Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
297s -
max time network
307s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
17/02/2024, 10:45
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3516 b2e.exe 5004 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 5004 cpuminer-sse2.exe 5004 cpuminer-sse2.exe 5004 cpuminer-sse2.exe 5004 cpuminer-sse2.exe 5004 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/3788-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3788 wrote to memory of 3516 3788 batexe.exe 75 PID 3788 wrote to memory of 3516 3788 batexe.exe 75 PID 3788 wrote to memory of 3516 3788 batexe.exe 75 PID 3516 wrote to memory of 2004 3516 b2e.exe 76 PID 3516 wrote to memory of 2004 3516 b2e.exe 76 PID 3516 wrote to memory of 2004 3516 b2e.exe 76 PID 2004 wrote to memory of 5004 2004 cmd.exe 79 PID 2004 wrote to memory of 5004 2004 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\D2C1.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\D2C1.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\D2C1.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DCC3.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5004
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD542e52d2aa6e0aa4e0a6cb435f3e72e32
SHA1904d518be9644114eda76add80ccf585ee238731
SHA2564f8c614822cb12e7405d484d8ef1c5796fe1002f4e20867e761623d6108bd5ed
SHA512c5bdbe9278322b817f6744ed51e93d2a5a32b7285a5d8506bd7d6578fd432f43caec54c5ae81074a06b8c2b4a36ad5ee4bb6e817698252ec8df1406ee68916e4
-
Filesize
6.1MB
MD512689c6eb8285d78d3d9bf37ba3e1cdf
SHA1b3d8ad5ed28e003cbbf00053ea63612baa96ee33
SHA256fccbe60c5e3d598f7ae6b29817a5b17f91141363bdf6313596afc0f9240bb374
SHA51296796e69aa6c20485efc6e7df75073909097e277aa9f5c298356ffe2e101ce65053d984e22baed3c008f70c7b1c8379444839ebf2a222d9cfa075ba3154a365d
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.4MB
MD52ef40d5c3b964c66392be6a3db51bf84
SHA1391a644aa11504129db4b42007b054f2c3bf5414
SHA2560ef835e2576ba8fbfcd733a66284579607cc8dafdc2b26fe3c0091dc66d8e707
SHA5120b568c8b5ef88af49c00801cd5eaf3e7262367d2a3356f1a685d36e3c1dff63babb5dd049d5a1e7fbe214cab35e6f271d0a105e073a1fb2c281bb5c0279b7107
-
Filesize
1.2MB
MD5b465230cf79fcd815a31dad053d1dbe1
SHA1f1bf5606ba3d1bb49d9437b5ba489fd9e8614ace
SHA256cd616032256b5c1fdad92cf551a04c9f8fb9292262b19af72c1d8406b8baf865
SHA512b832fcdf586c0afad6f0fc7dd315ba3ae05d3e49ca730ddba0ac463620afd44215a3e2d3f906de41e4448dd91610b13633148048819156aa27a4ee3155d3e9bd
-
Filesize
1.1MB
MD5c89e863ce2221a0f49b45a55100e468c
SHA1569ede311983a53a8f23f254fe37735538cbfa5e
SHA2565ca5fb55f2e5ddee30c893b0e78d1ad59f593c2c3e5ecc155f14a088c65cfb46
SHA512f65476f7353ef6ca7378752551c28736b61916cbf54f0a17b211a5a14ab93ddc2830a1d9c3cc1118117a23be95d49b06fc8a174d1a87f360ae4b96a6bbde04b0
-
Filesize
960KB
MD5f3707fd5b389e53285dfb3815a4785b8
SHA1788b2ac7be4acb28e804021893e11cdd44ee0784
SHA256f7ef0e3e60989fac5636e6e5a018b730b403b75889125b56c4d07d6279e94c94
SHA512f11d8577758db08f597987f525b4fc4c8c3f5181255f89281300968dc90fe4b298c322e3f531f768cd5014d116bb7161365c9d3fbaa76ab835405d8a1e231f26
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
933KB
MD515af98c289e260fb5bc6791d0014b055
SHA15c35e101b85c127338f151226a0df7fc59349dd8
SHA2569ee0a0aec9bba3a578bb89f06f7dbf28ff50b6d78a56d6894c2264d96142b9b7
SHA512f4c2031832611b86008b23ae8c31735e6a2a2412fba433c2454c0e982f5b88d92d9fdc88d82218718fb4f9d2cbf457f96711d684007d3c369c12e5fe178f10f5
-
Filesize
64KB
MD5e98583e2f3157ea2561f40a91a79b195
SHA1770932f48dbea7a78a3b21e3df65e329a27313ff
SHA256f6b3de2ac1e9c449daf82a3bd6fa52d2ed60e73e8cdd25d5d2194586a8d10de2
SHA512cfa97067447a389dc5439dc42ca467f97947fa7010314cad0b99655688361721720bb33e34a1c7b22c93d807327b756109f63d15a40df5aaec620b0d0e1acc7f
-
Filesize
768KB
MD5613807ad6d525aded318b643c33bc17e
SHA12c9a4180140838c69c20bc4047c3d2d777d3bee4
SHA256896775bd33edafb0d219d1ae3e973e71aa29a4937d0252bd3a4cad074c004971
SHA512d688b0f2570944898097dcc6acb56b3a4c901073f0ce22b5ea260b05a37fe2840d84b44e7aa74c7d73078b0e5a45c24994852f5c03f049982b6ddca6ead89539
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770