Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
295s -
max time network
299s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
20/02/2024, 05:05 UTC
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 2656 b2e.exe 3828 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3828 cpuminer-sse2.exe 3828 cpuminer-sse2.exe 3828 cpuminer-sse2.exe 3828 cpuminer-sse2.exe 3828 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/1060-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1060 wrote to memory of 2656 1060 batexe.exe 85 PID 1060 wrote to memory of 2656 1060 batexe.exe 85 PID 1060 wrote to memory of 2656 1060 batexe.exe 85 PID 2656 wrote to memory of 2480 2656 b2e.exe 86 PID 2656 wrote to memory of 2480 2656 b2e.exe 86 PID 2656 wrote to memory of 2480 2656 b2e.exe 86 PID 2480 wrote to memory of 3828 2480 cmd.exe 89 PID 2480 wrote to memory of 3828 2480 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\6C56.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\6C56.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\6C56.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6F83.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3828
-
-
-
Network
-
Remote address:8.8.8.8:53Request149.220.183.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request149.220.183.52.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request136.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestyespower.sea.mine.zpool.caIN AResponseyespower.sea.mine.zpool.caIN A198.50.168.213
-
Remote address:8.8.8.8:53Request213.168.50.198.in-addr.arpaIN PTRResponse213.168.50.198.in-addr.arpaIN PTRminezpoolca
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request196.249.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.142.211.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request86.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.134.221.88.in-addr.arpaIN PTRResponse18.134.221.88.in-addr.arpaIN PTRa88-221-134-18deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request194.178.17.96.in-addr.arpaIN PTRResponse194.178.17.96.in-addr.arpaIN PTRa96-17-178-194deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request180.178.17.96.in-addr.arpaIN PTRResponse180.178.17.96.in-addr.arpaIN PTRa96-17-178-180deploystaticakamaitechnologiescom
-
8.3kB 9.3kB 84 87
-
-
-
146 B 147 B 2 1
DNS Request
149.220.183.52.in-addr.arpa
DNS Request
149.220.183.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
136.32.126.40.in-addr.arpa
-
72 B 88 B 1 1
DNS Request
yespower.sea.mine.zpool.ca
DNS Response
198.50.168.213
-
73 B 100 B 1 1
DNS Request
213.168.50.198.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
154.239.44.20.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
196.249.167.52.in-addr.arpa
-
73 B 159 B 1 1
DNS Request
183.142.211.20.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
86.23.85.13.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
18.134.221.88.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
194.178.17.96.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
180.178.17.96.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
873KB
MD57a461b01606f5837aa69b2ff27717666
SHA143666b4ade3a5f1d01d983a5b645d8f1c26995ed
SHA25696ae825af48d66f0c5adfde4155015b71ba529be741d5a722945b0c52baa1d0a
SHA51252864a236ecb01102ae013180acc052a10475ea26ffa5b0ca37ddd25fc6cec462b8d5575c069ff8eff6d153d15fd54ebcc2a94d65585ffd46e0aa0b3f6e86631
-
Filesize
1.7MB
MD5fa7fa8fbd175629465a9e9b0c8652df5
SHA164e9459b5135fe7096985d9800ee9ed3c310f09b
SHA2561be6a165906e8b2f3b4f1b5b5eb208cfe87b69384a00d2e9344b7ab8c720598f
