Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
293s -
max time network
296s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
14/02/2024, 15:03
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 4320 b2e.exe 3956 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3956 cpuminer-sse2.exe 3956 cpuminer-sse2.exe 3956 cpuminer-sse2.exe 3956 cpuminer-sse2.exe 3956 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/2428-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2428 wrote to memory of 4320 2428 batexe.exe 84 PID 2428 wrote to memory of 4320 2428 batexe.exe 84 PID 2428 wrote to memory of 4320 2428 batexe.exe 84 PID 4320 wrote to memory of 2104 4320 b2e.exe 85 PID 4320 wrote to memory of 2104 4320 b2e.exe 85 PID 4320 wrote to memory of 2104 4320 b2e.exe 85 PID 2104 wrote to memory of 3956 2104 cmd.exe 88 PID 2104 wrote to memory of 3956 2104 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\6736.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\6736.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\6736.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6A62.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3956
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.9MB
MD57c9127736b7fac206117e5d6f0a1d97e
SHA134434a5b33d6b165c73d150991fe9c32bb5478e3
SHA2569c8a5d5b94e15b75c6218c7ecd1d1b6d0f03011a2a735dbfd9f877c275c4b4f1
SHA5120d78a5d7081cfb90eb6223845e04e552289e34155bfd53d2bfe4b2b2754bce03afdb0b54080d2951480aeaa649b13145b5700968c767a7ee63a6790edbe7432f
-
Filesize
2.9MB
MD5dffc7b824b25d19791d46979fb5de0dc
SHA1f08484f3b4049cbeeeac397b79227c17878528e4
SHA25680f6f670f0d4e41940dfd405dbc6919c482c082b0d1e4b94b54c53369f26f9eb
SHA51244d1c0358724bbcedf630e323b48497ce03fdec6cbcbc0db51f6d341144ea4f9d19741877fda602762f5d8f73639d4a30146342b8560fec68d1c72269703be42
-
Filesize
2.8MB
MD5767565c366e8a8f0bf50d2a4de356916
SHA1616c75704aa9e640f9054a350a3da5bc5e21b5ea
SHA25632348265114d9a51095f78d335e67cb0dccd6e1a900fc1100920a0f8a6c61406
SHA5123bff7f9a6c0ef078ec8d7b4836c898bd9dd5309f16b7c765aa612c0d9b8e62325d1789f9008493635f637b9975982a1b4dada80ee408de8db8ae06331c303aff
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
677KB
MD5c977313c8766d3c2241b79ffc19765bb
SHA1103953266e3893a355c6313c5b42e1c49cc7f665
SHA256ab4c873cd02d1a9c4b67a3bd635a03a4ce65f5c09fb4f30e92ba1f8a6a11cab2
SHA51284fa6af5a3c82c14a1c5c88f727f7a14798f97c85fb914410f207408fa885e20e8092a3313b721b42ceec4d724aae43d73d8bcb749741c7b8b5afe27342dbb64
-
Filesize
1.3MB
MD5042412b1df6763bbf47e66c5174869d8
SHA1f6c071aa0e4bb3b0ed99e42a6d46e7a0db9f1502
SHA256970a073ca1fef83ad473b06211c89dec3a4d17d1514b765fb262d3b0d0a01cfc
SHA512ea7cce20ec93eb05dc3d517dea17641c6c62d638438e533a7854d93a4bdfb4f34970e45c251ddaab406599f7c87b4c67d66dc6f61881f47e2f4fc6f9385ff0ac
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
800KB
MD5ad7e8a0b35e0b8623b1de2ffdff29088
SHA13d040300b7aa472c898aa26eda5ddcf0ecd1fa6d
SHA256ea9649c1826022ca18b5aea4300b84d907530600e650b5a1b0ab4cd33d63efa4
SHA5128bc142227beaaa13a71677e0f1bb80012032fa6f696b975e09a96671a1d17feb48b6b8a46c2733110a9c17ab793b6680c7c3c9d3b410656f0e8729d283804171
-
Filesize
760KB
MD5ba92721a0d985c68c9c2f9e9c67d4f6b
SHA1df8342ce7441e12cec27dd7c67672ca90f4b7e03
SHA2569bd5c0273569456521853a0d04d451c7b9c7149d12656fc68f893456496bb175
SHA512566ce78f4dceceff9b3fde8fd5039e084d8cc6c3c10ab7bfc50b387cc18953e540baebdb9913f486538d5a3b1c3ffcbaa91249e52d2bf76ce7247af8238006b0
-
Filesize
510KB
MD54ecbf49123f40b68b4f5dc35465d9135
SHA1a96f303baa74c3ac584fdbec549cb67d1d60b789
SHA256b7571d3f5859fe07737e3f2c56aca540cf33740002231a5e144b62bb644affeb
SHA51248b21a4645152d2755f86c13c40116aefdb4f4a1b6f6cc84eedb403e283593d41d3fdb4b1febd60c881c1f1f5577d925ab568e9bc93f1a57bb0c0c853614f5a7
-
Filesize
949KB
MD5b78aacf47fa58c1c3b5585c1c6bbdf5a
SHA1fe7f1a189f6b278b4f22aa0d898cfeed3fe3d6ef
SHA2561706e7919b440842858865ecbaa875fc343c162c7f2a36de112ed4ee27e1d5d4
SHA512dca6ff0cd63d6e328c7299800c9105fc1692dcf76e4ec59500e55bb7c5b01bbf1a7a49d6f5a1c23bfa13ee71072385d6cb5c993a0af3beffff617fa4e74739a4
-
Filesize
896KB
MD54ece07a08273d0d0db84220926c3d32f
SHA1d90712e2e643311a963676e87f6afad0c421d895
SHA256d82c02350e5ca5ebe35d4349a16c3c9986aaecd8be71c05a00b1af09039a4cf3
SHA512fa010b4c3c0e6d38bb281b4541c0e8b124e05d2feaa6dc11cb6e9c1d85145d5885a5cd61c1bca283f2d9f30295b197343311306acc9d5393aef64793067cdcab
-
Filesize
434KB
MD5471e31352694f1f37736519d3503ead1
SHA1b7e29a6934697ed9cf78dcde07d4539fd0e596ac
SHA25642a8c65e5982b319bd48d37ae6b91dda0661ba3cf36ac64044b0efdfb4649549
SHA51286367a500f0dd5216541c98fecc5e5aa39bee05d71614820a85b1bde5d3f4bde4d0b47b02d6dffed8765067528b9da2342ac1b44b41a0dd478b326969a3ec3f5
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770