Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
293s -
max time network
300s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231222-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
14/02/2024, 08:55
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231222-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 2572 b2e.exe 1516 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1516 cpuminer-sse2.exe 1516 cpuminer-sse2.exe 1516 cpuminer-sse2.exe 1516 cpuminer-sse2.exe 1516 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/3508-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3508 wrote to memory of 2572 3508 batexe.exe 85 PID 3508 wrote to memory of 2572 3508 batexe.exe 85 PID 3508 wrote to memory of 2572 3508 batexe.exe 85 PID 2572 wrote to memory of 3428 2572 b2e.exe 86 PID 2572 wrote to memory of 3428 2572 b2e.exe 86 PID 2572 wrote to memory of 3428 2572 b2e.exe 86 PID 3428 wrote to memory of 1516 3428 cmd.exe 89 PID 3428 wrote to memory of 1516 3428 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\B6DC.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\B6DC.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\B6DC.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\B98C.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1516
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.0MB
MD5b33dddc8215f26c71334afe09a9ca676
SHA1e6c3bb2e13ecfd797c38f4c76e3a427a3a2554c9
SHA256baf498655efa5cbdc5345ddef93c2724158bdde3d9c898cbb11b12ee01bb8f0d
SHA5122cb1989aae3ecf3963794a726d75e7f7415e3c55f1ffc1b3392e67fb08812d75f6ec08d67ea7e043dcf5d60bcc74edde93edfe231e86339611b653532c905431
-
Filesize
4.9MB
MD513d20f42bcf8f0af4a1a1f2356bd0a3b
SHA167eeffca22f7fc8a65edde96c8cd9f4fc7751144
SHA256a12aae8d40e4dfe6f8038b6cf9a17095b1e35f5a20ff10f45c0a313672ea426e
SHA5129bd6b202f1cc7eb5bc099063d3af3e57c119ad34f8f3ab3366476939a3737605cfc9111355f5840f779276a966eb1ebdc6139620178aa597eb3663cec837dc9f
-
Filesize
5.2MB
MD513015dfa459e1048325f8581f5d46054
SHA16f6984c9d862d72be22acfca329d88e5544ff4ba
SHA2565ba4ce2c5f0c79c07e41fbeb186521335ae060de242c49ce54feb64ff973a696
SHA51246ef05875d1a71097f80d15a5f4db2e9d1447b5505265eca3c17972fd6974afd15387b045856a26f799fd7d2009ae250a11083fcda1ff864fd2fdc1be5002695
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.0MB
MD511ac8f7fe62cff2fad5646b81daf078d
SHA19c3eefafc439d96d7f5c15da456bd31d765e4884
SHA2561e8ee5f75c99d8b1c5f2d82bfed4bf2d6ba6a6c126879b7fcdbff1bcb8821442
SHA512324780efd9d08132d2a68c78c61edfd27d61d9397d305360ee1a05e5e124f09907f13d26609ef58c93b7e1dc0500611d4a1099e854a7d88f7bcde9203b8084d7
-
Filesize
2.2MB
MD5c0390a12c43fa38eb632894b6ca57cba
SHA14c6f4f4d2afa1d8c434bbe92aafacbd1b1b2a3ce
SHA25626ec8deb3b480400134037b26b2f234e841a668a7cd307db0beb26badd033e96
SHA51235c3ddd7737365c9bc37d9daaead65c4c7245f3399b84f549863bc211b36f2a9c56f3e032ea97df3e68a3a699d378107475315e2d6de1932ebb06dbdaa27f3d0
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
2.0MB
MD5f8c37799c80aa237b1d467617965367c
SHA1e7b09c7c7bb8d87be9b74477a30dc75942ba827c
SHA2563cb850bc88fcc2200928f65e7e8c36fd4d56e5e1cd69493a8c3b7dcb9516d51e
SHA512c4ad061e4ae8aeee3e5a00066bdbe8740b0cce944ed05e6c4dd09443b46b122fbea556a91d6ac017918749323fb10d7cac74741cd94e7ab3e89fa7102c2f61d9
-
Filesize
1.9MB
MD5387f1a27710626e7d0c4967101694af1
SHA196b80ce98253666091e891cead5e66eefa41258d
SHA25644c09c74985cce87705a3e7e1e6de05298d3b797160073bf64051f895fd56331
SHA512594ce512b47dc2a18f3d3b1f3331b57fae0d529ac3beb1a9d96ab63547442e1133e69c49717131a31e93b4c76fcf0b0be10f01d9ee6cd321d11d0010af5508e3
-
Filesize
1.3MB
MD56d71457c7a9ca27bfa73b89e5c68ba58
SHA15ed74d7c93bf9d940f5d8890402ad5eb842d5e06
SHA256adc908fbd8e716c8541e9fa38b17de478e05d4e8d8b063394223e12448be88c2
SHA51229e5cff491c096aac0dee43d00aeb2c9ac1e9f425b67d29759797322c1ba4f4b7b8e6ba9139c348334fc4cbd6c03dfe87b96a0126c299f87fc00957e081503c7
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770