Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
294s -
max time network
293s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
18/02/2024, 05:15
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3764 b2e.exe 4376 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4376 cpuminer-sse2.exe 4376 cpuminer-sse2.exe 4376 cpuminer-sse2.exe 4376 cpuminer-sse2.exe 4376 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/5068-4-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5068 wrote to memory of 3764 5068 batexe.exe 74 PID 5068 wrote to memory of 3764 5068 batexe.exe 74 PID 5068 wrote to memory of 3764 5068 batexe.exe 74 PID 3764 wrote to memory of 4288 3764 b2e.exe 75 PID 3764 wrote to memory of 4288 3764 b2e.exe 75 PID 3764 wrote to memory of 4288 3764 b2e.exe 75 PID 4288 wrote to memory of 4376 4288 cmd.exe 78 PID 4288 wrote to memory of 4376 4288 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\D3CB.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\D3CB.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\D3CB.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\D6D8.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4376
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD51e9d204d5d2b9895e13b91154ffe2c94
SHA1a649a76cff6cb191d1107e0fb9b7724084bb46b6
SHA25601df8d9c87e19c0d30d31ac1c546dc93a846b25d8b82e19111febaa4c8ac5504
SHA512ed94ff81ce25833f0ad52fadb5fb457e2d43a3bc4c716a5efdcb8e1d6fe45a0fc2f08109025f405d9a0222b7666f84b1bb1ec1064daad691773a2d746df2bd03
-
Filesize
2.8MB
MD5d4186a2739f0d06cadad345abbcf57c7
SHA10793156a1a5fd032dad5d5271742019b55e0eed0
SHA256247a3903196be90a246fe5fccf94f0c7df53b0401aee3326397b05a5f035a4de
SHA5125c7ee2164e042dbee0469bcecbea0f6fe36b1de817a16e0bc2cbd4ff6377d75e45d62deb1c198e7c27012b90f4d083ec093f7a32a138ab9b488857e50679d47e
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
807KB
MD5ed4c24855bf149d4f3f11eccc2d31484
SHA121c86aa9d43cae6bb0d6ef6ea2973019ab1e452a
SHA256ee81e8f7b521d58369ba72995eba181fd5dfbfa23733d8e9c3cdbdb0c7185a30
SHA5129f2c8c5c32f60017c51d82d05f58c019eeba7e026bc296ab99c4cc7e2a3620e85fe58efce225db5ccddc6052f0f626fd7b8b693007a3aa271370d07c8764fd24
-
Filesize
876KB
MD5dc471efaae2cd820a3a52566fc05c111
SHA1dcac69f9d3ca974685b870c7b63a9830d73e6eea
SHA2568ac5eebcbac378280430f29f1facce445dc18d591f6ee5f07e8fbd30dba1932b
SHA512bc99e0fd344ffe344908e2b6de55907a4a2432d84fcaa295c296bd65cfb91121b2c38b52f03bcab06d03a448400bb3802d0dd4f2fc943ae548c229d524865f7b
-
Filesize
759KB
MD5d24d74bc9c34168c4c83f1836f889d63
SHA103b95fa4ca762cf707166c38b2d447fec035aa27
SHA256a75cc754ed677267b4ac3cc914dbfd690f9ae56823fbd2d4cc2bc8a69b691174
SHA51225ac61ea90b6bf826a49f598b85047b38f493928c6cfcaaf35616e51d963db1a6029acba05704de1391059cbcdd74da4357ce9d1caae71a3f7ba5134120ab6e1
-
Filesize
576KB
MD546e1c7531774dee6a7125727095ea354
SHA12248bc2bd821aded068d2e5e55f5e7271b50ab91
SHA256cecc229ea9e416207638b67d03bc6846fa188a14fe1c9e75028afb48ff4e2081
SHA512fa9dc86df3e0a8f7b2579785c03717a43eec14beab8ca3176f73d4ecb0716d047241ab30cd53518e7acd645e9f8282a20552a6fa33824c34afc5c5210cc69f2c
-
Filesize
598KB
MD53a5e38053d07ed95cef975e78f59e04a
SHA1bb121d16e6fd215e2764850dc022be6ea61c2d02
SHA2564a3f3b3da35f0a50f8917dab21581a5cdba71871550cf0a81ac3fb4c00438f24
SHA512d5aa3c7f6ee7f9ab7cd03ba0febc81583f3fadc65530981e6b61b841da0afc2d8bb1fa96c2e8d4879ec79c2c0895da88468e96984f06465061293a733413c91a
-
Filesize
473KB
MD514f6da34f2470c7fdac0375ffcd1f308
SHA1bf952563d7a19c9dce56f4a1f938ab286de28fec
SHA2561a20a710c9a3313caa6920ce3af2d3deb88de2d23756bc7db8e784b708d96d7b
SHA5124c7e50629ed2a295dbd5dfd6a42719737864a4f7a879b6e597bb89bbcf3d9c6235e2015ffbe7d7b53e81bdcdfb60656a9b3e35af17f790f8ada3f1fe51f69d07
-
Filesize
679KB
MD5a12ed81706ea1dd68a646cbb25fdf7ce
SHA1dea422dd0c08605abff5a27f35d717889caed086
SHA25668bb321346a784981abda71cfa8288ce5ea30d6709abe53f313899cdafb5cbf0
SHA51269a5401d6066c4896db2294a3d3fbdd95182270a871b5d5f7d66b3666934fc55b0fccd03b4bcbd8bb07535f1d4d239d439312803630aa22409180c3710e8ae72
-
Filesize
336KB
MD506badbe2e4f917bcf147e975436fdd29
SHA14ea612e9d26f17a7111bb586b9c331515acd26bb
SHA256cc8f74953297c21fb7aeaaa82e14b2951500e59c03ac7e474cd404d8c45c7a96
SHA51235d06020f6934b4a9ac703e7c09cf67c8a831df7c0e052c74cd7cdd0fb34354d13672241572757f245b94786cd090d3c4c74bdb8831055e4b17d85eb181da834
-
Filesize
417KB
MD53a5e5752f7d364dcd7157c9d761ec874
SHA16308b53a49bcbe298424c6b773d6d0cae180a0e4
SHA25618f1d1ef214008081fded112d3fd930a626be4d42cb651990cb02bc77fafaabf
SHA5126b1dda610520d963fb6f15e8a81e08318015972dfe6594728113c2114aa43f1d21963fb0918b512810a5e5a5c364d0bfe32d156a8f2bf22a5e12e49baefd2ab6
-
Filesize
330KB
MD562bd4743891e932d644f56d4fbf33dec
SHA1dbba6908e2b89e914df39b33a48fa850e37e3968
SHA2568a1912d6c9cfa8959f26c75116d5555a79a5f0f7a555c921c52e109a3c03901c
SHA51252c51a4ed29a424ddcb914ca84df5442270c8f12a0ed1841b6731ef051f09ff22f9b726165cf31c55da032504ab6af0332c8e10d0bf459331ff2854fda634e63
-
Filesize
431KB
MD57a02af663b239497c93f84128171c62f
SHA12e9bfc117b4d663447e03be75de0e2ccc634e08c
SHA2566c994ccde793ea11581302ecd7c6aa8741c47e03be88aa575b87e02c67d7740e
SHA512be12c1b07cd83d12aba2aff5ef5d81e1f99a190b2918ea61b4521c2b31067716682d3e2a083f49ea0ddb143cbe6c3a1d90fcf430c940cd5e7b56b844163a6228