Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
293s -
max time network
301s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
20/02/2024, 02:35
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 1124 b2e.exe 3468 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3468 cpuminer-sse2.exe 3468 cpuminer-sse2.exe 3468 cpuminer-sse2.exe 3468 cpuminer-sse2.exe 3468 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/4336-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4336 wrote to memory of 1124 4336 batexe.exe 85 PID 4336 wrote to memory of 1124 4336 batexe.exe 85 PID 4336 wrote to memory of 1124 4336 batexe.exe 85 PID 1124 wrote to memory of 2316 1124 b2e.exe 86 PID 1124 wrote to memory of 2316 1124 b2e.exe 86 PID 1124 wrote to memory of 2316 1124 b2e.exe 86 PID 2316 wrote to memory of 3468 2316 cmd.exe 89 PID 2316 wrote to memory of 3468 2316 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\7407.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\7407.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\7407.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\76D6.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3468
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.5MB
MD5f2b37c86de565a2ea08c4fc7e420ea02
SHA1c087101e438c7996a2d6dbd6d2f2e5a5968e15af
SHA256de99bd8c4ccb021445545bee55b940e8472b30473c393aba5964eeab153f5982
SHA5124cbe9d092190849eeef01f1674f263282a992a53b7e6d6473e1c0ebb12f8d6fa125a999549714a8d8d0fb3866f883a00f8750c91eb414b6deabfac87e826fddc
-
Filesize
1.8MB
MD5f1582f867a687d129b30781fec16ac05
SHA1b4cfd5c7d47d0df74c6d43022e43fd9a93358ed2
SHA256c5e063140eddcb55ac1a618ea8f983b62a95bb05cf2f245689a5f530297d02be
SHA5125beb200ff5d2b42d9e4483cb30f27537794a89defab3cc04fad9f7cf63167594a0a029526d57dfb5e1023a482cdbf2be6c9a20bd8c43de9ad302f9ed57a8fac0
-
Filesize
2.0MB
MD50728dc4dbce9bc8e129e761066b3f9bb
SHA1be8597f7e6beb3ee6a02f6b68fd2cd1b02ca2862
SHA2569adfe308d5db201046bcd069c936cc5db178bb58f86e680dd32dd8f1bb52207e
SHA5129a0c65ae467c55a3c11edbf31a68004e5cf5b850479a169236c88d108e0148b8c21a8edb143e8b40e9505e2cddce2b7efd2e632678a7fc8e030738c25df192e4
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
378KB
MD517cee8edcba5e1aab188467832b2a335
SHA1fac7a52272e2a7c4d69e668aac3d26400154a95c
SHA2564f3959af8bc28fffddf4c0ae333d2f4e61af92d0dce9f43a185ce730011ec128
SHA5128adea6f3dc3b89c40546066bef8585436f1ca798a8ad78b2da274bd850c96071a1b9b1f9cc7eab8dcc7f88db52b0119a929af8bc2a3374bdd59a852e55e7dd28
-
Filesize
76KB
MD597ea55b7ce7c5196924ebe76746380c8
SHA118a16882a8d2f294f77ab111c2f6804a355336bd
SHA2568521afa5f16c3925519a9559c77e3baa70aaf71b1cc87c00e03792363ce76982
SHA512611d5a6a73fd0c8ed6a846f94de258059d1ed1b351573397dc45fad8a5c6bf2f425e5fcbec6ea69c19b9d9a8bb057e0d44cbe2dbb0f5542eb9690199ff9dc014
