Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
21/02/2024, 12:11
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-en
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 4632 b2e.exe 4252 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4252 cpuminer-sse2.exe 4252 cpuminer-sse2.exe 4252 cpuminer-sse2.exe 4252 cpuminer-sse2.exe 4252 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/4052-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4052 wrote to memory of 4632 4052 batexe.exe 82 PID 4052 wrote to memory of 4632 4052 batexe.exe 82 PID 4052 wrote to memory of 4632 4052 batexe.exe 82 PID 4632 wrote to memory of 440 4632 b2e.exe 83 PID 4632 wrote to memory of 440 4632 b2e.exe 83 PID 4632 wrote to memory of 440 4632 b2e.exe 83 PID 440 wrote to memory of 4252 440 cmd.exe 86 PID 440 wrote to memory of 4252 440 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\C68C.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\C68C.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\C68C.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\D225.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4252
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.0MB
MD5c4262db1c2b5c8e65176ece2dd52fbb1
SHA156dab0f4980b7d1955eea59161f72c06b958038b
SHA2561ef20abf7374dc24e791e1590fa688c31a4b43e31ba7979bda83e3ababf14ec8
SHA512ebfc907cf388dc4ac846d1ee144dbc2d4eec94ac6d38ee5a9834dfe6d8f28b880c357ccf7f64ccea7a4b3c94b229082d1f057645c91b1f0c9079dd161d42f264
-
Filesize
64KB
MD53e63d8d147aec3c4d5e3e08d79395350
SHA1633cc399218c2915b895a83bda89bce9f37e39dc
SHA25639cc053a2dc8074a4530b02f00bd8bb723e52196224d978d9aad3b0f75740320
SHA512545308057e5ea490e55f5bdd7fbec20fd954f847cae6f60460a4b135bf76c4c8502d922768d8e3a96d29d4c3a513b91ebc40bcaf5395de2c50d4368fd46fc536
-
Filesize
4.7MB
MD57e0775a4d147a4aef19dabd62abaac3e
SHA1cfb8ddd84f7595b641419ef8f94f283256ef25ae
SHA256c7cd89dbc32ce56a9e441d359b7ae07431594ddb184186d275a7ef7f9e298d31
SHA5122e3b9ac438aa9e49a62968fd34ffcd3da1fc669da9a587117eca1fa3dd8e9c14f32c0b14fa9eeae5acde2ab61d4a82e2cb1bd08d18ed02c7e50dd26a7bdd989f
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
241KB
MD57b6137f150d64b060de5d715e6f0b97d
SHA133edce34b1835752fddfcd4a0a8dd550355b7e67
SHA25600698c69730440c3d3990fac5743c74d553d89cb6dacaa04f5e9ef1e87ed7ba1
SHA5124e9807d9387c2786f92f478b529bbf066b6e713cf51d0ea459263e0e30d547fa4bc55460a48ab35e62845173478c3f332cca19a872608dc369cbd3c47253f07f
-
Filesize
909KB
MD587ea0dabcedc388a34462e6208a88e40
SHA14742ed9894f232557cabbb19ce84daa62d3c5d77
SHA256c2d984cfd65091bb8606586753780ed2c4cacab831a8605398e59b51a73660a3
SHA51254cae2261bf3867d61e25b878a01cafe4852738bb24e54fb81f53e3e351731c1ce63826f45c2d64eaa44aeca5d8d319e4d403516f4ac3b5bab10696468d47e99
-
Filesize
114KB
MD5dc849e19ef558c8d7d075edb5c8d602f
SHA17e3e4806b3013ee6ae8f7aac5ba09c868f6acd09
SHA25662c650ff297fa30ea17b1d38030b5f56e6eb7d4d06a65b5dfba88198cf3006d2
SHA5123fb11eff90c5a5702f20641d406e94ccc462d42ba4de3284daa5aea0290df9007b3f6a1aeec7e73a2ef942c2421501b28f7d41ce493d20d8255392cefacd6493
-
Filesize
18KB
MD5d94706bb859e52d876e13602aa401382
SHA1770753d1836561a0bb002d48500f0bc12ce465ae
SHA2564089acb7c0cbe22017d1a7ce7d299ce46bda43767311c7671f1ada59925b0aa0
SHA51221f4fab7679ab43b8b8e3e4c03bcbceb9eba47351cb76575cda5ab79f945f2a87dfcb90d97e21549c0a9d3891fb89d12ad1eb377121bd345f65614713046f0a5
-
Filesize
17KB
MD51668c08d6abf9764ef31ac4cb9d6511e
SHA13cf3ecf1f8c6ec816a1968f7a7981f19d7860537
SHA256ef587da983512ec6ab69c5406bc13532da79f6e1f2804dc5d20f2b8bc3b3c08a
SHA5121d36b93f953fbeb8eb0afd817a754ffeba944bf17fe72ae987385ff1cdede8c860934d383b2ed6299deb49c84e3474b4d34392535412057f89985d58b319e8ec
-
Filesize
994KB
MD5611599b51c7f37a16fc0fe5e9afe790b
SHA14bf2dfcb543344566b04f02d93165fbfea4fbb8a
SHA256e2e0e93ae511b6102521d88e1a3ac1cc6335fd9e5aa01a56143b01c0f54c890b
SHA51276a74a980635de4536c105fb18d76c0eed7601a757b734161912936f5d97bc35abc953c490cb93d527f602b95f199978d4f937b2a5c66a188b65e537b3b8d606
-
Filesize
57KB
MD54a91d8f522a86a4a67e44a7667410a6f
SHA17ecf2598d4da2b1b105991b2f5a49c8e14e648a4
SHA2564ecdc95a5d1aac157a46642018b8ed1f005ee2ab6e9ab2bf8f38e961dc37ea4c
SHA512aa5a94d3acb4c310f0b24d132556ff07ec17bc152e4575c7e3e3d89babc9768ac0be323f3ed89c796d145b28f19a7d8d880721077b4e503a2aa3b8990032f9e3
-
Filesize
13KB
MD545d18cf34a369924742b83deea9016be
SHA1406bce1aab72e79be4d6c2ed69f3f6fa0b065651
SHA256c88634d42980176997a21c9292e9810a4eb45cef8d3fc4bd189fcccbffb6a2f5
SHA512fc52916a3204672b36c38555ffb311a3c68e5b36bec802db78f8e19ecb92f5ca02e4bcfa5ad731618024efd81095865706ba7baa588a3fd462a2b78d73ddc07b
-
Filesize
14KB
MD55c37dcf3e37dbc99177c5bcf977be61c
SHA144b8d5a15e30792b04ebbcd38b18779b66b5c07e
SHA25629d05cc85bfba5e047fa07d67fd4832259ed2cd8e651e1d0719d6d1fe4ab1c5c
SHA5127653829956b1e040b59d78d1b8d3efae81a65c906be1a5538d0ec6167af3fce5f0cfeaa506290d3ab23d192ff971a408c5b4a74736c83ba3ee9e6faa6b611d7d
-
Filesize
7KB
MD505d5172a4b237d362f4a0b23ba217cef
SHA1e61def1bd3102650c35b025964ea5c8d6666db7f
SHA256a40096e9a1a87a82a2592100ce78763a6127c29c4865a3e8ec4190c1c1ab6f99
SHA512cabbf3e3d3bf7000e3eba53cf361fb51bd0d58f6df022dd832b83e5e1ae028f9c9e6a82768c26b5919f16798065fbc5c03d932ebe93697aa8d37dd9ca0261bcb