Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
297s -
max time network
300s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
18/02/2024, 07:25
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 2960 b2e.exe 2556 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2556 cpuminer-sse2.exe 2556 cpuminer-sse2.exe 2556 cpuminer-sse2.exe 2556 cpuminer-sse2.exe 2556 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/448-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 448 wrote to memory of 2960 448 batexe.exe 83 PID 448 wrote to memory of 2960 448 batexe.exe 83 PID 448 wrote to memory of 2960 448 batexe.exe 83 PID 2960 wrote to memory of 2060 2960 b2e.exe 84 PID 2960 wrote to memory of 2060 2960 b2e.exe 84 PID 2960 wrote to memory of 2060 2960 b2e.exe 84 PID 2060 wrote to memory of 2556 2060 cmd.exe 87 PID 2060 wrote to memory of 2556 2060 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Local\Temp\AFA9.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\AFA9.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\AFA9.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BF77.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2556
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28.7MB
MD5c02bf1ae0a50bb20ad87c27ea9045408
SHA1b1a920cb17cde152a0f4ba3f12826ad8fc55fcc9
SHA2562bd6de1e5d9a7ca130e22b2228744eaeaa0ec1c5e985338c97c44c5699682beb
SHA512fa902efa718b1d60430018092876781bee5e62263d75a577364c2ce4e13cc7ebcf7aa9d22601fc697772458d0189d519d2fd0f8bee3c84dd82943d1790901762
-
Filesize
960KB
MD5d15ecf39e70d4d6e278b0da9ff36ba87
SHA12139694bf96cc3b6fbfadb8a9c8745b8901bff6a
SHA25604b2e6191d36dccb7b93c7d207ff16c0702cdec9b64b98206f9ffc7dc7633d54
SHA512326cdd9b35aa3dbd39d2fd4a22dd78f732d481f05ef6dca085cd086d8ca91502f3be961b44e5c4bbf2ebf947ffc4f1b4d4703593951fce22acaa418a77741434
-
Filesize
2.3MB
MD57e118ee82c731a138d2c0ffe58f39bb3
SHA1f0535a0081fe4f5520f213261ab48ccd2a76240a
SHA256ac9a081e1e5dc85d5fb27a89ba974d48c0b983b3a43adf197381be8694448123
SHA5123cef77c1a9f445e7dc4d857284520af0fa6c439de0c7dfd6fb74b817e99bb540d031984a99fa4b55401dd5c04ad2ba1b39c93d929fc528e54a7f51beccea5727
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.3MB
MD54c04147c386ba8792ac6a03069572a8a
SHA1dda67789fc1d0f2469ca95f01a5c81034853ca6a
SHA256c7739a1e940a282703d06eccda7110426d306f390e97fdbbd9df18472fd132cd
SHA512a8b5a0b878a9a7d30cb38feff814e1f4dce24d000158edc10a43ee9a89920bedf7adc92eb7e3913098b6aab7fbd0531f56fc09f508b5c2769992a94e55d153db
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
8.1MB
MD5b001df57d9209222a88589930f66dd35
SHA112161c7a7bbf6fce4275a68ef4a251d88db25103
SHA256c6e390db6cb09ec63f31c4a9b1d3f338f072d58ea050e249b77a15e125a312de
SHA512aea6652dfd3b6d833459a0d0f60e4d919dc007db9aea68283d7fb60b17195dabb99b2049ced7098ec37d315795c0b255233511ab72795ce9735d5e04f88c8e69
-
Filesize
10.3MB
MD5714e448c7cd8d62b7dab8a63a196240d
SHA1b5f21b08b0d1e06cda2e9a9a72d4935f8ce00e71
SHA256fb066b39671fa010e3c7642f4f09cad01572440221dbccb29fcc1076cfe6bb83
SHA5128edd81cf20b5a6aa14288b274473d902e1d2ecac3baa23718e7a1061414947b41bc24a569b98e7fa70c0711f190f8f2fad030b4ecdc491a90a34fab580a58abb
-
Filesize
9.2MB
MD512478865d31ba336c15b6800ca414c93
SHA11d799400d17c0f8687d98f70f777c70c35e56aa0
SHA256299ae6aba324fdc5143dee2d52323d6461b6f28c7fccba9f254a46d5f18e5a11
SHA5125dd8e43587bbf5bc73a299d51fbf60b36d61d94d3d1181391abed6722829ab5bff4e3ab9a691ee174924bf7815b1f661d59266cfdfb26731b994e2f572334291
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770