Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
292s -
max time network
302s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
19/02/2024, 18:48
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2744 b2e.exe 516 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 516 cpuminer-sse2.exe 516 cpuminer-sse2.exe 516 cpuminer-sse2.exe 516 cpuminer-sse2.exe 516 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4296-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4296 wrote to memory of 2744 4296 batexe.exe 74 PID 4296 wrote to memory of 2744 4296 batexe.exe 74 PID 4296 wrote to memory of 2744 4296 batexe.exe 74 PID 2744 wrote to memory of 3368 2744 b2e.exe 75 PID 2744 wrote to memory of 3368 2744 b2e.exe 75 PID 2744 wrote to memory of 3368 2744 b2e.exe 75 PID 3368 wrote to memory of 516 3368 cmd.exe 78 PID 3368 wrote to memory of 516 3368 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\9337.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\9337.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\9337.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9579.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:516
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5a077d0b4733763a157f9567a7f975fc4
SHA14392276973196157edc9d4f2f0ae9a3b5cd5a6ed
SHA256646cccdef254f35393eb1766e3c7c8d9acbb0a4ba6b21184dda943f311616fd4
SHA51201531e468a2d43cbbfe08b4611894dde2fc112afba1b2967dcef9aaeb97e0039af2dc98c1ff7c570f24a85a0d23c2e782197e9370a22343a5f09dad01a3a8783
-
Filesize
3.0MB
MD53dc357b249165e962301d1449fd561b9
SHA1ffa17bce00c33d5f2bad130651ab4a7c01ab4f8d
SHA256b968f831a1cab36b12f2babd4ba8e036841506a3dca1a57387c0b853ac27299b
SHA512e7a7bdbba93d7597c43cf814b0e94ca10a970b74e5fd2909b2d9a47c779e5471652ca475ce816acd805b60b3ca0abcd703eeff74386d7181884e16b659ad9456
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1007KB
MD5f13ef4edbc262b4bdf623f08abe873d7
SHA1a7d3ac067cc482351d39c8ba140d15ab2574adc3
SHA25689bedf470e6da7b1b0b8107673a5628ad42108e9067b23ef094ef7254a3e1644
SHA5124e8665d04c5dcddfb08458ec14b9aa11668ddb61cbf71b355bd462637404f16dd9e8f56049a66b8b4e143727a6b31f0a3d5b3f7a9658fb304f905e2eebde3f69
-
Filesize
741KB
MD54ee009955dedcd3744ae35aba5a4c51b
SHA1644f58cc5df69fced7d7b3d182bb9766352e0bb6
SHA256ca3e75cc2cd8fcee1c984afffbc844d55b2f579e0b9a20bad441dfbe032f647c
SHA512f359a0730da8c9b8e5aaba81dd3c6980d41504a690d95547fd97a2a8e9206c923df4789a466b7afba0aea9c2176f8ddd17073b8a0fc0f2946bc18361263102c1
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
860KB
MD5d7e394d4dcc98983fa447bea29835061
SHA1fa0afee1d8ab2e4a8cd864a06170aca247e8b25f
SHA25659d90488c684dcb5a30df40d4857d11e02fc0a5771a8591b55aa6a5155df9190
SHA512a8b432537dabecef8f01c831658272a7f06529a7eaaad2235d51505579b2a9d52f74f8968ccdeb60d7bf069e244b50c68b743a90ac83d620c1ec1f3bf0395f18
-
Filesize
570KB
MD514400128bc12d25f4a454eec013c3a3d
SHA1999735916b23db078b53683ab41fb40056b26a10
SHA2568565ed9366068e1db20650aaedad446def5257b9126bb6914f6ac953966cf68a
SHA512db7a41fc26839c75c4567341d5d07feabcf870970708e3fba677061180341b8233232965b5e54ba50b04d5e4312546e561150443882f4e0b4e072c2db1704bc8
-
Filesize
755KB
MD5afe2353bcd08a7ee6a869b125e585669
SHA13fd8850fc4f2831e4ed373106e7bb0d917026a2e
SHA256f6607d7c79d75ca07735a912624ddf66866d2e01ef94bceacb48d4e4cea9034b
SHA5121c1d2cd7de6b2d3d396bcff2e26862b492649ab818a4023b221190f5e26a1680155dea19e3646ddde18395ddaa92c18f60e0e18a7279e42189044de952cd4f23
-
Filesize
597KB
MD5e3805fd7dab48fc15f6caddec489b54c
SHA1935b50ec505837709db1f7e7922c73546c0b1c3f
SHA256da6566359c552521f85b41ea1ccebd59f1c65f03d45680c5b04b9815d793e11a
SHA512771ca26bacf3c54d8bc89e855bd9a123d59a11c701bfc82789b0ea98f3ba11f1a0f11d457f69a01c7354da6a94baa75b4716c3e90370e86edf644a30bdbaf0da
-
Filesize
407KB
MD58389fd4cae9013e77e13d32fea7ac0c8
SHA17daa3ce4001579042022b333f1d5479e43efdd4c
SHA256211759b70a569470db6ae79359d645b684f7874aa80dbf9bdd70129d4f26efaa
SHA512db8ec816452e0c080bdc84c12a7feb259ebca5045ac5158e68efa53bb4d005adf1a6350f612c7854b35e208efc1f414ad401f7025620ad18fb5cbe68945441a5
-
Filesize
389KB
MD581a8f90e6ae4fe06e1b3b4efa7859025
SHA1f011530c3c06e7303a795f38942048b28c0290ce
SHA256daefd1d5695a9a747ddf0030f438ee55d177e887a31214a5a48751d25a5be9b3
SHA512bbb111e67444df93a6540c59bd64e1001bf4d54899ee229a432f06e6349df64d0b1461f89c5699fa27ec9041e7b4f95d32e0d0f6862fae788a248cf8dfd99cfd
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770