Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
293s -
max time network
300s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
18/02/2024, 02:01
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 2356 b2e.exe 4880 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4880 cpuminer-sse2.exe 4880 cpuminer-sse2.exe 4880 cpuminer-sse2.exe 4880 cpuminer-sse2.exe 4880 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/2852-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2356 2852 batexe.exe 85 PID 2852 wrote to memory of 2356 2852 batexe.exe 85 PID 2852 wrote to memory of 2356 2852 batexe.exe 85 PID 2356 wrote to memory of 444 2356 b2e.exe 86 PID 2356 wrote to memory of 444 2356 b2e.exe 86 PID 2356 wrote to memory of 444 2356 b2e.exe 86 PID 444 wrote to memory of 4880 444 cmd.exe 89 PID 444 wrote to memory of 4880 444 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\6C18.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\6C18.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\6C18.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6ED7.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4880
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.4MB
MD5c12064c961eb0324710f9d5a9ab910b7
SHA13dabbe3b3a43b0b95106450eeebc54a3b48285aa
SHA256048a8c2ab8cb2e16c8a1da23e0984429fa5dfb98c06c2d9f857e17930518336f
SHA512901733a68589e7409d6c8f8076372b1b8823930046de6112715edc85d9edc1e716c89914d1484f5220c02bad2520e5c7d6d4f601995cdece4dd0bf072be2940c
-
Filesize
4.9MB
MD5057ec0a15ebca39445f69d1a3fad933a
SHA1d8fcde756b9a99b065e17af5388c6671c4f67045
SHA25621d1c4259af898bf91073b3783012746a8d3bea80a7c26577b484935c0966f4e
SHA512e035c6f4809f2cae58b29bf987f9fa2e99e2e30a188af3d785779b3eadd332bf6c52dce6fddcf6e4a823a6d252840e715256f88b5e8aff4bba6909f575bfe843
-
Filesize
5.3MB
MD52a6796d30532815947d03127f03a53cd
SHA1e3a866a9e2eda3595f03f24cb2eee9657762a2a2
SHA2561aa7c2124f753379899e6b08c8e998ab362635fb114e65de86b24cdb8e767f1b
SHA512d0a9f47145baf70159f1fcb428e836a9f519a0c74eb4d6fcc3acd9780c9f3d333e5d2e7855abd667a5515e56c4123525d448f5bc0854ecd6e18d1342fc04c33d
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.7MB
MD504908f4ad7b426215bb5bf784df0cf8d
SHA18579fcf295187df00fd750db03b4a6c86315c47b
SHA25697dfb76e10a228909ef8dc93c872221ddf54dbfffbf3693cb0951afbfd9bdb16
SHA5122e0db4a652557b8637870830c156fb4f39781d939d1b8a415eb93491d0f085a7f98dc2d32829e0379de0da0385f9af720408063a9406723a0aacdad6854dac8a
-
Filesize
1.7MB
MD5de00072c02a43549faf138ec15cb6fd9
SHA1ad462368c282ecad47943cf64f6a1ef138cc5d3b
SHA256adc1f5b8bb66c54a105999bd858aed4304bb72bbf52199e4ee3c4f70b3606946
SHA512c21747dd9b1758210ec6bbcb047c86205586b89fe134b41fbfef7229555d066a80dd79ecf0f93a65e795e686291c2944f23b6dae001d917b92658d3b359304ee
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
2.1MB
MD5d3e726e6465d3e10473a9395d989235f
SHA1526d020c8f8ab665d29d819bd5c3fe22d2a4fdf6
SHA256b739e1643721b3d39bfeae56ac71c94c429d25cc002c9f0d424c75c5bbdd3a54
SHA5125966796a407729b99323f840528d8fb48824f17ae20a453c7d93d8952cadb529579dcde5e54c82e699b1c2680a0e025fb1ea2ac295fb618517380c732f4b2914
-
Filesize
2.2MB
MD54ef3378809cb862406f052db9e26216f
SHA1e1ad9be6ec02e17659ee836212eb8484beec6d76
SHA256803e1efc3b5f7e818b537b4dc09916f9fca89452b9ad2833fcd9b079abf53f79
SHA5124b06a0e7b3e43f28ffe02ce484b2bf3da832e4349421b2d46f6ad415cc2cf7e7aa3245d7ed700e3314910db2b0ef2459fcb8c0f97330cdd33e5541faf1973f18
-
Filesize
1.7MB
MD5713fb6c318220691da0ba4ff46acb167
SHA1422e2437122bfeb14a485eeec40484cd9c11b194
SHA256d32f013ae589d40658123101c89b2f6e41b6a2c144ed740d48d39e51a072f5f1
SHA5124e9ddf2b21c37481c6fd12481fd017a34e15b35c051b49a6bca97e7180e58235dee269c15c40e2d732cdbd8d54fdf8fa72195aef337244a3ad4edfb1b03babff
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770