Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
292s -
max time network
299s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231222-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
17/02/2024, 11:24
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231222-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 1976 b2e.exe 4252 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4252 cpuminer-sse2.exe 4252 cpuminer-sse2.exe 4252 cpuminer-sse2.exe 4252 cpuminer-sse2.exe 4252 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/3996-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3996 wrote to memory of 1976 3996 batexe.exe 83 PID 3996 wrote to memory of 1976 3996 batexe.exe 83 PID 3996 wrote to memory of 1976 3996 batexe.exe 83 PID 1976 wrote to memory of 5680 1976 b2e.exe 84 PID 1976 wrote to memory of 5680 1976 b2e.exe 84 PID 1976 wrote to memory of 5680 1976 b2e.exe 84 PID 5680 wrote to memory of 4252 5680 cmd.exe 87 PID 5680 wrote to memory of 4252 5680 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\6BBA.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\6BBA.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\6BBA.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6E98.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:5680 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4252
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20.7MB
MD5a64c6fbebeecf32da03ad0b1c97b6cc6
SHA119e4f8011b91c20b008ebefdec174dbd0bf5cbe0
SHA2569541324baa905b69ba9a0b9478c65c225299b83707e9e635d498a26703522ee5
SHA5123d9d8f6f5c3f246dae20efb11805b53ca8ef878b55de5563e07f9d1bd0742f4ae9a225f64ae08b01055d7f51f0a091cb31ebbe40c7316b0355d7e65043198a94
-
Filesize
11.1MB
MD56ed5cec00947bb3f41230d8d8602c696
SHA1c90e30a769535749f29830769e07ffcabee82c7a
SHA256d904b5afd94196e7d7615f5a852e9093f85c9e496eb90d938172a0ea45eff369
SHA51248ba77556239700039af74ed0a7a1ba9e17f48700b873c4f22f15bb4e8b1fa69e1458e484a49e3826914feba1cbd279ddc2aafa384c44c97f8075cec399063de
-
Filesize
12.0MB
MD5566be54a72bc8d83575d4ae4999f6da6
SHA130775a139aa04557cabd203b7ebceae77a203b7a
SHA2569cbf3c9f577b64210ae3007ee08766873b835c7a984ece1b3e75cf9548fb9357
SHA51298ce6cbd3782b4bd1d18d40aa947cf77f1d3ae3c14d34cd5fda115aa601965fe0b1db09fd2d8303855299e006d7d480ba514f20d469e96b0a2719a51f669ed58
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.3MB
MD54c04147c386ba8792ac6a03069572a8a
SHA1dda67789fc1d0f2469ca95f01a5c81034853ca6a
SHA256c7739a1e940a282703d06eccda7110426d306f390e97fdbbd9df18472fd132cd
SHA512a8b5a0b878a9a7d30cb38feff814e1f4dce24d000158edc10a43ee9a89920bedf7adc92eb7e3913098b6aab7fbd0531f56fc09f508b5c2769992a94e55d153db
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
8.3MB
MD5ee2b2f00e4c3f2a496210c0cf01a4f97
SHA1c9cfe4611bd36343efbd640fe034fa7ed92194d8
SHA256b46ff64d8568e7b8f73ac6af6b160cfec50ab436a65c26e0a87bd5fbdf410677
SHA51268c7098f69513ea897afcc2978c66c9b962e0c20e145a73e1e4fac349bbe78eb766a37dc5928bf945c277622fb8972620e31f6575f216493885be2ccb48f5434
-
Filesize
11.1MB
MD5926aafb70b7b17ca653f1ea5aae27cd1
SHA1320878a3589888791e7f2d51780b96f51347766b
SHA256d31100c266246737b362b663f88b585215689efebdf9fa7e0b3909f4020e162f
SHA512877b02d73a8ded6dbb7d3dbec88c76985b36ef6c1f70e2ad01b545795018ce7fdab6e5c2f2dea8cdb19e70ca1f616d5e591f7800791b976ab35f52f338afe2cf
-
Filesize
9.0MB
MD51ad456a76742b45d696a74b65975b125
SHA1513548ba35b7f898ddbb99c31d39678ecb98f49d
SHA256dd04e9c6353f8ea56a95eb01dfe1cc3f7d9223aebac0da46ea6e5c164aa8b227
SHA5128b656b83fc62ff9c7ab27f8eef7ce24dc1948948d5dabc4e941708f1ee87e10f171b3296f453b51c354a9146995a38c1326d07b9cc5b5eb806c3f80a1fc38491
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770