Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
294s -
max time network
294s -
platform
windows10-1703_x64 -
resource
win10-20231215-ja -
resource tags
arch:x64arch:x86image:win10-20231215-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
14/02/2024, 15:19
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1480 b2e.exe 2924 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2924 cpuminer-sse2.exe 2924 cpuminer-sse2.exe 2924 cpuminer-sse2.exe 2924 cpuminer-sse2.exe 2924 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/2356-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2356 wrote to memory of 1480 2356 batexe.exe 74 PID 2356 wrote to memory of 1480 2356 batexe.exe 74 PID 2356 wrote to memory of 1480 2356 batexe.exe 74 PID 1480 wrote to memory of 2996 1480 b2e.exe 75 PID 1480 wrote to memory of 2996 1480 b2e.exe 75 PID 1480 wrote to memory of 2996 1480 b2e.exe 75 PID 2996 wrote to memory of 2924 2996 cmd.exe 78 PID 2996 wrote to memory of 2924 2996 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\A4EB.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\A4EB.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\A4EB.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A75C.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2924
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.6MB
MD51297be7f05d2e6986af16af9b6be7d71
SHA16eb521baa853e86e9e4c098354c77764f4c26960
SHA256c14268fd824d23f6333f17beb0e4094002861686b6f8476e8fa220e0b920d626
SHA512b44304eacd470c2a14f3cde5371bdc0067e357675784910a720fbc85f2a242166455cf5d9edf80d4c79b6b7c80e24f8a8e98514b8b4c68a29d4e0d470d31914e
-
Filesize
4.7MB
MD5b36bb34713dc0bf76fd70d38386c8f02
SHA17ff12997dddf110d7941277e897934be8f914934
SHA256b12990418f5b1daad26a470022e01eef82a37fce7c8b11d32f702cff7664336a
SHA512303f1771a58e4cb003ae62d08a8880eecd5765921cca08a990458c83f7bb6b4fceef232bdbbe271dd9c8569137756f141d81549ae3cda1e05a15d900363b66b4
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
398KB
MD5b5941bc145eb800cbf93a7b101518290
SHA18089b0e4938a8f47f30c7c3b629647bfc315f9f7
SHA2568188457b8a2be568f3a0042e4456a301e9e3d1967734b9ff29b4ec0f0d0bcf76
SHA5121a2705e31353d0799d06361c5f9101dffb47b704048097ee96c71c6ffcb8d56073f1628e64b9a44729d130794c9f2e1fe8064ad5e9004479bf44d7e77ae7af70
-
Filesize
328KB
MD51aae7f33a85b4628da0322ec2553bd19
SHA1b3a15bf60e87d944c65e957afbd60d938323d13b
SHA256fffc9f17798adc508b1c8a4aa4602bd2d4a2f7fd8c804e59db1acab614f4f9b4
SHA51295339021acbd0d168c2d6438424adca38934a6ccb8c567cbf8bf8fb9a1ace09017cd30c7549a2a638c62a1789f66aa1176bd291ab5161b5a08daed4134506800
-
Filesize
294KB
MD593e23d479582f36bfea533e550d8d012
SHA17a75988218dab5ba148b2f2e51f401b7c9ce5f2f
SHA25675f3a2557dfcdd58c325e54281a726a90f058c5aeb8d002b1088b9400b4122b3
SHA51285f6b0f5be44fea668e334a544a25b228d22a9086e00e7f8dbd04a4f6f98b14483570ca50c1a186edb8a660137948868e21dff0774191d7fa3767381b2d8373a
-
Filesize
172KB
MD5fb988bd8c3d2f576861751c827b337db
SHA1ff7734e5f25f845abe780220998078698d4b4e78
SHA256916c57fdc3b0affc23033aabc194871a572e9d5e94c193d4251fec4ca6d48465
SHA51272e5c9bedf46d3027852da300eeeea1c8e0f467aecdd6ac44f99bb530f79b0b91b4e1d8535f21f7c307f5faeb2f61c735455b0911395c20506f04eeeebe9566a
-
Filesize
277KB
MD573920b39eebe7f967aab4c1f9fb25f3e
SHA10d96da63995978a0d781f1a617bc0bea9923ac76
SHA25643712ac76e8498da6419ce30296f7d0db4f2603c513255ea95ec2bc1382a4c64
SHA5129bf54720c0ec411b753c1365509ff13993d225c8636ac33fb3b251ec5d76774d561da905c7215efc18f638ac625c394ef7b59e28aaaac71cb788b3d1efb01175
-
Filesize
169KB
MD5279aee74bdd1d9fa343a63dc078f677a
SHA16d68039b1049bd5076109c360116d97da0d9ac15
SHA256c5eced4b9b238a76f4370f99f5117d0689070882c1f904e15a2aa4f0fa6fdda7
SHA512ffc122452be35c3882af3f72f5d245b32bca1d5ad516b5c409b6b240eed113d087dd51192cfba34a55798f5f1fef1413222d7c02032379de974e1671aaf2d7cb
-
Filesize
230KB
MD549fc6ae02521e17145cf3739fe8de849
SHA12eb6a842106a058a879b7489d8830618fa06080e
SHA25637791d1f74e6cc1519d8c627aca2b579c8ddfb2ab9b20a1f6b43e4d431bcecc2
SHA512efc263cdec412b4d12281abba353aea595e0efbeff9c484c3ee75bf0ce5b56863a02f9265d02369d53dd6e89136f69dec35800246c56941ac2e2118f5530b7ec
-
Filesize
183KB
MD5d38ab1f5504a9ebcb44edc0780935dc5
SHA13e235ad32a5d0986b761b8d3d0e3511e4a116240
SHA2561f644285d3a9cc19cccfad18b8170e0d5515d04a96024b9284529e1aee80667f
SHA51215c66427795fb27611f79a2ac5793337e4c28a15ce5e8ce52786f407e604cf2781ab11e5da5b67f0a3400e876c83c78a1aa8422ecfb038ef28a22738b91dbbe2
-
Filesize
59KB
MD536297ac53c43a288ed322fc0fef00285
SHA13f3ac35e0b67c62952b7c9a7e7ed8c46fc948b3e
SHA2563fb37d542eaf9aa5dc1fbe3ab6a592185da47ddab25ba9438f5efe73b6e6a479
SHA51241c745127786239ee1cfb61a61415951148fa30ac98fd454322632a10861a11ecd70d4fcd811d93b3d65d3e7a743e6def2550c925d2719b39d1d0ca1b5c71488
-
Filesize
68KB
MD5d3fca6ed5c2eaa4749e81449bb0d209d
SHA1f82e3fd3b0a545667125b2570e642330552f3914
SHA256ce7e72939e1384888b80300be9daed9b43ddde7c70a58f5bd725d573ac732454
SHA51250c154cd1d85fa489e7107da20b314baa62c6cdfaaa3529e3b1fa34a9d7503080f0e0ef717540c02fcf2ec5e2ddd6e5d3120508187ff0aff4e06e45256998906
-
Filesize
204KB
MD50300af542262ca71709a2606d8659300
SHA146f2b14d4ed5a5fe0094b00fb1f6ea03586377ff
SHA25651546cf5f8a018ac14032f054784a087722570c850c30876789f918df5967997
SHA512cb6222db94843bf65921dade8a17e80980b191c2d61b18fd07a838f2415dd07a6a265435c8aa3889dfc30e670da4e49a5ddcacd76debcc004deba0c69d5f1ec5