SHA51287e37164e9bb230705aef17d4e92ab867f79b680e0d0d45f3e1454994ec490d9dc19410cdccecb24acb182aaa121fcd41f5c7b64ec547aa507720db9e42c05e7
-
Filesize
1.4MB
MD52e68b9e38435d7bfa028bd2bb08e174a
SHA1978ca8a647ce45ee04bf3eb8b2578e9567c642a4
SHA2569bd0055d55bf3bad5c734bb52b6a0a17c6e678d3787c458a83dcff7414f6257e
SHA51240fbd428e609938dba637fa212c4a78bd92c97a60f2609d568b2e20684abe1b77636f2c63da41b7f056615e0eb5dbc7814eb210491de264c74758a6e6c440e9a
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
639KB
MD5a531f890d904d4003a36f58a15aef630
SHA1b0d5e6913d1265cf59c2bb8129e5c6f84b52e76c
SHA256eac199913dec6b7805a07c5dd480c6e48782777c9239521be342625d68873679
SHA512da46ed756b80ad4f7d733a8dc98f1e37d7277c264ff14205cf8ca89791f3e6467dd746b1aba8993d209d6e6d7c8ffa2328950f01209fc545a1f013726b30a0a4
-
Filesize
512KB
MD5a879c5fd4613dca566d5b1a782690dd5
SHA141c6063b0f0dee953e99713a5326856b55e08366
SHA2563ee76359d6802a8fe11c5b144e18ffd3833bc7b49d66f190621d41e41ea0fc20
SHA512e20f8f40822ca215c75767b8d4102583cfb3812c74dbc064a8619f214c164ab94da6bee0ae42c794a0af1847ff30c295b34d3015f87bfe597dba80339871ea96
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
524KB
MD54e0f26eafedb15fc88dc41879f0fe0e8
SHA179338896aa38cbf8e2dfd5cf624ee6e17ecb29fe
SHA2568e1608cd5356b7b56662f28f7ac82381032fce4ecb7ae6dcfaa845c0f31d93d6
SHA512e3ea934934b2b3c1bffc5d0d5c504062ea169a01052f8cd80e264e02edefee8bcd1bed9ba1064f3b62bd1fa8a1ed7ac2294f262dc534af4a4ab49999b947690f
-
Filesize
624KB
MD58bf340ef58a60181d44f590ec78179cb
SHA1b177ec63b69af8c0e6b23b624ff6d4529c9d54bc
SHA25641f27bf7b56d2f1eb560a68f2ae0fbdcd3cec4f3bcd7c4717fbb9e3f50d61b5f
SHA512c8370ef5304436e3f81620091759741db22c7c6df3b681593d2cfaeacbb9ad7ad10370323025f6e936817902c121041cd4ab0ea7e0c760f248f349e957e7f1df
-
Filesize
695KB
MD517493ac6ba1c106a136b14fa8e2e3625
SHA12ea854de006d515db206f6eaa3d11ee9ac4d0e1c
SHA256c143785e2de43d2d6b02980dd1c7b5348e7753bdc850aab3c43310ff3170fe9c
SHA5120d2475eaf031182f6c14df0867df7821c1b6b30c5b833c552a760e1d65c0251377609eb4c0fa5b25a08b452bae82d1e6c16c351cb4998f181e72cca15dfbe25a
-
Filesize
675KB
MD594a190cb0706234627d427a3db712def
SHA1ba369fdd41c3eec1bea55c01d4f00bb5b373b14e
SHA256099a90e50dad70810c1e5d91a28566b8e3fa905330019b3accdcd12b7f1c597b
SHA5125078188c70e10475d4f119c77142e98d5c790ea2352fd4207d5ed995f2dcd8919882076549b8a6bd804551a6522e00bba3f3c059158795176fb8fba37d415211
-
Filesize
509KB
MD5c975517f718f1ae2e795eff121b15fdc
SHA1b8065243727e10cdf4b28b87f1174f12f67466d2
SHA256bc249ea1df79cac6498ba4d988b40b1525adfd961d776efe2a271701574845af
SHA512775658f0516851f2b34e5a752f2f5f16dc1c445f9b6e975f1743d57b79998e08476ddd95805104f8d61c92b16ad1aae10727020573754f01a425905ad4c76864
-
Filesize
271KB
MD5b9d06977e2c1dfe9349b15b1b9ef44d6
SHA10d2846c917fad3e8f0140faaf3b80524c64e4c80
SHA256532fecd5f9adc9ed42d7623cce15f59a45e849a54272509629a4463bf87a896b
SHA5126dd4f83813cd5388adfaa58f5fa3ac8e3321d498d8f3671722ec7c80698f493f03b04a2e1d7c0e598049e91943a2bb3332c19453f4b7fecf2ca1defe9d9b0716
-
Filesize
489KB
MD5fa01a29a3fed4ef9848cc7c0c3a8e9c0
SHA1faf60c55ecc7adecdf018a946dc7485d1c9ac5bf
SHA2560f9366cdc0f0d7407aceca75467fd2b8c3e293fbe09ee4a257e1673b804ee42f
SHA51224655a40f433f970904fcc2d8de2194a57b8e3d4b770c3c50e4b5039d578ab4bf2d4ef03e2ff7497da379435c8d215fb3cdbc4482d0b38bdbf737da6f374b3a9
-
Filesize
561KB
MD5c645961eae774edb3a7101b95b4c7073
SHA145ed51e20475c1e1d4a474debf3d7dcab7c27953
SHA2563711187b4ebb65f28e5d5daff402dbadb2f2f38cc32c4b964d3311a92ac4110d
SHA512955fe3aae97516f2a9096ddf75a9ee8398220493bce1fece56fcd6fcf9cd57941929b56922882cbd95675572b72c0a55d524b800782f1e2348494686d9058858