Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
294s -
max time network
293s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
22/02/2024, 11:37
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1392040655-2056082574-619088944-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 4900 b2e.exe 2480 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2480 cpuminer-sse2.exe 2480 cpuminer-sse2.exe 2480 cpuminer-sse2.exe 2480 cpuminer-sse2.exe 2480 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/1928-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1928 wrote to memory of 4900 1928 batexe.exe 88 PID 1928 wrote to memory of 4900 1928 batexe.exe 88 PID 1928 wrote to memory of 4900 1928 batexe.exe 88 PID 4900 wrote to memory of 2180 4900 b2e.exe 89 PID 4900 wrote to memory of 2180 4900 b2e.exe 89 PID 4900 wrote to memory of 2180 4900 b2e.exe 89 PID 2180 wrote to memory of 2480 2180 cmd.exe 92 PID 2180 wrote to memory of 2480 2180 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\5BEB.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\5BEB.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\5BEB.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5F85.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2480
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25.1MB
MD50b9499f42a5c16cfdbac7cee467fd08d
SHA1f8c26ffb23ebf53d7b15cbf56bc9e1b1798e80dd
SHA2569c4b58f7083b6c44bb515d59ae94da78fe522a4c7cbff4ca95e31050d87da953
SHA512f82447fe0b123cd5baadf1785f9a79ef23fe5b10a91093bfe2031216a6adc5d5e0c7c857f5473565535c8baec6f1eba5e9d1161234433887d22fa4e9fac088c5
-
Filesize
8.4MB
MD55f3f7bedef35e04f1546b2f13f025995
SHA1f8c46338b9437b04b0acecde33f065b5c375cd37
SHA25642e69bb7ba17fc855ea427b24a2c30a485afe8d6a4bfae98ae7b5ac284429f35
SHA5126983b8295cbce20cbebb3b6854f313c07335cd14eb52291dabd2789cc6b38dc1f5517dbc997f65949aef8a78264fb750959f062e0d327c0d940ca32162ecbc6a
-
Filesize
7.8MB
MD5de7057589fe3a6872fc1133117b4ef1a
SHA190aaf8890dbca3a51d11e196b1430dfd14d7c880
SHA25603066edd170957eff533ab2d234eda840c8d4c5eed0cf0c570b93a6b9ae459f0
SHA5127e1f02a54d3e1c752f4d9aa0b70dd478f71049b6ed5f1e8818a1b31536c5ed0e581adcb05ff36875e1019728cd262648cb679198e3c1f6ac17a2246bdcd6583b
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.2MB
MD52ee13b06b9232e674dafb91d955769cd
SHA14147caf05675ec29077fea1e2f9f366d253511ee
SHA25634748ecdb4ef72d4729ffc29f4f000a72fc7a31cd895fc99cca3e4b416d0c09c
SHA512ef8c83a177af9b633e2443cb2134a204239ccb7562c123a8622dfb8cc3b7a8139fad1eef46a863602568c009abc6d16e80e486d35f77199cd31ff7c63d00358a
-
Filesize
2.3MB
MD54c04147c386ba8792ac6a03069572a8a
SHA1dda67789fc1d0f2469ca95f01a5c81034853ca6a
SHA256c7739a1e940a282703d06eccda7110426d306f390e97fdbbd9df18472fd132cd
SHA512a8b5a0b878a9a7d30cb38feff814e1f4dce24d000158edc10a43ee9a89920bedf7adc92eb7e3913098b6aab7fbd0531f56fc09f508b5c2769992a94e55d153db
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
2.2MB
MD5e5b7a3618796e5fb5a91ea5c22f43f0c
SHA1045e841be0fa64f7397127fd727c55062392bd42
SHA2563294b1337c46bf37cb8d88f22f88f3f285b91e0b7b107f69e4b2c3a3f5edbca4
SHA5125d0d3ae4a9dc4fd50aa4e9efa44bed242f2fb0af14748d24a75e334e1c001705c3ad427825df7ae732e51c02f21f3010619506258ada6a105669d5e5624aa042
-
Filesize
3.0MB
MD5ab29a7e0b384e5d91e15d5c1f5fe3a30
SHA1814763a41ad1fff235194df92045d619415e2c69
SHA2569158f7a049ecd84d38cbeedad37471f57d4b83ae79405907a2be2f92eec5b26e
SHA51269d67562ea763486a72d51e5bdcc62015aabea05895fc0a56336826298e24f59f77c78f0f1997dd0768f45329f370b11cb75cb3afef702e7592b9e6f98f949b4
-
Filesize
2.4MB
MD55de1453c999922efbd818ae702574400
SHA1ece70cbfcb95c7b6124997346ffd1dbbb1992e92
SHA25684dd5cad904ed9524c258ce8d711f37c2cf9518e468346ae8a338d1eaa8949ac
SHA51255d1791c82ec743210ee5862b2d2af382bb6c2a4805f63c9b9db95c152c350ba0419bd5d3be9b7ce83f7c977c92aad1fd563d2a0199a6b2fbd26e649ef129820
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770