Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
294s -
max time network
294s -
platform
windows10-1703_x64 -
resource
win10-20231215-ja -
resource tags
arch:x64arch:x86image:win10-20231215-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
14/02/2024, 11:42
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4416 b2e.exe 3912 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3912 cpuminer-sse2.exe 3912 cpuminer-sse2.exe 3912 cpuminer-sse2.exe 3912 cpuminer-sse2.exe 3912 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/2692-4-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2692 wrote to memory of 4416 2692 batexe.exe 74 PID 2692 wrote to memory of 4416 2692 batexe.exe 74 PID 2692 wrote to memory of 4416 2692 batexe.exe 74 PID 4416 wrote to memory of 3784 4416 b2e.exe 75 PID 4416 wrote to memory of 3784 4416 b2e.exe 75 PID 4416 wrote to memory of 3784 4416 b2e.exe 75 PID 3784 wrote to memory of 3912 3784 cmd.exe 78 PID 3784 wrote to memory of 3912 3784 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\9C7E.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\9C7E.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\9C7E.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9E63.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3912
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.7MB
MD56c790d2e216f44d88e8d7b043a223e2e
SHA171aa5181bb3af539e0f2afca6f588f3a5850528b
SHA2569844139e8521bffd535d550c79c2f8fa26d97d5b2fdaeb0a1099d9a268d5dce7
SHA512420990801774a5972218b3bb71b35f8253d4942df5213390a456f5536fbcf6c624d9ffed8fa759d310277176215a47385510d6d476135b8d4e137ca7a75c3719
-
Filesize
8.3MB
MD51905c6779b2bb6d8da53f81c4d2a601e
SHA1817ab858ae7bcc70112e4ea3089b24e668c8b928
SHA256580151b284a9d00086c1db7e15a4bd376b1bb78cd7b3169a18aab37d2368de68
SHA512c511f032a3dd0c63c8cc223087edd6d0192206e4bdaf85acb0a135383ca96c5c6fa81528cebd62b815904b80edb58589c8b4dfca00d5bf1b2197ef7679f3dace
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.3MB
MD54c04147c386ba8792ac6a03069572a8a
SHA1dda67789fc1d0f2469ca95f01a5c81034853ca6a
SHA256c7739a1e940a282703d06eccda7110426d306f390e97fdbbd9df18472fd132cd
SHA512a8b5a0b878a9a7d30cb38feff814e1f4dce24d000158edc10a43ee9a89920bedf7adc92eb7e3913098b6aab7fbd0531f56fc09f508b5c2769992a94e55d153db
-
Filesize
2.1MB
MD5dc05e579bc637512d5fb931ab6af6ee6
SHA155ccc8787f0f379135fd0e16dbac97db4e304f22
SHA2569452fb0034b4e6ec5c33fff5d2d5ceb75e94904bf4d3a1cc4a88b442c705d4ba
SHA51289a2e00e5306a575dbb8188c2c0b0acb9ace5dbd0edbece5568684ba4e0845c122020c273ae6f20771710ff6003946f4f860f8e2e325002fb5feebda58e44c7c
-
Filesize
507KB
MD544add6b181d0cb4f8388271d76b2d7c8
SHA1dd6e9424e5b65d922a678655ac739da59d5e268f
SHA2564728f0ffdbd881700d429664b4243fb8f924eff0d51d649831b787b846cb151f
SHA5121f8ff0fe2e816e554a79c28d8ba6d6af0df9ed7de3c956e6697b1a02475a265e19d4c13a4cf94f1b6ab3ee2ae554507f660fc94fdfa8d09af4053aef3e47f5e8
-
Filesize
1024KB
MD561f1013547dc4ad24f8c5338c41931c3
SHA14a9f72fe7e71046ecd3d5af6443f195a6051430b
SHA2562a65749eaa95c5c90be12d11587a82432933aabd60e8854868bc7168a36150ee
SHA5126604219c7e5d583e8cc6a1f407e9964ab39791026857d17c9de25d3a4a8bb0272d491c6c019643eeeee8a2bd3451f3e0b75298e043777d44b8f3a161582c9b40
-
Filesize
576KB
MD52caab2ad7ccd18421c96ea2ef5b9e602
SHA1a629673c12e88ef88f30cbe8da12d3afb9a7d42c
SHA256c16fbf658c970a716b976abe7c5d9f1b1a42dacd55a43b16fec0ecc6b84f0552
SHA512aa9692584947d7fdbe843e877430ade40c5b4c6e15887005a292065d6f8e1303abc8dfc2bf50c01fb032bdfeca5bb2aa9312ba44d7ba4e2d3529d07bfd008969
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
448KB
MD58185100383d0fe360c9198e5a883b08d
SHA1ab398c469573f8e84d3cfcef01287a0604d6ab5f
SHA25605ef7288b0d559bf67c3d69c201da9bdcaed0b49ecc538640f7b96c5b82eb538
SHA51224930ef0caa1f2db2ed60f7dfdb832a172cf7747b0a336b051f73c0087a5f2fabff721487cb49cf5a3bc2be5426554b0a3a0e51541b6a4ca735646af24f1404a
-
Filesize
384KB
MD54cb3a8d3af58faf78da4dd33a03029db
SHA15356e4fb04a7047f6fc82a4e071e4803f97a0f3d
SHA25686df790940bd442466ea58a434a31aaaadd1d23a9e9bf5e6fe625ff49049d620
SHA512244237f4a13a7666e9f9592451dbb8bb18ca1f828d66f97e2890fa8f6be690d8890848102a8be253542c9f4b154d9f0e1aeeee5a867c866b78b64f9949f48c89
-
Filesize
512KB
MD55fd46a66845c804b88dcd97ffcd66652
SHA19556ce5607bdd245c8e4d6a24b8217def653f57b
SHA256b7fd85a2268a4d62fa15fde3d9e51d6fa3bc865cb4d8e5fdca309be7b027f193
SHA5120896697d588401a6d29c30e77574ece4f0ba699b082b1bad93964748313a5903eb4994ec81c61bfcbd75f2be3f5200dadda3fd1454381cc5874a9c8952ebeedc