Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
297s -
max time network
304s -
platform
windows10-1703_x64 -
resource
win10-20240221-ja -
resource tags
arch:x64arch:x86image:win10-20240221-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
22/02/2024, 00:17
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1412 b2e.exe 2468 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2468 cpuminer-sse2.exe 2468 cpuminer-sse2.exe 2468 cpuminer-sse2.exe 2468 cpuminer-sse2.exe 2468 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4260-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4260 wrote to memory of 1412 4260 batexe.exe 75 PID 4260 wrote to memory of 1412 4260 batexe.exe 75 PID 4260 wrote to memory of 1412 4260 batexe.exe 75 PID 1412 wrote to memory of 4504 1412 b2e.exe 76 PID 1412 wrote to memory of 4504 1412 b2e.exe 76 PID 1412 wrote to memory of 4504 1412 b2e.exe 76 PID 4504 wrote to memory of 2468 4504 cmd.exe 79 PID 4504 wrote to memory of 2468 4504 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\4BE.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\4BE.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\4BE.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\B07.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2468
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD596120993939f45494a2291ac005fc474
SHA1a3cbe6f79529aebfeeb7adf91dd6b9af72029334
SHA256238062b41bcb8369b3812623b0835fea1db60ed979c076477c0f9e4f50fbc838
SHA51204e8b936a4401d1f0fa77d89c125aac6d30e3d56142eb91ff8f4e89f12e5c5b27b619ba4c67996833ecb4571fdd4bef315279951a67b823f64c67ec71f121615
-
Filesize
2.7MB
MD5332200ccd1448fa590abe0528e2075a9
SHA185207998d4469b0b767def390b7d917147d57c2f
SHA256a00c62ddfeb533f6afa4b5f6eea330e0f5601e14292a673455cd245dbe9bd370
SHA512a1e5f8b83cb8f6f7de427fd4e3cf0c0d6de18b20bd26d7a3887ceb9af9c411aca4aa7d8aee854a6fe85196b2af1c6a4b6c9a1cb8edb30aef21bb923528037961
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.2MB
MD5fe56648939e7f8fe35bb1a37791d3538
SHA1623f7e0afd6cda5af7a9d78cd37a898c19896cf7
SHA2565256ca7376089af3c3899a2247d4d1c0da11d49332faa8982456e06d1a2e9fd3
SHA5121cc600c7d6df26006321b2e5a667125cc50c39730301a8534f4164b4d6cdc15aee42f13c9fb8869f06951941ecf7210fe9c3ba1fd1e7ab3b94564efad9f55296
-
Filesize
1.3MB
MD57a8306cf5af771db854182e351b74f65
SHA149edcab173544c2f2bbd9651bc3d17ac6c1a1bb5
SHA256a827f20fba7c295e72dc7320a6c4cf4e13f6b354476223159b9c6c41babd2a65
SHA512f18af3a9dcc0f46582e2bb9a81ab01cd2caca62f7051fed01ce1d32abf536d6716b04b3d4ade40bfda2d99dd3bdfaf9c069c9978f3056649b020b34dc8cc69e3
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.2MB
MD5abd1c5445d8504e718af063de7f9bf16
SHA17acd851d151fcc48e7530d5e753e200437c1c1a2
SHA256ac92796639ea4861afcb691b8ab69145b7640c55626a8fef2b5ae03664443b95
SHA5123c0ba863961623d38e6a9e72a7e73568b0f70f30a2e804b2f8831b9ad165c4fca148aa37aef26606f5b9336ecb1198c9757578d0051e8cc5bd297c8ba15f864d
-
Filesize
896KB
MD5f83929cce536e71a3a11e2236c2c6c5f
SHA1bd0065486a784f1c91e08ada0c3a8f383e23c874
SHA256f3c7a692875dec174d83dd723c63661fc9de1c0b6548fe3a3f8f8f2015507798
SHA512815083437ad5659626fba85fa9e31a33ba418d3e1d5f1ec1c7ba77ff5214618493b37821aae3b5b52838ad47f4a7e8c4a3594ee0f970025bc3ee425e9eb50152
-
Filesize
902KB
MD55f04ed428b29b004867b0c3ae499374a
SHA14273687c2975c5f71de5a591f720442219e68670
SHA256ce48c01c89760845e60f1b10104c9f079d7aac5235e41e90fd3e518d7ab6d85a
SHA512f3843157aa7e349b3ee48f2654a6d89f7696f62e6eb9f1fc403608f62a15df979f21ab7a92ceab926d6c1a6cae25fe8363655ce7d14e4a98e0c40c6980d55fa2
-
Filesize
856KB
MD5ab94b91239aa4ad07b8903f251708883
SHA1d8c9fd2cb166922113cb8e152b7d738c30d54cc1
SHA256672545c313f261665a29b7b122e0a7ae58c785c6dd6bfd45dfa2c5016f42b115
SHA5122bec64b38faf0102d59f466a84124deae6defa9de5f8c40d9b29052f56223ce896cf4c75efe0df8d08300edc0b8a455d19924bb952ecc767e7df05ff2f49c889
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770