Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
299s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
23/02/2024, 13:12 UTC
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 1816 b2e.exe 4876 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4876 cpuminer-sse2.exe 4876 cpuminer-sse2.exe 4876 cpuminer-sse2.exe 4876 cpuminer-sse2.exe 4876 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/1584-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1584 wrote to memory of 1816 1584 batexe.exe 89 PID 1584 wrote to memory of 1816 1584 batexe.exe 89 PID 1584 wrote to memory of 1816 1584 batexe.exe 89 PID 1816 wrote to memory of 2936 1816 b2e.exe 90 PID 1816 wrote to memory of 2936 1816 b2e.exe 90 PID 1816 wrote to memory of 2936 1816 b2e.exe 90 PID 2936 wrote to memory of 4876 2936 cmd.exe 93 PID 2936 wrote to memory of 4876 2936 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\5A45.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\5A45.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\5A45.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5D33.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4876
-
-
-
Network
-
Remote address:8.8.8.8:53Request17.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request187.178.17.96.in-addr.arpaIN PTRResponse187.178.17.96.in-addr.arpaIN PTRa96-17-178-187deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestyespower.sea.mine.zpool.caIN AResponseyespower.sea.mine.zpool.caIN A198.50.168.213
-
Remote address:8.8.8.8:53Request9.228.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request213.168.50.198.in-addr.arpaIN PTRResponse213.168.50.198.in-addr.arpaIN PTRminezpoolca
-
Remote address:8.8.8.8:53Request57.169.31.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request0.205.248.87.in-addr.arpaIN PTRResponse0.205.248.87.in-addr.arpaIN PTRhttps-87-248-205-0lgwllnwnet
-
Remote address:8.8.8.8:53Request194.178.17.96.in-addr.arpaIN PTRResponse194.178.17.96.in-addr.arpaIN PTRa96-17-178-194deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request29.243.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request190.178.17.96.in-addr.arpaIN PTRResponse190.178.17.96.in-addr.arpaIN PTRa96-17-178-190deploystaticakamaitechnologiescom
-
46 B 40 B 1 1
-
8.3kB 9.6kB 85 88
-
-
-
-
72 B 158 B 1 1
DNS Request
17.160.190.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
187.178.17.96.in-addr.arpa
-
72 B 88 B 1 1
DNS Request
yespower.sea.mine.zpool.ca
DNS Response
198.50.168.213
-
70 B 156 B 1 1
DNS Request
9.228.82.20.in-addr.arpa
-
73 B 100 B 1 1
DNS Request
213.168.50.198.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
57.169.31.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
41.110.16.96.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
50.23.12.20.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
18.31.95.13.in-addr.arpa
-
71 B 116 B 1 1
DNS Request
0.205.248.87.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
194.178.17.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
29.243.111.52.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
190.178.17.96.in-addr.arpa
-
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.8MB
MD59d4c56e9576b45990064135945b365e9
SHA1d56f97e78221a180681c800808723658b4346e92
SHA256ed4fe235c15deacf2c09a4e3c89ae05b21badeaa849d1b80b56bc4ef1e7e9c35
SHA5123acf3a9c9367f9719fd3bb701616ed1451ebebd122b3784ad97deba1c9c945b056a4a651ad53b90b441898f23027087411ae1aa8fa431a0847e1178245c5c891
-
Filesize
5.3MB
MD555f4d1ab3a493fb8888a704a6a3f56a1
SHA1d3510b52f3b9ceaea3605d5df8b5875875491f18
SHA2564b584fb2fb80a4c00d049dfe3233f1d05bb51692adda861d1ec5c45525c9f59d
SHA5120b42c6b338a657bfd923162e7ec4cdb7d9a7f65348b461f6182e8b134443cf8538212b23e790c5238053d78c75441b4a0d3ba063a1a865176a750be654a6b018
-
Filesize
4.5MB
MD5861cd6263e484eeb15e87d8050535204
SHA183dfd13f08f185b06ccaf25941bebbe38f8a4842
SHA256e43d286e67d7d042bd6e74ec6c7707e94d0648e538ba9bc1283c4b9abc73e40d
SHA512022c14121932b8660f327d250caa4d0b24053099dab2c721d7939f14f8906467164246064c00643b3f70285289d368b781d8bed1c27f484c11b458bd168b9c4d
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1.0MB
MD58d9e20c13f0fdfa40219f839681ea376
SHA1cdba61dd8fc2714f52458f75ebb513ae9637e4d5
SHA25636ae04e4f6a963077a7cefad341bd1377c13babbf4a4693429b264a9e4bb3acb
SHA5121a27ab5da0688bf60b80f6fde16157d5d17743c4cde734b245236f5b3f370b9adfe78676830ffaf71a7515c3d53b436d13481ba608e73bb3d6ed4b65108ae32f
-
Filesize
1.3MB
MD5d61d5e12ed95d659634827f54bdfa62b
SHA1f549af187c05e420e3c4e2d4be1bf89f102d176c
SHA256ea6b005c69f38280e94ba0034175f3448ccd53910390f2214d26945cf3a50209
SHA5120ea81cf059b55d09b4aecbdbe070e0d43256ebccad071bd0f3546610264d5511f8ace0c588a4c08343757afb6ed1e99942149523dadbf53504658ccd3b7235c9
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.6MB
MD5384662d9963da800834bf8ff15409a7d
SHA1c02c5932197d6cd3d9722f2d454138dafddb759f
SHA256485bb4e29e26f1bd9450097b70c9d12d6160dc5505d8cb1a1e0733d84a5d2584
SHA51223d48a79f361cd1b0c1f03ee31839c6e9b489bd890995d66e74ce4232cc264ba799f254baab85b02d8cad9e358547c8fca2731cfff4bbdb627af91002ad99da9
-
Filesize
1.1MB
MD5930387eed0c094dc5a78627248df2cfc
SHA1376caac0b5c96b7128a59e272fd4a4e0cd8f6edf
SHA256037d2a4bc4afc56fa10257e46540226d2a4b4906aaa8caa5e3bb6250686461ee
SHA512303f0d9f9a880ca0d57334f7d2b222959a67394908560a4c92a2acb3f96cb9208010fe88cd6cf87657bb39f2cbb488be9ebeca977c582938c4f8a713a0f47730
-
Filesize
793KB
MD57e541e9d0a634314dba7954381d8f497
SHA1c035195a06d746e42db530f377fca42fa380d972
SHA2566f325b481a2a59188922aa5c9fecf209b0ee5fdb1aa7822b28969b96d739f78f
SHA51222b8c30f78f42c50101fd747fa190a663356285c02d998bf7b9156915bfdd90571389ecea8f4e3fb0eaee301fe0fa30f89f122127b58bab50879baeaab0b2447
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770