Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
295s -
max time network
307s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
12/02/2024, 11:45
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 4752 b2e.exe 1848 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1848 cpuminer-sse2.exe 1848 cpuminer-sse2.exe 1848 cpuminer-sse2.exe 1848 cpuminer-sse2.exe 1848 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/460-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 460 wrote to memory of 4752 460 batexe.exe 85 PID 460 wrote to memory of 4752 460 batexe.exe 85 PID 460 wrote to memory of 4752 460 batexe.exe 85 PID 4752 wrote to memory of 1940 4752 b2e.exe 86 PID 4752 wrote to memory of 1940 4752 b2e.exe 86 PID 4752 wrote to memory of 1940 4752 b2e.exe 86 PID 1940 wrote to memory of 1848 1940 cmd.exe 89 PID 1940 wrote to memory of 1848 1940 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Users\Admin\AppData\Local\Temp\93DE.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\93DE.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\93DE.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ACE5.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1848
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.9MB
MD5a6e3ae62fae2d6ff17dff6a851eb0fb5
SHA1da5a629a491c9b4b9c1a669dae4ff3870ae36ee5
SHA256e88b651d91b13cca4567eb15416a85c20b7283a3c6eb4266848f716b643a25ed
SHA512bf8c33408bee809a15d0d1d36318464aa050e224a2210767a227a8b13acb9a580be7db82657b079151fc68df44537fe34a276ab14ee9b10f151a6089b08cccd3
-
Filesize
80KB
MD5d8e472b915a3989331074702a5ab26cf
SHA1a5fa36072bd5dc3597868df9f7d51f92f7327a53
SHA256db5715a0e2eba1e3452ce736e9afa4cce6e395754a782deb15380388c50e08db
SHA51264ba80595555fb4397f6750759a895e3afe7897fcdbcd0a6610dd06064e4b5cbf6824d311fc31b4f1ff1d9e2f342b2340b458377a8da7a927d8d2b0c358f614e
-
Filesize
48KB
MD554b38affb6fa610533b5543d8a2fd9e7
SHA136dd66a806199872c817ae309e4e488bd866874d
SHA256dc91fa82f3ebb1485013d9e7eaafefa15a08634acc1d64e5a0e8d6a1d1645cfd
SHA51254b8a33c2b99e0cbb541e7c13c90257aaec7998b1c987f5ffc43b9392c7848eb8bf86df3c1172c335fcdd15cd82cd3dfa95de362d25c4bc1a4db5742579d0061
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.9MB
MD5b96543137902a5161655fcd8577121fe
SHA1c0582c3ed24a8bcf80feecb19034509d7553beaa
SHA25698cd87abc847b2c498f0024f24b9f094520fc86315bcdcbb375a3fed286cfe05
SHA512a6ce87449331b6e0b23b7a5ba7df071f3a586b7fba44c13747b5ae8657224127cf4052d23e64ccda70922102ab6b7cef5ec21761d15b7fde5e933f012a6b3279
-
Filesize
1.4MB
MD52ef40d5c3b964c66392be6a3db51bf84
SHA1391a644aa11504129db4b42007b054f2c3bf5414
SHA2560ef835e2576ba8fbfcd733a66284579607cc8dafdc2b26fe3c0091dc66d8e707
SHA5120b568c8b5ef88af49c00801cd5eaf3e7262367d2a3356f1a685d36e3c1dff63babb5dd049d5a1e7fbe214cab35e6f271d0a105e073a1fb2c281bb5c0279b7107
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.5MB
MD598986adef5490eaca4127523b39ac01a
SHA1c95bd8313fc6b2fda2383e68c0293575d6ef26df
SHA2566c44353331225ac526db24c9ff8d41f8c2ffa89563780eb2ab1c0cf004f60881
SHA512f4762e9e841bfa9e3bd937bfa891bfa5cccaf8dd7192ffe8c17efd1e8859a1b43af5c952c724eb08559922e38c7b77fb0bc1b4266c932e220a7ea2f7eccc440d
-
Filesize
1.6MB
MD587d5c2ec178a15fa87e09e40813531b1
SHA1cb83db4eb0ecc6dc9d1cae452adb05e344481f7b
SHA25657a5cc9ee7fd0a5508b91b568bb0e85e7de2aae62355f97ec2d23d76d98ae4f0
SHA512dce639330dab77d115d393448206a58b1a55e4ea546463c5d4949ed64d8b7efc9a9f7607ce93b9ab1a8733f48ec41b32774c236abeb54769c9e58521a9cbf521
-
Filesize
1.3MB
MD5416d62de04683867361c29546187caaa
SHA14802eade97ce15eb4991fae1fa90eaad94d4806d
SHA2561fcf4c467549ab44072b611ed6ef951ed9edcd294cc7e5157fef2b474f4b1802
SHA512aa5b5143be49c2a72d893d59088f18c5ff5e5212148c334312a43655947f14f54b46f90856eb4329e4320f337817091519f9bcce50be67c77c5bc17af58e7f0a
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770