Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
307s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
22/02/2024, 06:14
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 3196 b2e.exe 2204 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2204 cpuminer-sse2.exe 2204 cpuminer-sse2.exe 2204 cpuminer-sse2.exe 2204 cpuminer-sse2.exe 2204 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/3172-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3172 wrote to memory of 3196 3172 batexe.exe 89 PID 3172 wrote to memory of 3196 3172 batexe.exe 89 PID 3172 wrote to memory of 3196 3172 batexe.exe 89 PID 3196 wrote to memory of 4884 3196 b2e.exe 90 PID 3196 wrote to memory of 4884 3196 b2e.exe 90 PID 3196 wrote to memory of 4884 3196 b2e.exe 90 PID 4884 wrote to memory of 2204 4884 cmd.exe 93 PID 4884 wrote to memory of 2204 4884 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\44E4.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\44E4.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\44E4.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\503E.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2204
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.4MB
MD56817714e04354a199e62ac01b6e06f03
SHA166550d231ce6fd69a1c26ba144c42a848b1bc4f3
SHA25642ff8a648e686c200a1e06670dcde1f6a9cfc68502b22e926eb8c28cddd49e48
SHA51222047de875bb689deeede284a092c6fc23de6d1733413c5ca0ac25503b41c86c2374d5af5a9778620fe9b49d75ad39549355f273095bab65981213f49f1e2e53
-
Filesize
1.0MB
MD5f455360653bcccec8ff858b368872b2b
SHA1ae2e58f84abdb334c5e09e7eb29c471411970cbc
SHA2569f94fcd2f57e2aa8aea4c659ddbb559986a7e3f904455b727375ff126f9363c2
SHA512780e5e6336a3c7163dfebe4559c1c1002065c435554590af5de2ba35c6989caef77759011726344c3357e0521422817978227d1d2c8199aabd87ffd9331d0618
-
Filesize
960KB
MD5d15ecf39e70d4d6e278b0da9ff36ba87
SHA12139694bf96cc3b6fbfadb8a9c8745b8901bff6a
SHA25604b2e6191d36dccb7b93c7d207ff16c0702cdec9b64b98206f9ffc7dc7633d54
SHA512326cdd9b35aa3dbd39d2fd4a22dd78f732d481f05ef6dca085cd086d8ca91502f3be961b44e5c4bbf2ebf947ffc4f1b4d4703593951fce22acaa418a77741434
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
202KB
MD52c6f423cca54de7bc684a6ce324d764a
SHA1bae51c08b718d7d2d74a86e500016e65c6ceae83
SHA256e625977efa251a106aedda12561014cef4dbe54433b66828b267b2ef7466fb69
SHA51284ad3410beb7dc89b585eb3a20a0ebe3a635d926e26c5a444df8db56f1295073b34925f3a90f03850b4aac51f99fe7775f9e7dc87ee324fbc1f1f1f5d4befc8c
-
Filesize
235KB
MD5c7f1d53dbdfde5d8db95e1024352fd69
SHA12f0737e67174927b4968758bbbb00aebbe5d24d2
SHA2569c5fd6d7b8a9639bb12cf30290878a4c70dcd417cb0399fe4dc709fef216272f
SHA5129071c05c7af8e015239540b859e2b0f179a9e7c8d49acf6c708863d81e8ab709c72589bfae8a0505044958747f96bb6982faddbe39c92ec6c0cca7c2aab16e6f
