Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
296s -
max time network
306s -
platform
windows10-1703_x64 -
resource
win10-20240221-ja -
resource tags
arch:x64arch:x86image:win10-20240221-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
22/02/2024, 14:55
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2984 b2e.exe 2244 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 2244 cpuminer-sse2.exe 2244 cpuminer-sse2.exe 2244 cpuminer-sse2.exe 2244 cpuminer-sse2.exe 2244 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4816-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4816 wrote to memory of 2984 4816 batexe.exe 75 PID 4816 wrote to memory of 2984 4816 batexe.exe 75 PID 4816 wrote to memory of 2984 4816 batexe.exe 75 PID 2984 wrote to memory of 4440 2984 b2e.exe 77 PID 2984 wrote to memory of 4440 2984 b2e.exe 77 PID 2984 wrote to memory of 4440 2984 b2e.exe 77 PID 4440 wrote to memory of 2244 4440 cmd.exe 80 PID 4440 wrote to memory of 2244 4440 cmd.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\196F.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\196F.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\196F.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2064.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2244
-
-
-
-
C:\Windows\System32\IME\SHARED\imebroker.exeC:\Windows\System32\IME\SHARED\imebroker.exe -Embedding1⤵PID:1216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD596120993939f45494a2291ac005fc474
SHA1a3cbe6f79529aebfeeb7adf91dd6b9af72029334
SHA256238062b41bcb8369b3812623b0835fea1db60ed979c076477c0f9e4f50fbc838
SHA51204e8b936a4401d1f0fa77d89c125aac6d30e3d56142eb91ff8f4e89f12e5c5b27b619ba4c67996833ecb4571fdd4bef315279951a67b823f64c67ec71f121615
-
Filesize
2.6MB
MD53558f45e2ff5599b7108f843b43391a0
SHA1bca0a9a2f7ca2508129b3e96bb7d86fd1741fd3d
SHA256825b10711a637d804657bc936f545f69426d33befa971ca9ad89a0d0d066f984
SHA512a2f6fe5ac53b225916d37537fe2ccfc5cd04f1fe8525490c989085d8b440983cc300335d8929a537990986f2cf62750f567235d7b688829cd612096e8f7c9b72
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
109KB
MD57f54c185bf71d5b671c1a033d5411434
SHA119f7420fed79be5aa13cb5135991c286ec1dce09
SHA256a3b1bd5c2dd295c233703af03e291c2084613538e4472422f50b5cde5521532c
SHA512fb8f8fdd457d5d3cdbb688df859992e221092149e5995be69fe887b1dd0b9a4f8ff3fc5d1a15ff99a6856e8535d66fdeb28cbb11f45699ea6142969bf864486d
-
Filesize
82KB
MD53f3cb02c896b1b8d924b7003a2dff9d2
SHA1e6faf9e274067adf703077f3d8a8aa2bdf37ea28
SHA25602b909e6f80f8720ec73ca548498c80376a8c8938487ccc18a85bb3eed5bf36e
SHA5123c6666adccdbb9936a8b6096ddf6a72f90e884b27ccafce51e75f7cce14f9eb3f2607fc3a8f3a081562ce950081505e668a021f96f79e4e6539a66a0bf8a0396
-
Filesize
111KB
MD59f58003d43ac1b3b184abdfd61f6bec8
SHA1dd8261d7f7cabb5ca227b9fab69cae7005547eb0
SHA256aa979e8adb086235520e04316225bb97472500d6fbb3848cab439795d463f6bf
SHA512d64714bcb6b8588df2f908141be5b32ae2456d51fb481e27c8650f6f6f1bbf11545085888d0e88bed76545a786e54f6d4215c8899064a6591fc9b96aa4ecd7cf
-
Filesize
85KB
MD544745138859fb014b7e22e3a7651429e
SHA191afd353134156a03a5eaf62279ef0b952e00c44
SHA256c8cd2012e63962fba34af69a0fa4875d23ca7031916ae029ec2f9fb062bbb5b7
SHA5122af662cd905d13ef0f3b6a79870d96d902c7c0af0a0e464a8d0b7f2625169898a0c3490447177d2c910821cd0ac43ee5bf3b67b4b6324f395254c16fe641c556
-
Filesize
92KB
MD5985a1984bb6e4f9101752ad080c2dc61
SHA15c0222ff43aa30f6e6e97a04d0a36f2f1107e95f
SHA256336faf2b589da906b51ff84ac281b7ab2502b48f5cccc6c826bfbbd51a8dcd04
SHA51244728c5a4ab5c2fadf8ea209bb6f543111427a4484715f6f62ac52126f9033bfebf995a17552c4cbfaec49ecfaeb79ce8cf083a97e2ca7ada63eeb579fe01266
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770
-
Filesize
664KB
MD56e2af4c348efd119225a56732942ed9f
SHA1ba7526ea6ccda0ec32fd7ab9a583a42fdd0242c6
SHA25612a5ea1a88aa881ff9db52a73ec3ce630055ca5fbac1075aa3185d575984aed2
SHA512449c67c272b1bc204c45ff92a636b33bd5a9d931df6558c19f6077ad8dd13eb15549983b46143a23e2f5f610fd5841f81b828856ccfc12a9170f94212b6bc34a
-
Filesize
941KB
MD593b066681e230cb56ed71a4fe4c70dfb
SHA1e9fc5f104df2f2e35be28a56eb370a74626de0e3
SHA2565f640cab626469acce78521a15e16c56b1a08118575ec865212947ae71fc2d1c
SHA512cdd2710f96ce3a3a27698c9f5d6d0403e9bbd7ccb1f05cc14921d4bdf891795c49b8a9e7018e99afeed19516df61abfe734cc031e03d162204405aa7a51ec872
-
Filesize
718KB
MD536398ebccf3509ea10fe6c6b656e1310
SHA184af6c118d922fbc774f8cb8452230d82dcf5ea8
SHA2564469594eb8df8def9b3af591e333bccd78a59182aff301ba983e4bacf8c43d68
SHA512a1377f67e7f81fd42d849e0d338190a15f345cee50d970557727cc2f985cadee74e8f23c7de090f55cbac6e0618e8f9c2ea2e1582a9ed92b25ed93c2df346cda
-
Filesize
14KB
MD557bc28e77ba7f02252d5d1c6ebeb7e33
SHA103d31966e052d14ff5f92d69ceacf8fc886e003c
SHA256094b3dcb3308d87ee8c065d27dc1e0ee818c68d37312bdbc03af9c88f20914aa
SHA512c11bdf493da9bac705cf4d31330ad4bfe2e93c5aa6c0812c47906645e441981880cd651ab20b53e0e9770053d8e3b5a7acdd515ec74f6e16a8c2cdccf49229d4