Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
305s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
14/02/2024, 12:29
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 3792 b2e.exe 400 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 400 cpuminer-sse2.exe 400 cpuminer-sse2.exe 400 cpuminer-sse2.exe 400 cpuminer-sse2.exe 400 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/2324-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2324 wrote to memory of 3792 2324 batexe.exe 84 PID 2324 wrote to memory of 3792 2324 batexe.exe 84 PID 2324 wrote to memory of 3792 2324 batexe.exe 84 PID 3792 wrote to memory of 404 3792 b2e.exe 85 PID 3792 wrote to memory of 404 3792 b2e.exe 85 PID 3792 wrote to memory of 404 3792 b2e.exe 85 PID 404 wrote to memory of 400 404 cmd.exe 88 PID 404 wrote to memory of 400 404 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\6C71.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\6C71.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\6C71.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7B94.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:400
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.0MB
MD5a3257694da44a07f6c1c92736fac61ee
SHA1d0023403f90a7644bda4f7a577acbb5ce2a40b1b
SHA256ba6df1a8b82012655594c8bc2b64c5e8d3223aa77084204285aee5a256152933
SHA512ce8d8a1a2156f7085b0028930f7f545a9c7ce8641e87ff3b6e0f8f1793b2a61b3aaf92db67db324de52078259aefe375bf27e2ffce9355e6fd56f48ed02334eb
-
Filesize
2.4MB
MD5cee5647ca03c57fde1e591258fa87131
SHA19584ca13b2a30aeb6985411dd9e3915d7739b222
SHA25632ee98221321e3223187600a122c6a2ef2c3e1da7d2ba5ea908130449f7a89a0
SHA512ac6fe9631c209d464e5e5982c2bd8b5dbd6dcc0339d02a4ba6d203f8102746746ea735b743e86b0808a3c7e6cccae0b32a39bf7a4be84302025100919b4fa3bc
-
Filesize
2.3MB
MD556ba7c90ae39ec8ac373677ab99bd36c
SHA1df9bd695d99f6a13136e31db05a647fbe4abb700
SHA256c9d0efee1d21c99a13ac4e860b3eb2114a3fd0bd82fcb36c1550bcb324aaebae
SHA512d9833d6219a87816ae04288cd4ba10470f48411f12421105520a8109459a24fa102d114483f7e941a3e5d9aeb08875a115c9866b279885b4d61d085789338d41
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
937KB
MD5ff13240c8e2cec8b5762d73a0b2ed5a6
SHA11297a6c647512e800677e1d4229c3d63ef68b3c6
SHA25638e25893aaeda5d0ff9e9f9c0075d5d4faf0959de17a8cbbf0b67c682dbcd682
SHA51218b02778f20bcc4a74ed6657445df62a8530d6e78eaa732c5a3290015904549ca42cc08ef55ed779c41514a5eabc097b83ed5ffb2b751d5d1463b316935cde00
-
Filesize
1.2MB
MD5a7986342faf48c2ee273e3831df796ae
SHA17914fc792dc839acb0e1e1c4841937d04a3bf520
SHA2568d9139c4395a5dfc80a51932299f0bb4acdb34a1b4f83a53c1ac1700c8780ae9
SHA512067abe1cf8817c0731319bd3dd0399388e559e282138b0730da8008ff0327af7acb02a9ca79c0672444e2c4f78c5ada7a058dfdaa2665081518151ed3da0ba37
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.1MB
MD54ee7361c94c023dc10ddd4c3251181a2
SHA1923195b1b06b53aa6a2202c5399e160b00360144
SHA2563a507e232f92de1e9074e80249f1f8efb80b6416b673c5cbfde4002274c09e63
SHA512804029b97d6f1f328bac9f096b1437bffc3b1b5896b2384b45015706fcbeddb17e4cb17ab576942f635b4374604163c28bac0b207ffac647dc5f7e8881dabfbc
-
Filesize
955KB
MD5cbf8d92ab3276c6267d8814a5dc497c2
SHA1f22ddc6a15414953864c7cde3f3b41077a4731f6
SHA25649d3558993617a519dc151ec9e773ee28f8b12b041079112f6cae763930b46c1
SHA512ec7850c8454f7a7d5cf8959f4ceb0635277d7102569e1133931142196704aef38ae98bc4d1ef7fece9aae377bb4bc24037cd11c3c6b2f4cc34f802f0b1d2ee7d
-
Filesize
1.5MB
MD5ae81c4244d128e6e82f4e72ae1825d9f
SHA1d6ed74130e37fa21ac5e245a9d1cdfc53c5cb1db
SHA256751e1a0d6d668b1b134cfb278bee27dff76b8744e51372be95a8dfa2bb425e0b
SHA5124305b9afa08374aaad49cfcceb15e6f6ba0618c0a8311b9414ef424593668dcd4d3a989d685b90b51bfcac7b0403a21c585dd548dcf340c33fa8cc6b82bf91f7
-
Filesize
1.4MB
MD5dd28214ee0fbdd170c3fff8911f5a2da
SHA1a44d1dba0dcff3756b7d70e3006d4e03fc8bbc60
SHA256eaa7a3ec58e587004378c3301907cff8475ef6c9f64e6b7d40fdaac354757723
SHA512b0316ef36dc7b3f0d2ada20947678dec666baa7a47720ade65c34be4b51285b330c7180d7c18e27e688b62de3bb38b193b02c59c2f4d237bcb217de6702b5840
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770