Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
298s -
max time network
306s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
22/02/2024, 13:01
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 1548 b2e.exe 3400 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3400 cpuminer-sse2.exe 3400 cpuminer-sse2.exe 3400 cpuminer-sse2.exe 3400 cpuminer-sse2.exe 3400 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/3788-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3788 wrote to memory of 1548 3788 batexe.exe 87 PID 3788 wrote to memory of 1548 3788 batexe.exe 87 PID 3788 wrote to memory of 1548 3788 batexe.exe 87 PID 1548 wrote to memory of 5232 1548 b2e.exe 88 PID 1548 wrote to memory of 5232 1548 b2e.exe 88 PID 1548 wrote to memory of 5232 1548 b2e.exe 88 PID 5232 wrote to memory of 3400 5232 cmd.exe 91 PID 5232 wrote to memory of 3400 5232 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\9C11.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\9C11.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\9C11.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A5E5.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:5232 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3400
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26.4MB
MD5236901e4e8d6b58c9955fbb528e7b2cf
SHA1e36e8eb9e09169254b71d79f6dcddb629957e0b9
SHA2566ff4eaa97db8ffac9cc5fd5d4091b0c55b53664a6fd69b75c4b91c633027dd55
SHA51235b1de91d68aa808bc01448b72623d87a01eafca5eea71dc3a86034cb4b2e2f02d641b8023318aa7824508f3452251fabf0452808deae3aea9055758ad7e8368
-
Filesize
2.5MB
MD59268ceabbc5078b8f7e271996a48eb9e
SHA11a776fddb9575d7577a4df599ac7eb037ad96d9b
SHA2560ca13087d6ca50c39f976ceb1aae64e9a1c3a988bd22b8b105f72457e4417452
SHA5121422598ff0a75cab8fa0657f9f6a22ee3ec2ff2f8854ca2cb208b9e30111ea5eea55f673cf4baf06808db0305d3ddd5c00af45917f88a10518278aae17ba5745
-
Filesize
3.4MB
MD5b128bbd6d4d59598b7f14627ca22cef2
SHA1388301197fa47d178e68c53699353fabb626d729
SHA256d32ff7653432f41299475a0fcc5d4091154950815d2f33edd22b57214ca5ec15
SHA512cfefe8ccd67a6884542ebf50a4913b89dd2c1510fc693387b8878a0565b22a10d830324c42549bccb2a292711659f7b60d288fa0bc7c9e64991c4a6d566f7f1a
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.4MB
MD52ef40d5c3b964c66392be6a3db51bf84
SHA1391a644aa11504129db4b42007b054f2c3bf5414
SHA2560ef835e2576ba8fbfcd733a66284579607cc8dafdc2b26fe3c0091dc66d8e707
SHA5120b568c8b5ef88af49c00801cd5eaf3e7262367d2a3356f1a685d36e3c1dff63babb5dd049d5a1e7fbe214cab35e6f271d0a105e073a1fb2c281bb5c0279b7107
-
Filesize
1.5MB
MD51a23ff0dcc9db537f1c6490682c13b1c
SHA14afc1a8daf61cb58ecfffb8e6a90973a67ba9dec
SHA256188fb6d9de9bc5978492fdce4af6f968e1f0407d513e3d15a20ad19e3eee3fec
SHA5123b9cff7fded5fdbda2fe4114eb5979eab716a86149f5d0ebc665ba292585941b815d257eff6fcf8b3a6422a438c9d0dd0b77883e4c30332c4b64c7b2883cc00e
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.1MB
MD58101fa4fd537d3b3ba5e585a847fb1d7
SHA150212cb9c25f4b4de7ab4b909bbdfb3443a638ac
SHA25691d8e30da3a23fe0635d97ccaf181afaf6991b7b62d31c786741eaed94bafe2a
SHA512843b808916ea67b903b08e94bc3bd58bf5f71dccb10b22e45deb443a34f67aa8b0061d62294b5471595a20fbdded6283f7ede0d499f1501b67b6e8ad88f8539d
-
Filesize
1.3MB
MD5554ae7880a43e46635e721bee565502f
SHA1eebd2f178309ab04d8168e14a8bb20aeb4860f88
SHA2569244bd63df25837c8cd07b1d439dabc7bfb48d9f0631f6164c06e789105bbd40
SHA5124fe91892ed482f1cfd4b4341fe05d02799558aaf434271dbe4b655afd5dad4de172c50f3d6ee1ac6850bedf3562842174a4508ec6d491884757772b8ba8c6169
-
Filesize
1.5MB
MD585009fbd9983b5cf4f13aa1aff58343e
SHA17b9052ffabc8397159614b24eb71dfd9b15ccd62
SHA2561408f55ecc124d91ca515c4879a69a8f48bcb2a6cebd6cbf965cadff8e04d94b
SHA5128c7db1258cb4b93a02c092a8f28ddf1f526c45713a6e1b737a0dddfc237fd17df08c4ea6154eae843b5bf847f918ec8ddb901dc17c01b860f25c0b77094c6359
-
Filesize
1.1MB
MD521291d8211c1173a36566217873888fc
SHA1ed725822db2a2c46a4f0c034c510ad7c64e186f0
SHA25637c9382a3b72a473f37ec3e189895cc1edbb2e753c51a5e93ca920e10872cb3a
SHA5122606de5005a4e1e2438aee5e865915c71a9a3a7f764a7bd55c7488dca54f31a5951e2d6ffdfc4253543680e00b1611da9b7684e7d311661f1538d2542a15da8e
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770