Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
295s -
max time network
301s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
14/02/2024, 15:19
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 2064 b2e.exe 4816 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4816 cpuminer-sse2.exe 4816 cpuminer-sse2.exe 4816 cpuminer-sse2.exe 4816 cpuminer-sse2.exe 4816 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/400-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 400 wrote to memory of 2064 400 batexe.exe 84 PID 400 wrote to memory of 2064 400 batexe.exe 84 PID 400 wrote to memory of 2064 400 batexe.exe 84 PID 2064 wrote to memory of 2340 2064 b2e.exe 85 PID 2064 wrote to memory of 2340 2064 b2e.exe 85 PID 2064 wrote to memory of 2340 2064 b2e.exe 85 PID 2340 wrote to memory of 4816 2340 cmd.exe 88 PID 2340 wrote to memory of 4816 2340 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\8906.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\8906.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\8906.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8E75.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4816
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.0MB
MD5c4262db1c2b5c8e65176ece2dd52fbb1
SHA156dab0f4980b7d1955eea59161f72c06b958038b
SHA2561ef20abf7374dc24e791e1590fa688c31a4b43e31ba7979bda83e3ababf14ec8
SHA512ebfc907cf388dc4ac846d1ee144dbc2d4eec94ac6d38ee5a9834dfe6d8f28b880c357ccf7f64ccea7a4b3c94b229082d1f057645c91b1f0c9079dd161d42f264
-
Filesize
3.4MB
MD54f9c264193fabac129815de83f2ec1d6
SHA1986edaac0c05826e333d4aa2f5182aa723bc16d3
SHA25638eb69038525f3d7a9b52f715b9f69a5047494f7834c3ce7823e23ac59b55518
SHA512c86cb403b75bbc873fa3b700d056c3c535828b4889c28358fe37029d37659b7050c685d97ed81312672dddb454063edebd09e188f2aeb5558a10845995fb08d6
-
Filesize
3.3MB
MD5b75c68517092f9318a2d04899a416667
SHA16e5ea814a326407c5e885a80132b77e1fd2ceed6
SHA256a8e630b51cde0a008b0701bcac9c243af55cc2a517ee451a0a5fae88c5e7ec53
SHA5127fb479710cd10bd10a728e637e8c629336933002143c7a1f56f1f39ea153b43a1f8b5a02c1ceb5b750b0a66498d7a43268294ba322821830038d50737fce31a2
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.6MB
MD5a0db06b23b5614a053297a5cfaa48bc4
SHA1e9dd16c033d0e853c1ca3158f78ac4c929bfbe45
SHA256630c5d8bd66ee599ab9f764cd4fa3cf7b351cafb485f71cc6f59965cc6533067
SHA5120202b9fd2342fb51a567086f56bf785d7336286908b387771f96fdf377ae76b48ab5533cc3caaeaf45ad77a42441905936ea7feffe690606909da591db41f166
-
Filesize
1.8MB
MD55eb2fd8db5a07336f4d472b813834507
SHA1bc3910e61e72040f857f7afc6628a39844a2b7f5
SHA256c104d67bfdecc093a7791e8d68f833475b38ef7bb4fef327546ae5e633a4177e
SHA512d5930533df1b9b83b18f5a309630ef88e805b38b7dddc576fec499bc4173e742fa84271656670c04acf32c443178a544d5fb1fb0da0a9a50a5c400f97b618088
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.4MB
MD565f6e757387f80a052b5c594ece1c9ec
SHA1c76f79386be9eee47d6cb93594a21a52eea4d624
SHA25673e2080c110c38898e77dfc5179f188c44465dca7899559acc3ac42458cd03b1
SHA51204ee9d64de4eab425cda4755f69b1b9e6e024e25c657db41c7bc17164cf865c832fe3ec21a7e35a155d56ed33af4165d88c00a2ebbeade853990d525c0591db4
-
Filesize
1.6MB
MD5e08b0e176682b86ac7bfd23fe5f03894
SHA1544486f920aee01aba98d35892f1faa50e83505d
SHA2568c1fd51b173d9ff590b42fff150d43e2c8fb86895d924ff7d79d9190fabbb228
SHA51234b94b567f7b6713b55a12168e020db8a4863fa968b80aa058d15de98e82236ea6c29ae3d35cb9569220289a078e618fd345aeb68864b301127cef85d3eda1a9
-
Filesize
1.9MB
MD5137b1284b9472002a19adbaaa1fc57bb
SHA153fc86c8cb0b22ea3b8c27a1f39b8cf2660f55a0
SHA2567cef23a8e5e5075b934ecbfe70162d7012d3f83b5bf61251d52e41eb49c75c6e
SHA512eaadc78a4a36f754fe20a2e1c014f583fdcae888373dc68ecd4a44b16325bf97a52e8aa93e7d7b0bc70dddb35df67f88de48fdf219508aa1d75524abe749985a
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770