Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
293s -
max time network
302s -
platform
windows10-1703_x64 -
resource
win10-20231215-ja -
resource tags
arch:x64arch:x86image:win10-20231215-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
12/02/2024, 08:49
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231222-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4492 b2e.exe 4904 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4904 cpuminer-sse2.exe 4904 cpuminer-sse2.exe 4904 cpuminer-sse2.exe 4904 cpuminer-sse2.exe 4904 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4084-4-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4084 wrote to memory of 4492 4084 batexe.exe 73 PID 4084 wrote to memory of 4492 4084 batexe.exe 73 PID 4084 wrote to memory of 4492 4084 batexe.exe 73 PID 4492 wrote to memory of 3644 4492 b2e.exe 74 PID 4492 wrote to memory of 3644 4492 b2e.exe 74 PID 4492 wrote to memory of 3644 4492 b2e.exe 74 PID 3644 wrote to memory of 4904 3644 cmd.exe 77 PID 3644 wrote to memory of 4904 3644 cmd.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\BA95.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\BA95.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\BA95.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BFD5.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4904
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5534edc2ccad073d1734cea82f2f4ff54
SHA1b6eb71dabcc59464929e3688b6f4c3349b0943d0
SHA2567c9f5d4a007c796462e721fadd6e2bd13d66c0dab21531bb49a4a8457818b7b1
SHA512de93547dd2c2496d4d7d663c1ab6540890671e9c232f9fb7efea0df0bcbc013215798217d9a541aceb15a4e557a9c0c5e99fc25c34e66d77db1c95e1d8225ab6
-
Filesize
2.0MB
MD5fdeff16ca964a2e9a2203979adac8aef
SHA163fd594b64440d14c8bbb531f900073ca93d6f24
SHA256ec3b54b18cd56dc7a31df8ba96620e24f6ba98f305481e310b7f159ce544f7c7
SHA512e892709e7c3ff823345cdbde2b4be9f51b3769456baed5ab824bda5ae849dbcff8c2a5750c7db79baa9636eda2542df5df5421b6e8629c827fa4db1abc188e92
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.4MB
MD52af1ce05b5a790b134eefd1efd88dab7
SHA1b078e6f3cf7ee356e0d9b671c6d33f3a6e777524
SHA256ce4cb4f4e60a89cbf413622a7f96f879ee15256d4ed5872ccbc3f2b366369fe3
SHA512bc08666b4c96fb98b1e1a9db0ec10c5bbcddb82efc4829d65057f765a37a24f6e28076300dcc3f07c0b547b563593232f90d959607ee6a5faca26b27364cf695
-
Filesize
1.2MB
MD528d83d3631dc77dc9f20099b99934707
SHA1634abea3fc76b15dca1fa9de8afb772023f59355
SHA256152a9800e5eb0e764c7d606eb507b14ba4b52e5e56497a9ac82ac2125092eb1b
SHA512234cf33552c53ca99e71e0d3cf562ebfb8a3c1796aca197afd936762f5a47f7061fd2b4e291ceb5ed56925dc06483ac489155e28114dbc85b671127e2f148bd6
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
832KB
MD5d33f0e6bb5e8d2b9e111a90544790dc8
SHA1df4e81d22638d511e761744e886c33bc12096c48
SHA25640729edf62213c039a1818c9adb9478aa0284bb26dd071bd1ac4de1da2470048
SHA512ce4ebeae054117d4de8b3fe2403d95a6d819483269f851618958e864887e9b2f42fc9c893e1aa207dfa2d94900c8f4214a67796ddeb2a80ce655d69ec290d629
-
Filesize
1.1MB
MD503ae1346c99a66fcbd06c3a56898820a
SHA1cf57878eb1c3523d08468ba3e9e65a063c24d902
SHA256bdb28d28d4f6093c2bbf0cbdf1b2edaf325ad34c214cde4123437896488dc445
SHA512b1e6f93db804c65f996ae29123a601ee95830391d9f5b73608962cbcd25a9082f1b1f9a6e732e5f84bfa3bd7207101edf9d076445370150ae58c9dcace634260
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770
-
Filesize
832KB
MD59b527cc7775e3fefc75ebd6cf497b81b
SHA17405b4528854589bc404f55c0e591d2e534d8d63
SHA256eb4270d5203fe07ee63a7161093d69577ada5ad4ca659a6181d63953a69bca72
SHA5126471f61ebc78e6ab30cce7cb444c582a8a24cbcbff1a8cc3d22d20d299d53c6377127e76bcc2a1e2c9108cd65d6fb89d42ddf89b04140c8e225f5115984a4b85
-
Filesize
704KB
MD5538d0a2af59454daf4418e27268ec013
SHA1dd5e047f232d3827ba6f9c1da4f17928557dd6e6
SHA256ef618dca52a4f65f6fd72fd721744185c44cfeff6ff90928f56481969eab4126
SHA5121c958d315013726aa6ebc24552fb4d712a30ad6e5621db0f9037924ccb8cdf45063a01ed6da3aa50485ad084248a9c67c3513aabecf9d324eacaaa2b75f0a7c2
-
Filesize
704KB
MD5ceb1ee23d68e973e400b41e7324c71b6
SHA10ad5540864cf9bcbf52870ba72566625ca54e67a
SHA25666f2f5bd30986e28a4c43ed44264cc56f63bd7a3ecd6aeb5845ac7bcd724aeee
SHA51251ce4a101517339cb1f5c23fc953dde73f871cec2bde8ea5c9fad9376366d7b8aadaa8668ef2f7bf9d873e8817345e4e337a7a94c42c3ddf6a168377af060e9c
-
Filesize
640KB
MD51b7339cbcb5b756c15c05fe0cc6443f3
SHA1abdba01c4526a9bbbb7fd3853e09bce3cbb5287d
SHA2565fcf0fb116f77206758e3a669ec4fa52648fae431a5c2aa2d7ee69944142e019
SHA5127661b5e8413e74432a00089b1556b2f49e268b6b5c8cefd839cbe19074bffd138c18e8078627420f4082f579a9e3f8d02b199507ae36380b5375162a4d4ba439