Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
296s -
max time network
297s -
platform
windows10-1703_x64 -
resource
win10-20240221-ja -
resource tags
arch:x64arch:x86image:win10-20240221-jalocale:ja-jpos:windows10-1703-x64systemwindows -
submitted
24/02/2024, 06:14
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2356 b2e.exe 4004 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4004 cpuminer-sse2.exe 4004 cpuminer-sse2.exe 4004 cpuminer-sse2.exe 4004 cpuminer-sse2.exe 4004 cpuminer-sse2.exe -
resource yara_rule behavioral1/memory/4816-6-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4816 wrote to memory of 2356 4816 batexe.exe 75 PID 4816 wrote to memory of 2356 4816 batexe.exe 75 PID 4816 wrote to memory of 2356 4816 batexe.exe 75 PID 2356 wrote to memory of 4132 2356 b2e.exe 76 PID 2356 wrote to memory of 4132 2356 b2e.exe 76 PID 2356 wrote to memory of 4132 2356 b2e.exe 76 PID 4132 wrote to memory of 4004 4132 cmd.exe 79 PID 4132 wrote to memory of 4004 4132 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\1817.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\1817.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\1817.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1D66.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4004
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5a37d5238d27fb8bcc446950bd129f917
SHA10e0551e10a6ff82f1bded19a7bd688a708a09389
SHA256deae72163835581de7d89ccba82443825d68a9769ed49529a5de64307a49657a
SHA5122a12cf1efc5c2cc69345fdd7609eb50e8384fe12b5d5c9373103bd4e379a84a7ead12214625eada2076f6ada60e6dab8930a6a7c4b1e3db36d15beaf7bc228ed
-
Filesize
1.8MB
MD53e8ffa9b718b872a0e265cced0508d29
SHA1012e281c98b403aa8fe77161d793c1be350b8f02
SHA2560d2eb41ed7f105b74c75d13f11a482c5578ad35d4c100cb509a6a1d4ec9a3b07
SHA5124dd662137c52e6166a6d4dbc8e716708ee434b7a8d4b4771748a0e3c70e2ebe9ce06a181dc1521b328c9f492d2f21a1c50f4adfec7b9fe9a9c8dab9e61df8fb2
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
631KB
MD5ddf0209a7d52cdf6be86c2bd6702fddb
SHA1783b8b14b9df57c168c9c5f28cbb60d7bde31c86
SHA256f7d20ae6d8b42832b801e648b0cc51248e876039ea22ec1033795cc662aa6708
SHA5120bdc9299a19442ae312c0862a2f60838326c4b7b799b17fa8070537704c1269b7399a4053c57a6085e1a194aabc7b9edc04d5a1f1dbad6075a39afef1f403c2c
-
Filesize
599KB
MD5868b40d052b865b0af2d8e55198c4e90
SHA1ffcdc6350be8641376e58180f3cbcb1981efe8ce
SHA2560602534c7da9310128a6dc4e8608bf8ad68ef8f512951a0b01c70546b2ff4119
SHA512516041383164942a2c1b9b5adb13201dc4fc49c643d246ab4477d45f48eabe901bd8dc4e49d406e213e9c6cc3598beff9249a87d15f50669b96cf02c667986ea
-
Filesize
563KB
MD57af7cc535c28811bceb6c90dbe70db6d
