Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
296s -
max time network
303s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
18/02/2024, 09:08
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4652 b2e.exe 3956 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3956 cpuminer-sse2.exe 3956 cpuminer-sse2.exe 3956 cpuminer-sse2.exe 3956 cpuminer-sse2.exe 3956 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/1552-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1552 wrote to memory of 4652 1552 batexe.exe 73 PID 1552 wrote to memory of 4652 1552 batexe.exe 73 PID 1552 wrote to memory of 4652 1552 batexe.exe 73 PID 4652 wrote to memory of 968 4652 b2e.exe 74 PID 4652 wrote to memory of 968 4652 b2e.exe 74 PID 4652 wrote to memory of 968 4652 b2e.exe 74 PID 968 wrote to memory of 3956 968 cmd.exe 77 PID 968 wrote to memory of 3956 968 cmd.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\27C7.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\27C7.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\27C7.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2F0A.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3956
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD51b354728a944a9220df7eededfd9f8e9
SHA1d9547f3eda300eea37b80daafd8c2715d9d73f93
SHA25697c12b4912323d418fc9d2994c8aaf10b137ac1bbf894398f27e0069642f6844
SHA5125ee8518d4888679cede44a076506fef21bcccd2423682338083bd62a071548e281c157cdedf676b1732ee076befcbfe52d95ff03ff42e0e70a446e45d29bb7d0
-
Filesize
3.4MB
MD58247aea35ac539a20a4091acb8f4061c
SHA1ead87c6077a2664bbc9c8c6157baa3aba960f1c2
SHA25659bd9dfc483c987482c1a3328925fb34f2ba103e6e2517a7124b19fe700e3251
SHA5121c9d8f909ee609ae170abca13b26549d1d2d9f50b35e40b9ddd7e742098d282f7bda5191af99f39e7888724c53b41ddb8e506253abd93d356c6dc1ef94965e1e
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
421KB
MD5c2790c8743722586369cdcfafeedf9f1
SHA19d982c0aae258c4c2f481d67ee36281b771c24f8
SHA256619dccab31aaee97941762bf7fa480887188b3023db0c5e81a302e75de28f88b
SHA5128a68b26c57ea7f4704d609d08d52cd2826f60296fe1a39cad0114af8382dfa1746c36afaa1d675cc1de7cbc005b82f5a8af9fbf39cce24fe0c1f04a060df7ef0
-
Filesize
523KB
MD59702c834acfe8df4b5f7753b3bdca87f
SHA1b1d3ffd3810f0f43e508c213aba5b2d957e561a7
SHA256a686ea1beed02daa7e0625dfcece8f4ee27c03d877da935dca52da57480122a2
SHA5123c2d97115afa75b12899734f1cc1b46edecf5f0d543f454dbab4ecefc6da0ab7458a18491cbfec24a724d7208e045e85878cd0b550a3f8752116ba2c0d083074
-
Filesize
287KB
MD5f5574d3fb9643ef6212f83977f99fb83
SHA14718dcbb26556abd62d8e678c94c8ec5a3b1858b
SHA256edf7967a102b343bb6a71851a97639ef3eaca94a15b1b275e1c84a4564da75c6
SHA512b495861a87f0523a235414ab260f248315f12a28cedef3ce6842f45d7c32673903112e0f28892762ade394dc7af9c4993cbcc5f0dd6ca78da69fe6b79b277324
-
Filesize
163KB
MD5747d9035a1e6f97da14fc9ff8ed6e867
SHA197ff9bb6e2efb19f3f1b1c5689988840e8931134
SHA256b68d36f2766f9dc0054501abef20fe466fac634df1df09de3af9d0b3da6c3a6d
SHA512c46a996ad1c8d87bcdbc8ad42426cabed7de65bfc3f0d018ed9116bdeafa61bda1576a84ea32642440731be3db21ea095896ac19c2074db1b3e14731978b3ef2
-
Filesize
185KB
MD5642c4e5c45929c1a16b2890d83e7f69a
SHA15b5f85cf657677ac5ec885022ea0b1f980934b82
SHA256e757412de799de189fc4f47d4ba5e9faa52fec73d573d11623967bde710be143
SHA512b40c2df0bce90a128497f02d631e421e41e81c68751a7e9a5883b48e2837046a47d46ea0413d2c8a84517d049e68fbe16fef465450ba6790a7b1fef4dbf4fb91
-
Filesize
263KB
MD53c6e434de6540e166a5458f970cf1698
SHA1593262edb94694a5c1e9421b442379047cac9a45
SHA2562e2d21c0f0aea359dad30ecb49dfdc31f821f0dbd23b4aaf439a10fffe79f283
SHA5124283f5414a67bec87ea0ffbe9f62145b315f32bd356d0c28ace56447a2188b4049dd5a9678f902380d877124c8cf83301d1e255561cd00ae51e763c52e16dc3d
-
Filesize
243KB
MD56f4be761604633ec8702e3860e2ab9a1
SHA15a42a9bd022d94886df9fe4d6edaa7fa07e48039
SHA2560ef8070848c96e47d685d35ce79cb44b0169cd5527c559e25893a9ec0330c1a9
SHA512c01ed1841bfaa1fbabe53aeac583aab14dc5091b2183fa6670c8d221d4a386538b5132f12ba247da787786bab8d9238aa59f7fd0c74893b507ac3733c14ea2b5
-
Filesize
206KB
MD5590d25f03d41d64e443444919a29ede1
SHA13921410fc1a0d1a6b820e510392957336611be7a
SHA2566bf4e3a426c85aaef7e8651ce211b10ea9f46704d29df5a07fdb41e8a02513a9
SHA512b4802ae3ed49239a87377314ab70072caf85cae1e873e28fe2dae0c74fb040c012302577dc2195da6059506535b8196ac8918ff11db81d0bdfab857cc732632b
-
Filesize
193KB
MD59dc26846269bb47df31782e99371d36e
SHA172cd8da01d781f5cac95163b9cb5f691cd644113
SHA256155ccdaf31378e1c83f42883a5c9f1941fce4a5655dd2ac753f11dfa6b75beea
SHA512d8c6b79ccd6511897ff1b955e6d2122dc971673a2040ffaa8aba6c9cfdb6eb5c4a3e99c229ae99c58f35f024febd6cf4a39bf49b33cbf898461953426344a909
-
Filesize
268KB
MD5367da8e5db39696f59fa6e71d451d8ef
SHA12e1c1dcae88666f4a87e17d7f1702a25bbce09c3
SHA256f07da3c5e6e7d0c60317ac45ec401a29129da08086d0d28d88d95919977387c7
SHA51215919d72e4b064b6c99b0e86a499a827216ecf3ecfc486a34dffb4571145579430fe1b7b8e6c713f7b9c8b19b0684272928e4b98b0c292b6f07c0ff2c614fbc6
-
Filesize
358KB
MD5e77fea2670b12160509c45cf19a9aa24
SHA1ee736ec5c4a46a2626f36bcef09d780e271494ae
SHA256b0c1bf5ea2f88f393d01fa6b82415b83ab5eb58b8ddb3601a6333d4fb0791c2d
SHA512ac3cc5c4cf1fb9e4156fa248ea8a7d321bf5c306588ee2962f6d8fe51fa207f6c2927144ae5b4dbf603a5718af1d22a624370954c8dfd17ef7470fb47bfaa349