Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
294s -
max time network
304s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
23/02/2024, 15:56
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240214-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3316742141-2240921845-2885234760-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3316742141-2240921845-2885234760-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 4032 b2e.exe 3408 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3408 cpuminer-sse2.exe 3408 cpuminer-sse2.exe 3408 cpuminer-sse2.exe 3408 cpuminer-sse2.exe 3408 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/2796-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2796 wrote to memory of 4032 2796 batexe.exe 89 PID 2796 wrote to memory of 4032 2796 batexe.exe 89 PID 2796 wrote to memory of 4032 2796 batexe.exe 89 PID 4032 wrote to memory of 1124 4032 b2e.exe 90 PID 4032 wrote to memory of 1124 4032 b2e.exe 90 PID 4032 wrote to memory of 1124 4032 b2e.exe 90 PID 1124 wrote to memory of 3408 1124 cmd.exe 93 PID 1124 wrote to memory of 3408 1124 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\8EE2.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\8EE2.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\8EE2.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\92CA.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3408
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.7MB
MD527b16af158bbf5a68e991b839013c35f
SHA189412118868d7e05d7e23867917cd075f651f768
SHA256701805a2a0c4479f626d75712cd98391c78a8145377fe094639ad2204b3c86b9
SHA5124e79530791896cb4b46e6197e155ef2a22212976539ab321146bae76c6e43f116fbee9ade5bc2ae65758cd6bad175eda2f81ca5fb022bfbddf67cad761b2e328
-
Filesize
192KB
MD56ac4b534a8945150025756c2f85dd2d4
SHA14f8633cd78b9248d5885e75ff1b26ef27a196ad1
SHA2562e07e008a86c33e31905b1f49b18245261ad08ed3463c6750d63502e1e20e43d
SHA512303f0cd104441235da58583af1597994df43d0a2d55d6245e89fc7d8f2509915525925277636214722e922f2939c93ba95627d54a18105d6cfa8e606b2f3c172
-
Filesize
4.8MB
MD56fa4ca1bf9d903b1d8d1bf0429139f97
SHA1e79cad615e6ab83b53d0f8f2b132dc382cde1ad1
SHA256a2bc0dc79f6093decca1777b20028adb3481c6d8298bb6798dca23105f08f0bf
SHA512342430f8841ad4784f39b4c2b5782100bab469df781c8b4fdd9bd198bb0a28387fcafce75f2282b84a0bff46345bdb82f7a91c28e026291e76cde0769f70208e
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
2.0MB
MD597bc3479de3388901e43a7fe2bcf192b
SHA1540ccf12d93c42bf303c0ebc07f5c44dd30e1cf7
SHA256a8b8a7524d39dd0e7ff79e37dc7d0347c934c9b43ba7592a2529107a3acf8497
SHA512030d5386e088022454c71de4ecfc955e1d66e112dfa2a5e6816aeb39673be5874726168142e0d8e8fe0b1167183f2d7ace6c4e2bcd199d9d0563500e28c09730
-
Filesize
1.8MB
MD5fe0222e1bebea17d9f025235c083fcc7
SHA108bafd34cfa13552b7cb3e11860cecf40df4b232
SHA256d92c6365141e35b686f838eb3ab17365439188e16cfa9434767f5081b4de8152
SHA5125697e66c3238e766937835754e0f70386fbe0c81de94769bd514092ec5dd89ab0723895854c2bcebade75d5b43490cd41f904582326474e77331de0e15dde854
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
1.2MB
MD57cf672bee2afba2dcd0c031ff985958e
SHA16b82a205db080ffdcb4a4470fce85a14413f3217
SHA256c82f84171b9246d1cac261100b2199789c96c37b03b375f33b2c72afab060b05
SHA5123e90d1c1efe0200cb3cc7b51d04783a3cce8391faa6ce554cff8b23dac60be9f8e4f980a8ac005fd9dff8ea4bdcb02311f7649c5be28eb32dcc26417fc4090e5
-
Filesize
1.6MB
MD5f6c76fd045c2128718456a1e23f1e703
SHA172ff506d03d8f902183fc9ff897c888553f39579
SHA256ec24c7118f61abb7a15eeb02b75ea80d2d58ec74a70462428340cd1da5d79f1a
SHA51220a62264636166ef468682da0f12e24975fc2a95f95683e32856619c54874b50e7bec9aa3b06fa091a78b4da5c3ef774624d36901efe5828d7283d24c7ec9a15
-
Filesize
1.1MB
MD5da751627b2c5cee2c9b6ac81da96333d
SHA1722a6ecb8c22cf3da09d7bc6be6c5593da645226
SHA2560461fa9d36b1469549fe55722164bdf709afe1b7882520ab2145aae496c52aa7
SHA5125f641690d397e491ce9e19ef7d4f1970940d0dd338d3f61bd7895bb64f7d63432f7c26cae8355c368fa012fffe8a98e45eaf891bdb75de73daf5480638686620
-
Filesize
1.2MB
MD58755ec2872581a9f5d44c7c4079723eb
SHA1239c7927e12c94595e6de2d12179afb53d18433c
SHA256dbe2283067f79daba1430738d11b756a546893de87acaff9c1836841fc7f570d
SHA512577d8220c895ff1e669fbccc78827901ec2497eb735f3d751ea5fbf26cf5db754e3e37497444c85ea10f444e18e5c638f33f7a86022be20124de41d2f6ebc7a9
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770