Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
295s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
21/02/2024, 02:56
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240220-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4768 b2e.exe 2344 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2344 cpuminer-sse2.exe 2344 cpuminer-sse2.exe 2344 cpuminer-sse2.exe 2344 cpuminer-sse2.exe 2344 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4456-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4456 wrote to memory of 4768 4456 batexe.exe 73 PID 4456 wrote to memory of 4768 4456 batexe.exe 73 PID 4456 wrote to memory of 4768 4456 batexe.exe 73 PID 4768 wrote to memory of 380 4768 b2e.exe 74 PID 4768 wrote to memory of 380 4768 b2e.exe 74 PID 4768 wrote to memory of 380 4768 b2e.exe 74 PID 380 wrote to memory of 2344 380 cmd.exe 77 PID 380 wrote to memory of 2344 380 cmd.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\A3D1.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\A3D1.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\A3D1.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A894.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2344
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD57b0f4c1d8506067fce25df5de733bcb7
SHA1053b618c2012c6895e9709696395951acf15c165
SHA256dd9a3eca69a73709146ebc228a433e0fef43ab6c12c2280725d798c7b494216a
SHA51245ca44d04c436082073475b0bec73cdd3df1f0cc670d9a3d5dd77fc2b3b60ef870af5912d27269107222850b07234060eefb2d272b96de1367ff544cac506618
-
Filesize
1.1MB
MD516e403498efbcecb811beb699bb43821
SHA19efa5eb98b5742b6a1e7c9df200f71712464dbad
SHA25657e8c120b35e0ba4f6cb3f2e68f39b5176c522244a5d93d6c400f379eff5a803
SHA5126c48dec0f3bbdd95dc3d3db1beedab543e08ddba8af0a7f46514105050b5733ca176efd1f98f8d47ecd2895ed4f4a852c88a19ad2c2ab3740ce67ecbae108fd3
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
426KB
MD51ff5a97bde7aaf0b127f35c7f859436d
SHA15c7749771b9f8de6edd7ce4549e30a189a40f44a
SHA256f8705a3b721b96ce01760a7ff3eaf723267e5b954af8217ccc98f4d144a3c3cb
SHA512f59b489ea3c1ffdf662f476d465d9bb8739c31031b8cfeea8b674d8440de1aef1dd5bf2c22d9fadeb856915eb04db208845a00780728d938d66280b26b687496
-
Filesize
496KB
MD50f7ef4e3cd0cb7ffcb654d8311d7b253
SHA15dfa78fb68ae4909cfcbe5b98a5c1924b57b8470
SHA256e99029d1276fe837f80c58d731434c29b6bf632e5e79edd36dba52331c54baff
SHA512f6ab036636a0658a4b08d643a0248c4e63a5d7ba259e168eee89956a2f04a7433ddee1ae41246ab8247a38c2d844a108721b52014ff90005f17b35bc3f6fcbfc
-
Filesize
474KB
MD5f01688e0b8e43199f6a79323372a1cc1
SHA11e2e74c7268cbc956e0dd239532328cfb0f2778a
SHA2561b253b3fa8f2929463cd10eaa998fba6b07c98facb11fa6a0d5a52d7ecb34c62
SHA5128b4dde16e0ebdb3ffc7124c27411ace9a0f528742f59f7b091745662f5097dd5b69b5cf498b7d55e84fc9aacef69b979dbd2bcf83ce711a47ad3f7b5f9c409ec
-
Filesize
832KB
MD58afbaff0e890b882fd271c6619c09b38
SHA16c998620bfd2def8e7c3dc40f069afc4c69d6f1a
SHA256989a9b2647114c0e52769a9dbca41c464e8ddc0bd8cab87348066e3350061cbc
SHA512333d73277e6b57bb8e99831defd649f656d4799499192b319fc34987c0e71765fd6cdf2de2d22183fcdf7cf2b79f2ec855d49c9e6df56da06f0b16a94c18848a
-
Filesize
785KB
MD54ba335c402cb294e16fdcec39cd71638
SHA1c9aae75109e6733f1fe27bf550dad708edeb2403
SHA25675e7a24c679f10cd3f4ecd222936aa7c5d5ae24da8fb8f31bd159fa5ac53b115
SHA512be0d535258d005479e6672f885c96224f2d98b3409be2f0889134dcc455d0fd2b4e9c72699f377292b5fbcc1914165cdd19ac12ded1b21c1954009bdd6f75cad
-
Filesize
475KB
MD55dd5ce71e872bd7eaa2b5eb2aceef4ee
SHA140fe33633344649f8fc648c33cb41f7c34034dab
SHA256ad2ee90f4810338677989c0925ec357d5774d5d5d84f8b0dd94b3e7af4c3f3f9
SHA5125da892987be306fcdef22319b28fa7d42bf536dcb7d520c8f554544493759f0cf65bc3be8c77431ab1e23c1c323a8e3b25a5ba4a93955805ac335aa28680115f
-
Filesize
517KB
MD55dcc9157d151f469d9c1c567d017b032
SHA1f3c7823ed39561a6a4dc65803a1f90420eb18fad
SHA2567948d1f80c696fbbb1c93307553940289e0a7d0058f0c6733d23ea74cb3618b1
SHA512ad575244dc98a356e3e688a9d2d20c27073e426416c59cac9e33f7db27d3286a1f462f50f13562c888c03aa2713dd88a280e4d831acb66c6b44ee5e453cb2f1e
-
Filesize
674KB
MD56b8c6d5ba933670add54597ec8b99b4d
SHA1ad905ff241a6c986d83ceac25e8a31895e4a9ae6
SHA256926533731326425d11403d347b0e81da2c6c81c2faa19726c8210c0164923d99
SHA5127537564afd8d82a7e950dedd9c7d3d4e5459359d126dd2367bbb572a94602f7e6c8cba886e05debe18c24fbdf8ab0c9d26adceec5fc7453764dbb1ba509c691f
-
Filesize
580KB
MD5ae1f1e0925d8a6e8692581d113c28b6c
SHA1ebf7678444a37a59cae9b88f2eed361700ae992b
SHA256c4589c1b3640ae15e6cc4f9a04da91621ca38976b057568fdeb471e3ee3fd5bc
SHA51214bdf70583c8b4c9f62ece26ea50680a49bc52fcf449a1211846ba2ab41a840ba256c86ed9d774c057897c94545ceba8c5c00cdb9ec7e9b7d2a0a7e50cecb066
-
Filesize
330KB
MD551536735700bb6c120be95ca147d330d
SHA177857a2200e746c13d01a6e90d4f290290c22c9b
SHA25639e7128b8e275f657704431f9790ed7c6914ba231258ee8446838a66454eedf6
SHA51217964e1e480b788c67cff84683e09f6a698e92ffaaccf96d67f76cabcb7b15fb1cc9439df6ab04734d82599366f25f29a74907cc6bc4923f4b3fccddfa077636
-
Filesize
521KB
MD54d602cfc2f748ad1728cf9183c9a8306
SHA16dc704ac5837cf122a1ea4df3be65f0b2111908e
SHA256e2e1ae90df488f28e7b099af028473a6d4b46d1e8035ed98e690cf9e1d3f0ada
SHA512c6a375021ad207042e32f58d321bba682ca10a6f4091a7e411f3e191d6ecde708b2f71b8921244f7ec14cfe6e1fcc294aa4a7bb7bd8c8d84d1753a851d1d772b