Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
301s -
max time network
309s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
17/02/2024, 07:56
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation b2e.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation batexe.exe -
Executes dropped EXE 2 IoCs
pid Process 2328 b2e.exe 2228 cpuminer-sse2.exe -
Loads dropped DLL 6 IoCs
pid Process 2228 cpuminer-sse2.exe 2228 cpuminer-sse2.exe 2228 cpuminer-sse2.exe 2228 cpuminer-sse2.exe 2228 cpuminer-sse2.exe 2228 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/3120-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3120 wrote to memory of 2328 3120 batexe.exe 85 PID 3120 wrote to memory of 2328 3120 batexe.exe 85 PID 3120 wrote to memory of 2328 3120 batexe.exe 85 PID 2328 wrote to memory of 1768 2328 b2e.exe 86 PID 2328 wrote to memory of 1768 2328 b2e.exe 86 PID 2328 wrote to memory of 1768 2328 b2e.exe 86 PID 1768 wrote to memory of 2228 1768 cmd.exe 89 PID 1768 wrote to memory of 2228 1768 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\390C.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\390C.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\390C.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\43F9.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2228
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5688ebc825e0b22a264670ed92277b037
SHA1bd8e97d85e74d8cedf75306c5063d5bceeef1285
SHA256dd0decdb3d3cbbda8432b18d6ae6390b7ba33fb8dbf335bcecfdba872eddafa4
SHA512edc631ac3a49d14296d10c97faa7ca2c7270d37f124d76793c1651a06be4b7bc6d2716fe57b70d38eeb118c7829c6623e00531785ae6127d56522694f9e0d39e
-
Filesize
3.4MB
MD5ea79ec55a44c9b951b3b8d06cb1e47d3
SHA1045a1ca99f573204614ee2f4f1a9cef003b7a223
SHA256d43dc3ae8e26761e0a5d02acf4974bcd81d25325faf59625153b13bd760153f2
SHA51237a514b3ac6cb109293f7fa2fc4a3d493e308f2bcfe240525b2ecbb39148db60854d13a5c5eafc44ebb1040c7e604cf33d1e753f17bb8ec73fbced93a27e4094
-
Filesize
3.7MB
MD56157a7ed9e78f69a0558c7b6adc6a1c2
SHA1760cd712cae0177062c269c47e559e54ce5de24e
SHA25630082685050c1e518d0f597dbd6bb24818fc3e2c25b945f2528615bb72fb8544
SHA512457945495ff023ddbf6ed2d3d3e066a2e945453d5ce542645fbafb37ea85b72da746954609f3160e1958fbfda2081e8101be5476abfcdf6c999bea2b4a52cbf7
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.3MB
MD56e5d122336e38cdae5f43a08a5f33193
SHA139893c97c4bfea8339bb5cf11c62afffe283f14c
SHA2567985cfdf4020ababe2dc0f77aeaa8c3cf2e3f33e94cd7c22470c8998ec4a9c9e
SHA5125ab587092748be1323a04009737a7bd7a2da2d8673591e09ea66ec1f66a887ce7b526d588be452985611662010aef842305e3fcef973bbdee45bdbf6305f4b24
-
Filesize
1.0MB
MD57c855cde540b8d1cb7f6ffcf6ea97991
SHA163318ffa5a7d89d038d385dc55a687b7a0fcf7dc
SHA2566e64980b6bbc8974e1971543aa1da1e71ac4c09b05b4ab6a0ef2fca89936197d
SHA512f04d8f8d77a2a23f6cfee77cbf14593b7c5e2defef796027b7dc9e6561e8655101b60f6f31df059854318f5f5b1f1c14a8c6288ce9c86f4a54357edd14507129
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.0MB
MD548da695092af8a6ae1f76be666f6779a
SHA13287b293d2c6ca893ef9637c40964e7fba003204
SHA256c6bafaf193d40eb2140946c0c6af1cce63224977690672f97a2076f6362c6519
SHA512956f294a82bfd749cc0f10cc1b129bf2ef2a1ea96aefece353d29b0330f160e379d2cac9feb4e22616d05a0eeed53dfe5748fb68f7ce56988e960ec750a11d50
-
Filesize
742KB
MD5759222cef2bb453e8d6119709549c6bc
SHA1767aedcb3b935213c59b706600a72e673c62371b
SHA2568a77dd9c202217ff1d64ba86e160031c0e5c5da0a576059e9fb6c29d1dcae09a
SHA5128d73558c0710e2677dd1cd6131ae35393928ca20a19896ba11ffbe9f05266aa0b2a989c7ed005ab5e5a2cbe26cc758b3b8250aa3ccc0bb1c8e040b99f7120521
-
Filesize
1.5MB
MD547bade004c4c2aea8e3597b2a4020746
SHA1c163db45f93471f5e4f54a2369ffb59cd029e85f
SHA2565f49a65c00652232ef2ba01c7d9d921fb1cd3ccce9856b1422c95adac5d77728
SHA512bd633cbea67943c4c7b21677bf1741f02c0d81de958a5a5d5c6aa45bfb98ef648db12868aaf4ceaeaefbc8dc9f332659a4066af512263cb053e70754a60015c5
-
Filesize
1.3MB
MD514fd7274ad8b4ffbb7fac0b4d27ce850
SHA14ab629c222481db543054fe84ebcf9afef3d5c2d
SHA256ca0a9318fb99b9775ef68cd306afd8f9f09a7e41b5a6664f77e48f9a33c9d444
SHA512b85b9c4c6f3dbcb6eac755dc0ae0f6eb2a36f46a4bf9290cfb53b2db1ca8bc136b1e26a7393eeadba009d83fa27277443f988b02bad146720ab6262ef37f1c27
-
Filesize
378KB
MD5580cfb4ec1877887750b123f80c0a2c2
SHA15465c37508fb5b9576aa28c5b31397093addce04
SHA2560f4faef189f53f0ae423eb9e5b2634c2cf7038ab4f8277ad26e0f10325b18324
SHA5127cb12230bd5400058ba8b5261dcc2b588b9609087d69924c48df9fd0b9860bc9f4855a687662f688538d173779b25cd5a75b4067a0134ccacf041f55e5888b03
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770