Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
296s -
max time network
303s -
platform
windows10-1703_x64 -
resource
win10-20240221-ja -
resource tags
arch:x64arch:x86image:win10-20240221-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
23/02/2024, 18:32
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3880 b2e.exe 3364 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 3364 cpuminer-sse2.exe 3364 cpuminer-sse2.exe 3364 cpuminer-sse2.exe 3364 cpuminer-sse2.exe 3364 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/780-5-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 780 wrote to memory of 3880 780 batexe.exe 74 PID 780 wrote to memory of 3880 780 batexe.exe 74 PID 780 wrote to memory of 3880 780 batexe.exe 74 PID 3880 wrote to memory of 208 3880 b2e.exe 75 PID 3880 wrote to memory of 208 3880 b2e.exe 75 PID 3880 wrote to memory of 208 3880 b2e.exe 75 PID 208 wrote to memory of 3364 208 cmd.exe 78 PID 208 wrote to memory of 3364 208 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\19EC.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\19EC.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\19EC.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1F1C.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3364
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
896KB
MD51f22d8bf5f6c3dda3e880ea1ba0417d4
SHA12a8dbf2319999a894714bdea650eb5be32c64c19
SHA256afb7da96abe31529f462178372c48627a7e681e3c18cd2196aec8beee07f5b96
SHA512217b89f6a74039807c135539482b1a769d715190f7756e2b0162a33da3d8ada909b80ca3fc1596e542f163f6a45726282997f4e52a36c352cc89b9e58c1e6e05
-
Filesize
4.6MB
MD57d7868459691a2c328873b785a431e5c
SHA16c3ff9e0d21a95df0900c498d1bd6b29b6a780d9
SHA256fc1461f288f8798085b382f92a49c1f41127d18a15ff96d5c772f58a34c032c5
SHA512e6cd8ff58d9b05ea241678f213047b679b1df9787d5f3608015764a4bf3b46bfb6c76e6b6c7407cde0c1200d5c95720a602a857710b3fe615990f4cab5269b63
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
303KB
MD5a2ebb772dd608cbeab1cfc225c0fe404
SHA1c52fb8475b9b2951047425ca5e3ae92e795f6d87
SHA2562bfcce870252446432b9107846857d8d1987f01b413b0c4c9b980aa8de26862b
SHA5127f4ab33626d1a75455f49d0b4a1ed3431fa1b011d66a39a3aa9a9ffc915e6accf6e4c0582d04b6ce71d3b2fdfe7da04f3482986fd9c7b4dfffc4d4fcc5058b68
-
Filesize
100KB
MD5bd921d5b0962caee46a47168692fa812
SHA1dbe4de75b7c1ddde4adfbd8efec1ae2a8dedf2a2
SHA2569670d3993ae3f64998a4f07e2f371925326606fbf1b502a9d204f75788264321
SHA512d4537b728c721400088fbc269c3804a00be2acd28bc85101d29742fa47698a6aa8268809d79a1afa7c61bf0b8edf3194d02df5e56b99891883ee9b000eb90009
-
Filesize
186KB
MD51b127ba901f9ff57f4564bb767fcd646
SHA178fedc16f1c920ba9eccae63959202d911d850a6
SHA25607bfd8dcd328165e6e405d30f7469bbaee4c247a303b44fdde2a0db44a19846f
SHA512bcc22e7cca0772b3acfb43eff2e8aa95d706e98d896950a4b53d9a6f3f310892735920bbf23a0d39bf7141903db4f313dbf1d6de5cd4dbab2cb2b6545c6559e0
-
Filesize
164KB
MD50efdc8e9a41e815603007096ddd6f6d9
SHA1585a2b4aab2e96449a8f333fb98e0a61d281a336
SHA2564f0397a71bec70e3e20ded1a477184b58430c3fbdbef6708913201306d5ad38a
SHA512810d7ecfe8afc48948b1b1a0c85af5c61e770746b2875f4956f8df6c491008052c1dd6816d298678a03c20e64fc623a66223e0345459bb364016f340aeb7f476
-
Filesize
31KB
MD5c5cb93b67c713728c42d86e11ae51494
SHA1a5897ebe925d1aa5414ebda8084392dae49c298e
SHA2566490f164f7364efdf2b0749efe2b153b5100b84755994da8cd0807353439dfbc
SHA512cff79bcfa66a3868e2e5076e3eab7eac191aff6c23d0fc5f1ea71b2efe100df8214f5dedccb3a2841bf15b84b61d2cd40b24b891a6a063e356ed6ece7acba27f
-
Filesize
64KB
MD5a921e7514a98a78be27f7a0aeaa0b8cd
SHA1f9aa00748fdfc1524ed8c6fb0a0da9f6c0b6fec7
SHA256162d5cd7ffbd0d80213dae6caa0d4f6a9ec0bee9399121750c7f4a317cb63b0e
SHA512cfef29d70a6115907dcd8e6e9a5b62203e42f926cb349a750645ebf8f3393783e9b63f357f520cd647af85d7bcc8235b874c2e3f5326717bba554e37ee96eabd
-
Filesize
57KB
MD5e1decfb90b3eaca98b405d96c3f20dca
SHA1b64766693a58cde8a9a2e6abc6f826de9ed4f904
SHA256bbf5f3ce3eb31dab5f108303948c582911dec01f5dee104c29b7039698bdfd1e
SHA51207c049a8469bf3e0302c9d8dd79f9ecd2cab235f3c9ec2263429aa6e71d6ed280cf1063e726bb8b841750a87536cdf2b193c9651dd1bb2a98f76c7cce67f3607
-
Filesize
116KB
MD5db9f8201b09978cdd502a38117e57edd
SHA1509b79675178d3ff7e049a9868354621af0d420b
SHA256317551401ccb0a1b2c8652778558a93d63910029c0ed2f8dd1cee4ded6598794
SHA51284e9ea836c3517c8fb25e113cfe9ceecb96e639285cfeee80b3040684587943d6dd24f7795c3e863efff99428640c359891a66701ee6955ec010d74286081800
-
Filesize
128KB
MD59746d1ac79c8b499d8b2224394581fa7
SHA136b1985eabfd8131ad9f2b7f69c903a3fce67629
SHA25677941fbe96e0c797e6cf5419ee32bd3fcee69629cba37750146656a660c37182
SHA51261a6174e2aced5b85cd614ad2f9d3da24c6b91e1fc04e10ff818222c4323cd043a59708bd35af0de84b004bf492fbc157d72907cd1e7ddf7082fc2a3563ef183
-
Filesize
109KB
MD5950fa209490857a16c95d65ba7d77724
SHA115d2ed4ab0d42f10a73537e9ea53d5012dbefeed
SHA256b897a108306c34f7f5151e0829885dcd6515106df10c930922b5d36e1669afdb
SHA512f883716a52946473804b8a526423b1079d2812eb5596def3da01c45720d4cb9352d7fbe85ad3bb165efa6b595818c132b8729e691ee0f94ef141e57bb9e0ee57
-
Filesize
47KB
MD5f6dd7c4968649bf725226c708fcb1283
SHA11d619e5ece84493cf3732cbd6830bacc7e9574f8
SHA2565d188b9fbd3bdb1ca6632c908b74855b4829656e0aa8d843b0cdd743d53c3ba6
SHA5124f407b81ba9e04f57be277cd63ebd5ae367b196573e1f55a8689c41f634dbae59a0f4398541790a210a6040b35e9cd1c4bd51bb1ade96fde379a38b66d7aea37