SHA135711331efc3b380a3029136283fa6012e70b306
SHA2561758783e5e129e126f47092e8877e16be378bb815d8eeb199b3c042ba1df182e
SHA51295b042c60458652a5b5f18db5b255e8cb49f7998cf6e0523b78a0920aa25a56589678f2bd5293ecba08b890c0c1437972d194766a5374c1252ad6e1eed7d81d0
-
Filesize
656KB
MD5ac17a73727262100d7ca496b6faef50b
SHA1fe5f56af2259ce73506706c5e5b52593891d55da
SHA25609ee1f6d42afd9a036724eb3a23d306bfe620a168e862c19969560311f9d6193
SHA5128f4d1cdee8da698d14a155516939d7cff26d7c44949ef61315b14cd7fa499f13d5bd99c68be00f689fb3f21c47840d8fd03f9d3f2f514b403c7276e031188f5e
-
Filesize
453KB
MD5d131941c9019acf83a33e931cc64b299
SHA198f7e51b53724e2e36fa880488abc00feb465d16
SHA256e87716c15b9286ef866599062dad6af323e90cbb040a75f28540c3f148f53f97
SHA512ffa1bb0290f15e97b65d29200ed5c23939cba83f72d91e91d4938776ee7e624a5b0015aa04bc7d6d304130e2fbb8eacc0ceb841dfb4c828322930c05f32271fc
-
Filesize
512KB
MD5acd0662e5e0c61e170c8770d7f497f1c
SHA1733c536020db3ea573dab0252738f508253dfd54
SHA2563b28da158a4ea12fde51d2294821930fa1363b78df664de10bb6f9580c5217d2
SHA51255eb18f06c1a38d57bfb9d04e7784003efd77bcafc966e01eb7fa9537ee8757a94bf25291089f8f52c42a0196fa3d04f6583508166acdeee3c0c4fd066fffc43
-
Filesize
799KB
MD5fce8f14fe01309597417591190b474b7
SHA19baa34bbf7cd608c9d2d6f9eb868ff38e6d326ec
SHA256cb06d2f07aa9684583708dfb9016262aa7bfa6dcb5c1514b5edccf0837bf6e3a
SHA51232aea6e5b1f200890958f3fcde6454e2d411a8da77e31db6b274a02dd8fd98a559d6968b938612dfbcd45fc645a050408d1009dfb1dff501ab7d125813fd6ac6
-
Filesize
407KB
MD54ce5053d490cbe463818fd00de3e9b8d
SHA14541e1caa90ee8ee6e18582b20cb985529e89d35
SHA256d11dd51f19cb13ffc674e71bec635e81b758f75941aad63502511ad20fb36e62
SHA51261f9dab9a00a8592b3b797dd0e733dd7218f97f7bcd43feff7f8a06bd3f8761d1fbf5903954033c772d5a13b0fa5d88fef8eb4aead4aa48a09c8f7886df2020a
-
Filesize
365KB
MD5a29e5b5efd36a6537568652827b8b4f4
SHA16c0ef14df9effca6ca825380fad9a5f1fcac9312
SHA2564fab6195e05833c4d270e7e9c5a5c5c4589ed1f5891302c49eb8843a9c92454d
SHA512e33c6d20f8a07775a3a09a044a08be2b29559a94e8421f1984ba64f708bff5151f4db4966bd73eb0f64f1151f929f4ba7c7ac4b1454d6defbca7ac6128f2a70f
-
Filesize
415KB
MD5a64d88e9724aaeeffee018ef4c4e23b0
SHA1adbfe9ca7050462ef067202d335b42d00aaaf5a5
SHA256888b17d485ba7a6c0cf14be97038d9dcbaf5d5c4a12e677e32387a90a845d4fd
SHA5129a623691ea74508dc9aacc6f314c9e30893d7bccea9de7e358bb211e7d28ff18e04aafad1fb31c75f3120565f2178f0cf6d09fa62a9e67bc4b96fb3a8dca46b9
-
Filesize
506KB
MD54ed0868e06f7f0352356e6f21c85a51f
SHA1d6761a97221f0eedca39a2f6c8486c6865eb1bcc
SHA2569399d4f856cd89e4d54e0880e388e728f0a284acd5525f7265b253791d793c40
SHA512a2d08eab5902b599bcdc9debd55e6b1c6bacc8d6cb1267772270a69e3371b9137337aad38a9f34497bb06c361e35c47623a4ce9b08c0e181dc3119120f9411b8