-
Filesize
71KB
MD5d7854e98f1834b6f09b6888835f06a13
SHA1c3094fe540fcdfee442ce9888bf9f034be7764bd
SHA256aec1cd988fc39c8255a12b97eb07bc2ee7740daef0a0b89d910085c010ee37bf
SHA512c7cff0c0469298f3da937ae7ad4176cd3ac7f215c75e0f2c6e1615dd744374e75c1c7e553ed3f275facf3c7a4e36b69a6b1453d1c7fac37fca47feacfe5633cf
-
Filesize
226KB
MD5db441292da32de1bcf8750479bd7d3e2
SHA1f6179220b871c532212407131e147afc4190fa46
SHA25604eb26621e3a53a0e8448713e5c5799c15633f87009ef574f0442cf5a5962780
SHA512105270ff3c7b6795eec4d6f64e9c5a4920e71e1430ea76c9102b986915cad628b0d31894cb9250bd180d8ba0a86259d68a6c024ce1aafa30d1cb7301394ac51e
-
Filesize
139KB
MD592721a31fffcf8b005116a439803a45d
SHA1ea581493f31096eb5a149a2bd6ec3392a6514d94
SHA2565bf29d59ed4d305c324a0c43b7f109f3c525f9fb1e74bf8ee76dfe731fba1f6d
SHA5129e1e5be5f6bc94255500766535233ce8b1428cae8294ab4a048189d88df44e3d7352ab029e6c1ad4103716bce9eb2e97877867fb8b88d563d7621b0106c2eafb
-
Filesize
166KB
MD5e7bc41e4900ba02e11f31b3581a94aa0
SHA1ddb3e64c41f75affad04911c0471329205fcc979
SHA25672dacf2b1f4b74cffaf5f3433b61e17d18a6066d272e5c01e83b03ea716a4cdd
SHA512e4c4a4cdcce020ddc25b5ed249c10cf1a1e82f4e38a03182e922dae3e931ac55a31894642ecb300911ca9335c64588c1e9f0175fba769efc61cbfa48b2075bb5
-
Filesize
265KB
MD514979ef090f13c14f48066d925d81770
SHA1cc450c98de145cca16ca1df76d3c03742d20ee81
SHA256ada4f0b4e1fe176b4476cc31ddf250357cfe6caaaa6c24d2d7f418cd1f1bacb5
SHA51203c68310f91c5a270f639a0a0bae6e0641c658dd7ba1c41df4bd5cdbadb2041ff67ad8b3631d3aede4b5b65abc8e3a185916906ec1ebc88c2db7ddb5d5ff08b2
-
Filesize
117KB
MD54c06a79ed2a75086c868d2629e2c5c31
SHA1d71455256bbed921d3c4c2b1fcf278c02b30269f
SHA256727728f2844485f25a5a6a1526083d0ae3211571964ee2318e1747fc9d140ef7
SHA512a7061afa000454b1f85a9c57709d054084221ba0befdc4364c62dc0495a27fbcd13d210b71a4a5cebaecaef8dec02d6a54c963552d23167f0a0678eda4721dbb
-
Filesize
171KB
MD5dfccc1cefa240905899e47a1c186f678
SHA1bf752465b2891e43c1688bc3d151b9079fd2ce52
SHA2564dad987d38ad4083d6968e717528120557d2553391903ca15a661f4349417289
SHA512bc801bba1a399beacffdd4c4ef4204fbfa526900ef220d79dca49a0a076ccbe3984905f2b5f1b81a409638c42d6e17c218e43af6208cd641eb06da7bf90b7404
-
Filesize
128KB
MD58d949f4e279a9a80f50d7c2e0c7bff36
SHA192e29300716211895b2d8cd4cf010452f0132152
SHA2562e87614d15e62262c8b0a0c65e302b15e971b591469f3c679e7e516934cf621f
SHA51236565dc0a3290ac8c5e0fd0a2756764ce8e49a7ef52a437caad549c7ea1ac3ac7dfe05cd4951ed6b17051768fd9733c94365d85832092c429b0b74ab62a338fb
-
Filesize
178KB
MD5d9cd56e31465559e9cb20e339dc7570e
SHA154663e075dc332540750f58cd5c29b1eac8d30b5
SHA256bff3078388fe35bf709bb94b3def0e3316047263a19697d7cd71d817f242b091
SHA51248476a8f7d7e1f8c7fbcbd0c67519f8262b9c30aa74c33078e80234a7efd6cd08fa536f49e8ecb6d82a66f610173619401daac0bfc299833df299d21cfe7acf0