Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
295s -
max time network
296s -
platform
windows10-1703_x64 -
resource
win10-20231220-ja -
resource tags
arch:x64arch:x86image:win10-20231220-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
14/02/2024, 17:20
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20231220-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2784 b2e.exe 1436 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1436 cpuminer-sse2.exe 1436 cpuminer-sse2.exe 1436 cpuminer-sse2.exe 1436 cpuminer-sse2.exe 1436 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4496-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4496 wrote to memory of 2784 4496 batexe.exe 75 PID 4496 wrote to memory of 2784 4496 batexe.exe 75 PID 4496 wrote to memory of 2784 4496 batexe.exe 75 PID 2784 wrote to memory of 4852 2784 b2e.exe 76 PID 2784 wrote to memory of 4852 2784 b2e.exe 76 PID 2784 wrote to memory of 4852 2784 b2e.exe 76 PID 4852 wrote to memory of 1436 4852 cmd.exe 79 PID 4852 wrote to memory of 1436 4852 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\9114.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\9114.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\9114.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9308.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1436
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.1MB
MD5fe77460593512f5314c7842dc3cb671c
SHA18eec8382c076493ebd3044abdefdb07fc2446dfd
SHA2562c76f9eb49ff26341cbf4e8c47741de0fb387f2c1ea1e4c33bc998fb83dd1441
SHA5121cd2bac5f01ee3306b60181380d26feeb5e73b397c06ffa20386dd677b49e0d2166caa098219ec1b79a26cae1094ab908c2511004e85d5d0b8d7cafeff219f3c
-
Filesize
13.8MB
MD561886b50887e3d2df383cc576fbed142
SHA116104ca0c52c7570cb9a201bc42a5a2b71620af9
SHA256d414f7c759413933321e63e6882dcc58693cb58e08ac25591d5bb50956ef1d8c
SHA512f80b4a7c4a8e2aeabbab6c97d3fb3e9973a1d70e08a56bec42cdf54c86fbb7bf8af4e3b785fd39a88750daff2bc8598ec4eb0850d6b569ee3408c6cd14b261d0
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
384KB
MD5eb8ea4d2595402528f73410e2c8651ed
SHA123abb385032a9317d00c826eb21e0fe6fc802c50
SHA256fc3c5c1787c58c465ea47ab132afc59d209b1f7d319ae80a7913ed5c39157017
SHA5127f4485a662859bdec898bb4f9675c8a834ab570ae7f4df2b6e95a9f5ab45f8fba612d04f0edfe22dc4bdcd3011af0536ed200731262056cd7bec332ce4b18573
-
Filesize
402KB
MD58928daa4227475b3e66f14c296b887d8
SHA12d2233c8f844e75d2f7c8735fa859decbe5ec876
SHA2560b12f9f4179a21b4680e6e4d14a7ea8dc6c671216326d5ab47d57cdaaaa1063b
SHA51274a48adee4bfdbfdff0655a1e715316d0c5ac2e17129556699e72562a7bcd047187bb97477d608ee9716a4c123fcc282eaef791c767f0dba664b0925ce636a42
-
Filesize
384KB
MD5b91f7bb5508b343188ec32dcc7880611
SHA1fe2ae7ba4a1bbb2a5df7b73f21a0b8fc745cc11f
SHA25647881756cdfcb302e63efb2016c122a1bb61574d81186275aef3d5a9fb72b84b
SHA512a5b91bc653cbf28219b6f169d5d849fb53eced9a932b8edf468c9092544795ee8120d5c76f0c45f27b7a2464c328f5bffcabf3e83d2e7236263ea930cf92eea0
-
Filesize
384KB
MD54cb3a8d3af58faf78da4dd33a03029db
SHA15356e4fb04a7047f6fc82a4e071e4803f97a0f3d
SHA25686df790940bd442466ea58a434a31aaaadd1d23a9e9bf5e6fe625ff49049d620
SHA512244237f4a13a7666e9f9592451dbb8bb18ca1f828d66f97e2890fa8f6be690d8890848102a8be253542c9f4b154d9f0e1aeeee5a867c866b78b64f9949f48c89
-
Filesize
384KB
MD5d1d1f36cdbccda3b96e8c164afb74526
SHA191bafcd404c8568c9a195ec8cbf9592ea9e17e8b
SHA256ea6e726150aa9a8dcf9ccb6a991440b451f9f2dcc46d93cb35971556879d1d03
SHA5122306e6578ba2217b4f32913e1ac35e0547723b873c11244e96affd05457945373c621ea16a82e1e3aa1a177e3059efc40c8585118c63a3ea145524c51d1d18c9
-
Filesize
128KB
MD548c422e815911804d8322f84e605438f
SHA1b577cb4575fdf07ead63d0f9831833f4f30788e9
SHA2563247538f008c10c405b77c7a1ff636bd7f7e72b0cf4b5990870c157958b4e6ea
SHA5120278d1c8a8bb02bb70bac382c89481451ddd147f2b195fed3cf1105524358a04703be54186e138d0e1f1423441e694cd292eb890cfe66bc421eb160821548f8c
-
Filesize
64KB
MD5e98583e2f3157ea2561f40a91a79b195
SHA1770932f48dbea7a78a3b21e3df65e329a27313ff
SHA256f6b3de2ac1e9c449daf82a3bd6fa52d2ed60e73e8cdd25d5d2194586a8d10de2
SHA512cfa97067447a389dc5439dc42ca467f97947fa7010314cad0b99655688361721720bb33e34a1c7b22c93d807327b756109f63d15a40df5aaec620b0d0e1acc7f
-
Filesize
9.0MB
MD567d1c82e451297f168e0a58e0192e5fd
SHA14938616df89083d34597d6d31eea89ee41cdb55f
SHA256e7a433f82048204ab533fac5c897921929baac6425f167c50b14611063f2be73
SHA512c743c9f0d8734f8002283dbdfe14f7d38c1e7d3393e39e08264d7bcceedb5d384dbe14c8bf38e5cfc7827dbd98596fb321357c6616e2668a5d7963f60a5b7d6e
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770