Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
294s -
max time network
298s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
14/02/2024, 04:28
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 1540 b2e.exe 1704 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1704 cpuminer-sse2.exe 1704 cpuminer-sse2.exe 1704 cpuminer-sse2.exe 1704 cpuminer-sse2.exe 1704 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/2852-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2852 wrote to memory of 1540 2852 batexe.exe 85 PID 2852 wrote to memory of 1540 2852 batexe.exe 85 PID 2852 wrote to memory of 1540 2852 batexe.exe 85 PID 1540 wrote to memory of 3528 1540 b2e.exe 86 PID 1540 wrote to memory of 3528 1540 b2e.exe 86 PID 1540 wrote to memory of 3528 1540 b2e.exe 86 PID 3528 wrote to memory of 1704 3528 cmd.exe 89 PID 3528 wrote to memory of 1704 3528 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\6C75.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\6C75.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\6C75.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6FA2.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1704
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15.9MB
MD54d2ae14b34d18f94a70d835af63b89c5
SHA177e17f9f59196eeace5c5f6dab86dfb71db0fbbb
SHA25612c269a1afa4ef6f0deacc972a4ecb7442170962594416d723cbcf7a4eac258b
SHA5127bcaa4b8a7fa4a911716ad5dbacb0fee4dad08dff7bfc323575c04b5640a2660c556630f97d281ac19bce1dfb41e0f36a07c70abfd80b57b4f75f82d4e27c3ba
-
Filesize
5.4MB
MD520849d500adf882d9a36df3ea9fc9f81
SHA1eec879d9e0f3689133b0daf337f731aed78da9a6
SHA256694d25cc4b227106f92ce13d2f713a087d7477676c0ccc88b7adf63bbef0e02b
SHA512a5427289e40cbaa1cee14b1d1a6f3e00d7728d74bf082e25d9c72291576b6fba4b6a2dcaf7f3a1f84e2c68d7328cc985c853f602c7a75fd1bfb1f978af756296
-
Filesize
4.5MB
MD515fe3b622166db04c27b3fcb5ceffb24
SHA1a794100da106418811d553ba4bf0827f5db2a1ad
SHA2565607b3451e0f482583e6ecab18a8220ca3adda2ae9cf33d4de26b2ad52702343
SHA512a1568593ceba6c60da1fda21ae76e2c154db826f85163663a2aa02cd70ffd4dc1577060fe320bf0cf07bdf83945cd52a57f417fed60a730b7c2a38569404f2c4
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
912KB
MD567a29cd13b7c9eb6c22abb8d91bdb3b0
SHA1b656bd88610c6e556a3227a1ec05e4b930b2bae1
SHA256468c9e4f0b058677f9a0c82fc1274be69c9f8933c0a65a429cced4f814f45416
SHA5123f8621e3be925e6b4abf660fb436c335f27c9d092814e9777d08173f667f8eb5d3ffc3d7ae986b3cdcb447a85b56da832a13eeb39c955936d3c929af1bba6ebe
-
Filesize
730KB
MD558ebd647f793c6629bd09d291b1abe26
SHA140e6c352aff4124899b897a43424c46bfdfbff61
SHA25628ab2a7166ffc03a55938b99e1bc98520678e152a2a252cebac800618cd3181e
SHA5123dc4efdb43d60d02fc59d1fe6d378be54d152084ee05a133a6c41961f9d0072a3a02be4fb1bed51f9c8d9d82baabe0b01a501994af5b5e783130aff2541f75e6
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
821KB
MD5fa95663537adc67656f589628bb44220
SHA17fab95818358534ebcab6c406b9eaa98cfe7c60d
SHA256e0c50f17cd215ccb55cfabc4f96debac01f19861cf2adaeb99facee46726af13
SHA512b865ff0e0dcd54425ada60735e0c612967d5ac4a808aa4afe0ef9f960f4dcf0527de9613473f2918cb7de85f4616c5fb84bd75018fdcc9d109aa853cad22b2ba
-
Filesize
1.1MB
MD57c0c35a156ba18c325c70b743e63b260
SHA188748d0b256fc826d9222ea603fa57e130195afa
SHA2567939152f1aaa45472ee7cbeecf76dd5d4e57403364fd0719fa8d05aaf3ebd9b5
SHA51245e8d669aa6442480331cc130450b2ed72f11ebacb90f2f752069877cdba62342f1ed248b69fdaaffefe19c4a7f56f566155302fc685887f2be12c0410e98ca5
-
Filesize
929KB
MD5ecf4440ced14ececdc42df6cf2482e9c
SHA184b5c90f75c75399fb2ff53267eed0ab2b9f2393
SHA256c62f5a8c222fe2477fe9b7b4a825351e0af34f9efffba391b87440f4d43be679
SHA5123d9966787a39b0707e0e8bfee67dcffc2a986eccbe4b5102cf71b71d5880ebfb7f34c1e2277a209ba47dfc66183aa482117b94cb6ae21f1fab78e862aa6de26b
-
Filesize
1.1MB
MD5b98bf2006609509f5c9e825b053728c1
SHA19250c1c700d727517c49ee47f1b1ef11b8847f4e
SHA256cad106482fa5f59fa7c9d4f1601553331be305b07ed83377bf9b97a6e22f1f02
SHA512f52b347902b9733a80034487a4705ec57b44addef514d5f5e96387b22e031b3283bef1a9b6bde00b9ccb40c189983aad6f5b78929d30a4448ac5052d4f6bb022
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770