Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/02/2024, 13:44
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-en
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2312 b2e.exe -
Loads dropped DLL 5 IoCs
pid Process 2212 batexe.exe 2212 batexe.exe 916 WerFault.exe 916 WerFault.exe 916 WerFault.exe -
resource yara_rule behavioral1/memory/2212-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 916 2312 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2312 2212 batexe.exe 28 PID 2212 wrote to memory of 2312 2212 batexe.exe 28 PID 2212 wrote to memory of 2312 2212 batexe.exe 28 PID 2212 wrote to memory of 2312 2212 batexe.exe 28 PID 2312 wrote to memory of 916 2312 b2e.exe 29 PID 2312 wrote to memory of 916 2312 b2e.exe 29 PID 2312 wrote to memory of 916 2312 b2e.exe 29 PID 2312 wrote to memory of 916 2312 b2e.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\6ED9.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\6ED9.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\6ED9.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1243⤵
- Loads dropped DLL
- Program crash
PID:916
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5f464b6e4fc13772ccf5dfd17a449daaf
SHA13412a562838c57f704ae40a2c4fbba5abd60d27d
SHA2560aba3c5ef34a27fca1e3333461908f82f66ca92f2fceb85a1e627e68ccce4c08
SHA512c8db982351a57fd08700461098ce46e72d4151b27a533e1522b219ae954bac12a66da5b95936df6a3ff573b8f7a3c6baa63338ff53e901a299b4751517b79120
-
Filesize
4.6MB
MD57d7868459691a2c328873b785a431e5c
SHA16c3ff9e0d21a95df0900c498d1bd6b29b6a780d9
SHA256fc1461f288f8798085b382f92a49c1f41127d18a15ff96d5c772f58a34c032c5
SHA512e6cd8ff58d9b05ea241678f213047b679b1df9787d5f3608015764a4bf3b46bfb6c76e6b6c7407cde0c1200d5c95720a602a857710b3fe615990f4cab5269b63
-
Filesize
331KB
MD5468261090ee9f344b82af5f3f203ec67
SHA1985001f38f221e7fb1b35d9194e3d36fad0b063b
SHA2562c085d47e87f6a396efb96808f668f4b57c099bdebf62048d58b2887bcea53a2
SHA512f2cd259856b8dc95ae7a222c8a063c4c2b573ce4a3238d272fbc67637e001063bf3ff741b50a8253b38b16eba201e631a1737e27f3628204716de7fe8bd5b941
-
Filesize
576KB
MD5119b67967e9fb70b35b10846a211451e
SHA1a53f0b93594f8a1a98dbfc74d9618e75ae25fc0e
SHA2564cadf7e8122358ea260269b67f2c45abd114ee61349ac9a859f26ede9cd873ae
SHA512eecc92eaeb53ce2bdd5ebaab56ca3a6b54f8eb1cf789f3af972ec2d0a16ddf2aedc08bda97f7dd765ae46f9d506bc397dc2aff1f9fedd74e3e042bb48459ed5e
-
Filesize
42KB
MD5f617217da7d5b32711786e02bc114045
SHA1b10f54f48ca26502ed5fe8aefcd2e75e0a0deef4
SHA25684e34ca3918b29d6e8bca22cd17858c6def01165d118e98ddc82fb93540ec45e
SHA512012a83eb03c9a28596c825b044fe821379cf441da3486e54489d8faf900e1ca61ad13883c25ff2a83ce29ab88952d164e416633064b824468e20c18b1f7f84c6
-
Filesize
384KB
MD53c0bec088d86bb620c8b42308d6098b3
SHA1f486f2b80f76da0966fb3ccbc33fb96a4f890835
SHA2561dfda8d76528af8231198a0ad4cbb09b05155c5e35f565ca78f81db527841d07
SHA512bc4a62dacaf7990d21cc1bc04412acdd80659371fb4205065e0e917885076be8615d766f6640683642603c1c0e551efde0236acb3d6a772dc1af263cb1627414
-
Filesize
5.0MB
MD572d9b7f2eeac27d69ac861be4a4e8fcc
SHA1e5be26aac105e0798572e5b201b4a91f1299586b
SHA256977b567b21ec9f5f89cc8d11b70be633634a1c9953f34b206059965a548de849
SHA5129b5a425e3cc1b971e776c477625d5e14aa397ba58f0e631ee0247a7b633c49ef400047a0508b897e4ac1ab9b6eadd26436e75f21dc8681ecb62dec47ebb98dd3