Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
296s -
max time network
295s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231222-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
12/02/2024, 14:13
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231222-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation b2e.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation batexe.exe -
Executes dropped EXE 2 IoCs
pid Process 4920 b2e.exe 4488 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4488 cpuminer-sse2.exe 4488 cpuminer-sse2.exe 4488 cpuminer-sse2.exe 4488 cpuminer-sse2.exe 4488 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/3964-7-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3964 wrote to memory of 4920 3964 batexe.exe 84 PID 3964 wrote to memory of 4920 3964 batexe.exe 84 PID 3964 wrote to memory of 4920 3964 batexe.exe 84 PID 4920 wrote to memory of 2260 4920 b2e.exe 85 PID 4920 wrote to memory of 2260 4920 b2e.exe 85 PID 4920 wrote to memory of 2260 4920 b2e.exe 85 PID 2260 wrote to memory of 4488 2260 cmd.exe 88 PID 2260 wrote to memory of 4488 2260 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\955A.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\955A.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\955A.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9933.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4488
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38.9MB
MD53e48f796f0087480e6f2b5c7596b531e
SHA1605f02cfce8940068beeac3573d96aacae4ece99
SHA2564fc5af5619109a8c2b6b12ce6766804acedd8e68d52c290c45bec78e530d7c82
SHA51236ba39b840e7efca132b6cc6dc283a6a5f99c819440d3bf82557bf567c92c1549d092d914da4fb520b11d8c296d3b78e08e8fe9f4f52bf02152c1fd9f600caa6
-
Filesize
8.1MB
MD50074ed732dd43fb06aacde6b570db0f2
SHA154ba96d0307d98c8f2ebdd1dc6dcc82060cc89ec
SHA256527d16c30d1cfd8d9292982d67be8cfdf8f4421bd0d5f0ac2b82668648d91a67
SHA5125caa64cd68509e69356a987b996f06ca3228ced3e946c048a88aff2270c826ccb88b153a96a0c1b323e3facda5df387274435a259312ab2ae9a96152ad873630
-
Filesize
20.8MB
MD53656cdd24fe8d858dbea6ad35ed1aa4d
SHA138e617f43eaa351fc3d6b6d9c5e2de64cf1c349c
SHA256aaf591fe3cfb8a28f823823aa231110ed4cfe1148ff61bcc22b7bf1e447e1913
SHA5126b7b83702fb2d20f29e67af653b988cb2d6c1246858ede6870c4ed99f8f623405760f419f336bd19d325286003a630dd5f87b954e2080ad68e485f899e9df21d
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.3MB
MD54c04147c386ba8792ac6a03069572a8a
SHA1dda67789fc1d0f2469ca95f01a5c81034853ca6a
SHA256c7739a1e940a282703d06eccda7110426d306f390e97fdbbd9df18472fd132cd
SHA512a8b5a0b878a9a7d30cb38feff814e1f4dce24d000158edc10a43ee9a89920bedf7adc92eb7e3913098b6aab7fbd0531f56fc09f508b5c2769992a94e55d153db
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
832KB
MD5d33f0e6bb5e8d2b9e111a90544790dc8
SHA1df4e81d22638d511e761744e886c33bc12096c48
SHA25640729edf62213c039a1818c9adb9478aa0284bb26dd071bd1ac4de1da2470048
SHA512ce4ebeae054117d4de8b3fe2403d95a6d819483269f851618958e864887e9b2f42fc9c893e1aa207dfa2d94900c8f4214a67796ddeb2a80ce655d69ec290d629
-
Filesize
11.3MB
MD59446d5d6f8361a84aa4877decdac134f
SHA10f04429b2f58815c854cf7f18c5d599e28d716d6
SHA25666b0aabdaf9a86462cb6d44fd85157359ec0e27d95335d5fa9fcbdddcdc379a8
SHA5126931c57b88821b0dd5b92be842d38a1bdf7ba15e1659ecc00ed54a74b9623c4087c26c6d2795da96ccbc6b6edf0307833c33d4e8d7a46e0f17f2aeda8382e182
-
Filesize
12.8MB
MD50705f8f428132532187fa72948f5a803
SHA10a72c0278b0604b16ba9446b50ea149346a6d736
SHA2565ff8d87005a5202c5d8ec5ce1841a7a8b75add5dcab3a1a069bc2bfbb8e59e80
SHA512eb79a2c1ea2d4aa96f87ca3b7cab6c819711b2eb8f52770ff0ceb39b499639832c5bd813aab0047fad660fd6004d6ce779a6c2000a7bc4af913f314353715a27
-
Filesize
832KB
MD52bfa2b9803bf342837d2cfe9b2b57f64
SHA1e89eec3559c4904ce523943fed97f3fa2534ab39
SHA25638710a4ce8976e3e452fe43563f28f9a8259165fd68ca94f5d64f5f4a299b6ab
SHA512d099f07ca1cb598bdd6f563d917fe3ddcf3f6f37b589f68da987426e416492acf3dbfb2e18387d9afb168308d55c9acfb568c3d31735ab307fc070ff4da93793
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770