Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
294s -
max time network
297s -
platform
windows10-1703_x64 -
resource
win10-20240221-ja -
resource tags
arch:x64arch:x86image:win10-20240221-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
22/02/2024, 08:00
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3800 b2e.exe 768 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 768 cpuminer-sse2.exe 768 cpuminer-sse2.exe 768 cpuminer-sse2.exe 768 cpuminer-sse2.exe 768 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/3444-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3444 wrote to memory of 3800 3444 batexe.exe 75 PID 3444 wrote to memory of 3800 3444 batexe.exe 75 PID 3444 wrote to memory of 3800 3444 batexe.exe 75 PID 3800 wrote to memory of 3100 3800 b2e.exe 76 PID 3800 wrote to memory of 3100 3800 b2e.exe 76 PID 3800 wrote to memory of 3100 3800 b2e.exe 76 PID 3100 wrote to memory of 768 3100 cmd.exe 79 PID 3100 wrote to memory of 768 3100 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\7ADD.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\7ADD.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\7ADD.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7D1F.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:768
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.6MB
MD5e3f9ce8f8db18e32f980e1071416f10b
SHA14c790d544272e04e13ee263b06334a3fc3346ab8
SHA256134d938e80312eb906077fc5bd14d8adbdb79ba5e2f8d332ec243c57351f1c94
SHA512ffbbd5bdf99290b6b949ebe8a5da07294f9990a86f7eddfdc1b9e3c8955702cfbdd140b194c5ee49243ec1fbb0a0ca2a1d52af15129dcfaa243c0e40aafb2ed4
-
Filesize
4.4MB
MD5034b7c80de8e383d75bce172333f6b59
SHA1a10e6ebe4e2927f306fb6c6fd167cf54452674bf
SHA2565e17cf3a22239a8f1fb8b3b37b6722f705c274a618db2e66dee73ce27836f583
SHA512694ec9f94beca126c8460c4fc1a6346f495dcfcef83f48a79ddbb1ff10b3ce065515b505382e1b2d26b9a271a3eded2522120c3310235d0e06b89cbc57257408
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
993KB
MD567a606f7bf07530dec1de88faa724f5b
SHA1730d8eeaaca473a175f2227c7c64ba40958ae3d4
SHA2566d4b2e108cebad3edc5a675cf4a9ff3f8872843bc110eff3f5c580c0099bfca9
SHA51220c5c3a16b980f75fcdd093f6d3aa9b6d2f58270af926fe0a19a3f6708016aa84d8885682bd5ba263723b2b3d08f5a8c0d8b1eca074269056664ef22913af6b3
-
Filesize
806KB
MD5d0e875ea51687f2a10a739305ab23ddf
SHA13fea1fb88a1c64edd98576d8665985b0b4f43713
SHA25604bfe3b82f9d7c9f14805ea50a54acba31ec69a0fbc0816146716e64c3046b5c
SHA512a22159ed5666acb7da47ef96eed9316377f3ba8f93b8abfdb3b00e0c97509f86d27063a04e8c056cb130405f8486f3749b916806e4b8cb324ae7d1a7dfd1c2bd
-
Filesize
623KB
MD5baca7f2953bf0522b0ee2488bb5ccd03
SHA173572f0499b89edab1920bf3f10423dda904cf56
SHA25642a751f93a84a122148c0e87509ad8e57a4238de4b50ff52d7db98920600ab3e
SHA5124e0faaddcd5ca5863cc3938eaa2e15d6e42fe678091a0cf1a7fd4a1e3f0aba965b50fa38fb685ca55a217101423b239efc5def67876666e2ea399543eb687d94
-
Filesize
960KB
MD5c04202d27a40019b6a699c65c9a0ca4d
SHA19af641c8b836c4523ba780e09954369085e73e28
SHA256e8acfe0c4452c40ff32ba0fa7dac6b8374e9e895be2af35dde5d59e72945a35b
SHA51279c5716eaad6d216871478ee40adce25a762bffbaf0771a9057cad2e54a4df025035cb7d67f010026eba564790812c4659a261506caf361441d31661cf9aa71a
-
Filesize
734KB
MD535d76b05583075c674c01dd18129a1dd
SHA165af01afc85503308cff4bec98dca835311b2d4e
SHA256cb2d70ae4d530a54425c3d6fb489aedd9463194747d04280bc1c8bd7ed6d3a97
SHA512c270ae18088ee05fa5a4a851bf2a297bab6666ec535bd6e5f97dbbe20f253be3904b7ae2787bb489bd77f110e6362023ac75fc2d15e43f462072118768fe139d
-
Filesize
583KB
MD52d3e9fb7f126b12e48a3b68c9276b49b
SHA1038385cce5da82e81e80016b2ba54c6418ac602d
SHA2564e187e6bd135ba3fe87efa241bf85f4b6f1e86cd670deb7e5f638660fd39bccd
SHA512d9d675ca11d96d157d3bfc0121dd041bd2b30885fcfd46cb7909b1c2f7f163fe8267830bb299f5e6ba3d0de931f49deb43a0a9fd520579f72827131a110d0aec
-
Filesize
523KB
MD58ebe75a6e542ab03fc9f35a6eea1b931
SHA123f508f27851a2e855238f6a0ecc73f36f338e54
SHA256104a87c5b659485bb20f5ce2169938a768fa4e2da1d19e224b3cf4f31159d9ca
SHA512487d73d590e82074a2a247b51eeb4d1847c9f06526fe99f0a58ad631d6f90563e039c065ab4de0e46075bc2b8abb701633ec110a57a939a2218fb09346587c49
-
Filesize
732KB
MD5b16456dde467767c6e7ff290a7a40081
SHA1cd9a981794d5637ff7b2dad2712bf37af34d2dbb
SHA2562b95d1ac8746156b4c3eae868f58241046153f27ce37425ae0e8fdeb75a4b35f
SHA51295d53a39adf95df2e3e3d6414fb0b6324903e3c2c3243a128b7314887b161f2f4b3a760a7864dcc267bc1f1dbd41affb2bafe23b60d5b15048d529d266b607b3
-
Filesize
534KB
MD54125163929f8d999fe3fb11d5c2bdb6a
SHA112f6de0f25050ee3fba92e21490a43f332cf05d5
SHA2568e0d99f6478501ba31dde0287d2e2f22e8458b6bb5259c5eabbbce07b9fa2850
SHA5120999b10da0f4ba2002145973317e1dda0579845a0c0f3b764ce49008cfc215c186c891f609f8f7773cff0235ad9ee4301f2860fda9e91b5ea7ef5f3f46d3e139
-
Filesize
521KB
MD5ead61314c2d294c494d2ba6f768cd10a
SHA10705ec45d854891eb13789a823f88b80eb6672a2
SHA25627c024e6d0193d93ef1246851d0cd49a8a9a87a097ec3f1db945c6510fcc6a99
SHA512d5e62d44c9d5727fa1d3827c505240e20d2831f26549489905355d271eb45c6aae2483355654fc7bb087eeff03b9548e2fa4baeb9764ac348058110e02102ded
-
Filesize
390KB
MD57b022a992f07b0d662b6d84febed5253
SHA182ff58f689860933bd74a95ca9b3f08c0bdcebe9
SHA256eddcc241589b5b288f080ea517341293c773a2fbc01b4bafc25016423084fda2
SHA512928017cbb9324e7a3ac141276c3bea52594e11a89ad4e09f4a707be7c24edef8880b0a69f9a794509a5fd17111fd8f37a3b2e621365c32b433fc52d8611126b3