Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
293s -
max time network
293s -
platform
windows10-1703_x64 -
resource
win10-20240214-ja -
resource tags
arch:x64arch:x86image:win10-20240214-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
21/02/2024, 17:30
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4652 b2e.exe 516 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 516 cpuminer-sse2.exe 516 cpuminer-sse2.exe 516 cpuminer-sse2.exe 516 cpuminer-sse2.exe 516 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/2180-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2180 wrote to memory of 4652 2180 batexe.exe 74 PID 2180 wrote to memory of 4652 2180 batexe.exe 74 PID 2180 wrote to memory of 4652 2180 batexe.exe 74 PID 4652 wrote to memory of 4992 4652 b2e.exe 76 PID 4652 wrote to memory of 4992 4652 b2e.exe 76 PID 4652 wrote to memory of 4992 4652 b2e.exe 76 PID 4992 wrote to memory of 516 4992 cmd.exe 78 PID 4992 wrote to memory of 516 4992 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\BC89.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\BC89.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\BC89.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BF97.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:516
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5aeaadd3660024f32e0d6c99eb814752d
SHA1b383ac24a35544c39447bd326d96bb6721e764eb
SHA256777e06a3ee68e2f06cd45a43690f8b08f6ae98ecf9e18c60256b442168202512
SHA512b4b3d161a6d861ed8a96e9ee9b3a76ad4e6597944fd0c8acc82f48184ac5737152ba9a41ee79782c33f21d7da91df1e36bb69b060aa49b18d65a3232734745e7
-
Filesize
2.1MB
MD5280e5c269e6706259c70f22cb94823c5
SHA15b5a544238a26c64ce1fc0a7d9fb05526026ec2f
SHA256016ba028f4bea99c77ee739526d8a1bf904a9711711f0d92b1e3918b0e841672
SHA5124f4fc77eead60b96b35c0f96bddc61a7cc1d19cf5fef846b8e3ea322199b49f4faee157dfd8e36dbce46f7fab5bf5e65d65b3c5306bb95c6c2046f470e406008
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.0MB
MD5808627b2bdbf7c0159acb1db03ca0b16
SHA1203139f765c03707b4e3fe099b0509aa4288bcc2
SHA256fba82639422beb10de6c66fc0d610209a1d576e386b38eb997bf23ab05fdcbdc
SHA512814d694255dbd3e5ccee03ab41692ca536a891119d6214a423b4cb8741039483d620f469056a1e9e9f2efa8287f8582ae289fd4918457c725f4b61a0b6549ac9
-
Filesize
1.5MB
MD5c09a4f036f4d6dc0296852daae7859c8
SHA1d897acc8e95efa05314a1914011bc7920f3f0405
SHA256b7b22d9a4a913d8a64b781d79f2cfc6ecbb57bb5bfbc8c1f2669b55ea34f527a
SHA512499f7660233f48929437d688c68347d96e0ba82490b6fa7be27adadda4045fe7b94dca9356e9f0e8121854ea488ebaa12882150b56d2503321053c07e08f2e5f
-
Filesize
1.9MB
MD5bd351ccc6c21816ce91cfb5966b0bb5f
SHA1ea63c7708bf0ae255278fa599ba6459c05467c5b
SHA25601f801afb301753b93a1d88b033960ba802ded0fe31c37e2a7c8f7b63840ed25
SHA512b34115138bfda1098be1793e28113b241a7ff1e269986a68f835917961b4cf4d684ee2555cc3bb261d13f741fb657b99c1ca1bce74713876bf6f10c26a1aaa7e
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.5MB
MD544229065b835fffa8791fee9b30d85d8
SHA13928233b1c782b54c75be3b996ed78b0c176e9bd
SHA256888c322cff6a227d91dc9122be03723b7f7dc1b22a1b757df4f90628bd89c488
SHA512578ebcb4151409f79cf8d37f98cdf18a7aa2c24add78f416cd531fbe7c4cc4ec8b19791ce50a42660f08820064e22449788fca1118c07e9a800ccb120c493480
-
Filesize
1.3MB
MD5415d7cdb58e5d53edba45d0968d85b68
SHA12f40e37233d46f702b4ad9b4e11c351b6e88c507
SHA256a1fcb3f5b72ac30bcedb9bb7a3ac6e368edaeebcf3cff431e9e41fc5e58d0e5c
SHA512bf690e59f6c703ae0532cbda96435df8d8ce1531d61145f2636a43573d4aa50ce6102dce167a1d49fb53e506c1117a9677bdf24ce002cd50fb5fb03a9d67923a
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770