to memory of 2376 2368 batexe.exe 74 PID 2376 wrote to memory of 4708 2376 b2e.exe 75 PID 2376 wrote to memory of 4708 2376 b2e.exe 75 PID 2376 wrote to memory of 4708 2376 b2e.exe 75 PID 4708 wrote to memory of 2264 4708 cmd.exe 78 PID 4708 wrote to memory of 2264 4708 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\A48D.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\A48D.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\A48D.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A78A.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2264
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5d81be0d64a2bc58d4c1beb5b92d46412
SHA1368a486baadaad228203aa35ff16d480a308e124
SHA256184ee356a63ceaff5e0844ff89ffb0f8a457497af97f76434f5082cbab954198
SHA512ff05780db5b734196a294062b57e1c3cd48620da7e61197f69369687d44e8f990e477d8638d67f81b797a3d56ac82e352f67ed5c3ccb8981626503ee0733c2f0
-
Filesize
2.7MB
MD54a848d3165da9c7e847bfc77f0b7b046
SHA1dd13aaa2b8b3641ca725cc630ac6698a47f7c7c8
SHA2567d56ca2f26bac77f21001053af423255a9212a45f731c7af9f0084b811fb0c30
SHA512712241a869d529facb957ede81c557a7c68dfc8958b41907fc4aec8ebedfc032f88145f1c378a7b9fce272ed2393934990ee58bbfca07fe30aa5670c61617dea
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
473KB
MD557274921a92c5dba5600f384086d2b9a
SHA184cef883e92d667a9ff9f3410b57ed60d2f76aa3
SHA2566bf4bb90e66759f09ac4525c0ba1b35d8e13dc5ab8e685a3791cde590334b8f6
SHA51244aa4acfea3e9252111d2c04a9070a3cccc8d5a42d0e83bfde30152f27ea3c6ec23b9893b86c1a02aa72afa2e3b287b3f1437ef06a5fa99a338d6c217d4d836b
-
Filesize
824KB
MD5635fd9b6732ac19a00c7fba7d6305178
SHA1ce67d246fc3e8847b38bc5d1a70d911fec0c3049
SHA25652b1d6dc133c7d7ab71bffe64b30c14471293360cc654cb8898d4729eca90281
SHA51276e8c2163409584153f65675fc0dcabf6bc9a599a7819e7183ae4dcf851970a9b9d674cbbfcdd3f50259c35ce96cea385d8cd7c598f800d8e2c128b03e43c873
-
Filesize
522KB
MD59d589325f53d85ebde7b9a73ce973896
SHA1760e6c8deb61e88069bd04b382ac40309921ea06
SHA256f21657d224332531f286670436f99fe4def31cea9fc420d60aa22f8d6d568330
SHA5127365f75b4ec8b4a303c42e03893e0f89189d539d6c87502956604e9ad8776372e3efaf6a7faacf8a5c79636fed5a24194c5d8194b643953d7c66f45e36b58589
-
Filesize
1.0MB
MD55875329bdddae820c44ad8e162de7c75
SHA161edbc811bff6d01127d8babc2b4bebaa403eac4
SHA25635b8754df080b21d5ffc5e3a69b8aafad7b6d289056b6b3dc300ac0d4f90dc89
SHA51242d1fdb8819313ea60ce9e62ae38c9715ccc666e42679123ee3bd5de5d55cfa6791a50a9e6ca2eb27599dcd4fb2fbd2a5caab5e2bfdeadf7810eeef345508702
-
Filesize
1.0MB
MD51b91f70657159f0728e25f5733deb2bf
SHA1aee9cbe84ba247d14e82d364859ec522d873e571
SHA25626a776ebd7c269105562cb71a68d313be4fae14482a560c7b87b4a6ff8757bde
SHA512e66ec5c92618026073a513b5ea8c5a9535b1249716660a65e1f1d9f70cf301fe2a2c16aa98c4e73be674eca37e9abe16957dc0b439a04ca962363564a1787043
-
Filesize
524KB
MD57c1f426ea88d0c10fad5fb8aaa48a90e
SHA1b5083e97c72611691b5c2a104904b393e0d28de2
SHA2568e2f38967aa681548287483b20a7b084d268b8dd567b10a5f0cb4e68057bfa5e
SHA51241d88e7590d8adbad61f7068655caf13e3028bc95a98928fa1e770818ae1d1833bbb9bd27f3183f5833a819b4582ec3607855f37c6d7ac027acda85d55db5360
-
Filesize
640KB
MD5ac7d1c3bb4d3c69372907331267c1ee7
SHA1fa82689799785ef9ab4c304b1c1a6d2d9a961928
SHA256d22689ab67764158df7b19e8d78ec1393899f21e390f469a300975a31106c3aa
SHA5120d541661060d7c5eed486ea0377142e7d3883b3c0935114679af28bcae0b1767585fe06328955cf59aab4fe3d4acfba525dbc42675fbce80b7d0b2300784d125
-
Filesize
1.1MB
MD559b425b4c2eb02b3c194ba840384efaf
SHA1e7f8c90ffd5c98ae499be672eacddaa9f5e01319
SHA256dee5c8f82fe9542cc5693a52913437d14f5ecdf0ec23cba9ff56b4f2efee8c01
SHA5120a42bdb39a9482c3f60dd6f9572a0c67a1b8e1e73a5fe0bef3a837db951937a69825c34bce07a2df4c8abbcdd02324ab449c1642bd1637d37cd5a90d6abd5aab
-
Filesize
681KB
MD581146448867a74bea60036254a323fb9
SHA137504d52b8d961c878828375e8cb0829bef59fc5
SHA256b164f1d5275670df9a39fe7b23bd224b4a7304af45997a5f8aeca5bb0eaa37b2
SHA5121f5c3a2ef081bb92f4914fa9eeefc609b1920cebc97c71ba65e0b4a168db3164d41e9a33cb928898a6f35b61c117c74fbdb178e5f43168a9cbb1285695b18974
-
Filesize
563KB
MD58a39ee30a4adf312e0fa0ed1876a7b15
SHA182058787b2903c0f558124600044b12d4fb18035
SHA25666d075dd8611f63f7c761baa7e49de666c0f3760c3357fa558f537cb61c059a8
SHA5126c148ff0825ab6213dda5ffac5df1baa46f771da2404b9528d2bc0713c4057d4285912c877670dd8044f48ada2a45fa088e552b4f56fb1ce167ee34c8b27313a
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770