-
Filesize
253KB
MD5834e16f05e2943f010726467a8661475
SHA17dd71b0c470c042aa660c8987e6b2b247c6c7bbe
SHA256338547699cabeb6138cc3f61d793065ff7fdd5ef42cb05d669bc997eb6e9cfe2
SHA512f742f93d614948199a56bd56c6c17b677402267006a22bdceddeb98540cd0c45a154a10e7a4898dc3853a95f5ab37dff8f1e35850458acd73bc2e86be527979d
-
Filesize
174KB
MD53a4facb6ff2b711765b82f899c3f9391
SHA183a0278e54d3c009329b82adca45c65b1f11505d
SHA2565f41003585ac07468e79ca36c01519bdd53c3fa61d5a67cf55f50a2507bc98f9
SHA512f1f2e0170997941970a4aa9490a13e7097ccd644f94065799bfce9d2b6d95212f6f399773932d59f3182e17ff33b75b853fa047b1a0fa01e0d29d1250dcab8ad
-
Filesize
261KB
MD573f3f15f2e7248849ab84b6a33e09f71
SHA1c6d88876bcccf9fe30747014029a0f11b2944457
SHA256cd403c08b6ee227db60deb861a5d6037488bb32b23d9878d74dc5072d7ac2b10
SHA512e7d53b12eb8652892f0eebb7f74f1d0733fe842d3cff053d5330677f8b67b9c8e92f49f78173a66fa288ef413acb175c0a5c78981f633f5b1b4801863c844407
-
Filesize
140KB
MD5d99835a3e656856255a1ebc5b1465fad
SHA1b687d265acc0be38848584b7abbb301818c9efee
SHA256b8a40ecc2b02e476f835c69dff71061f648e93cb6981227be28737d76038481f
SHA512789396308eac5d89367fd7fbb48aa4ff872b6b2a6d3acc2802c6d6bb185bb52cf31a7d8675795ae6929fcac6fe530b51bba581d6a8f54b34d71f2b99e51f82df
-
Filesize
240KB
MD5f959013252ccb83e8601c132842d1739
SHA1d780cefa82b87e84562cdf9b0683a605872429ce
SHA256b105af81007752ca3aed4a9fb0644f7f2462f0727bf1b96b7a55ecca641303d8
SHA512bde3af2201d316ba3525f2e677ff82b951f3c53ce4f7fc446045677e8569c7e9f3296b792e2fb8a8bf45b736492a81643f153cc663779411a5b930b35ad02ad1
-
Filesize
188KB
MD568335cabc14ccb76fc3face126bef88c
SHA1dc2884a0b6063f47224ac14b0be15f9753b60678
SHA256699df17f463018ab96888910873157579c6a6227127b6d98f38306e4dd57f19b
SHA512dc6310c8c1f4746157a0eace3f7a7648a5c870fb5479c06a150f8266078273737553227da49301e3ed10c10a20ea009af26b48b07c9962e20a91434c559f95cc
-
Filesize
84KB
MD59246174fcfe0ea9eeb9470e23c928d9a
SHA18a42694ae8db7cbf4caaa830ad5f8af95707c5e1
SHA256e78709b29eae2214a2b3fd359a34b0e5d78a61e99aa34e0023217b1b9ce544e6
SHA512d98e05cb6bffd0079efca8b4664f00d3149d387181bc32def637f0d02dd2da57596a969d2432cc6873a73f1c1d6f6ec2a091ad05773c05ec6322f6ab383cc6e2
-
Filesize
219KB
MD5f34ba234ab1ceefc8f3b3f2e81595639
SHA1830824cd4f7d92a7ed55545502d40cac840ef166
SHA2568a1caf694fd90e238301c2ff1de712f4c42c909e66a20ea22a62b7b72f8812a6
SHA512a3455e4b5cca5718e994624438af208b9672f0889ccb48bea6197f6658c323b2d41832aa98b1bc3cdc3e4d2b6a0bf2876a28619f8527e66a7550d9f5da47716d
-
Filesize
182KB
MD5fed0816a16bc6e3ea435b9b5801d7f88
SHA15c7023139c49644b8a8e329356ee99fdd466b0ec
SHA256ce6aaf3421f23a3e417834b7c4ff6975235383cb3e7e2d84b547eb6f7dabf47d
SHA51222991c4d99b4184a36055bce9e0011540236c95a8a6a3965ce5005fad12af32a0d033f4b581586df7f5096d6750f56b21a2c5c72893ce618399e0e06ae56d348