Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
302s -
max time network
309s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
24/02/2024, 07:04
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 2592 b2e.exe 4344 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4344 cpuminer-sse2.exe 4344 cpuminer-sse2.exe 4344 cpuminer-sse2.exe 4344 cpuminer-sse2.exe 4344 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/2288-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2592 2288 batexe.exe 92 PID 2288 wrote to memory of 2592 2288 batexe.exe 92 PID 2288 wrote to memory of 2592 2288 batexe.exe 92 PID 2592 wrote to memory of 2080 2592 b2e.exe 93 PID 2592 wrote to memory of 2080 2592 b2e.exe 93 PID 2592 wrote to memory of 2080 2592 b2e.exe 93 PID 2080 wrote to memory of 4344 2080 cmd.exe 96 PID 2080 wrote to memory of 4344 2080 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\4C37.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\4C37.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\4C37.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\580E.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4344
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5db9a9eafe62263d22d80f1e5c75626fa
SHA1719a59440c94385f1ad64b33bad98aebd1826799
SHA256108ca4ca243f081ddd85e272bd72442744c974c03a767a3e0a1bac536bd3512d
SHA5129b0ee1a4c9cc5ecd76a8a39cb01d9c80bfeda90ac9ee3c1c9575197ed2f359916413339526e4c60fc7d986c3d7001a146a50ea7296ceab62a279345e88201df2
-
Filesize
99KB
MD569a61a808dfd56a7e94dbd922ad3c3f7
SHA1db3e33879147b0f9f2ce661a5f1a0794459ce9b1
SHA256591b6e22ec14cb7c938af41ada2364524719c64d4e40d3fcf48fc58ecaea9fc3
SHA512175f90a924ea50c8ede9a831c46bf47f78753a642915a9acd25e2409713f56820f48674d3aafa20111d3bafabceca3c433de49b517674873ea969c5435fea9cf
-
Filesize
176KB
MD502b6a8b73d93639bf995effac89decce
SHA1a10595b8ea5034aa2014258dbbabbb0cf66552e1
SHA2561730f5fee7aa801ae4adccf085dc53dbfff351693951c99a24e4ccaf8b3cebee
SHA5127b70c3e5ce52e8ddf6dabedaefca56ebe0648c69b349f2b10261c35ba0f3542fa0e7e24a51bf18226aacab47373a47d3a931b00ae1a6043970f85051d6ee28ad
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
171KB
MD5566e2061105781d4a8c30fd46d82ab29
SHA13f8ed92ae84b0919b3ee58bca33b15783168e647
SHA2567d9423fed9869cb7505d5098f687cc1805b15f40da425570128092bcd0fdb7fb
SHA51228f50080a100b9d695a81c72647283516904ead89eda4e95751444276395524fcac4065c722990eb6483dcb0f5a52844b09e1cf954b8b68be3a300e00546b6b5
-
Filesize
211KB
MD560a7265b49d4eab07bee6961bd886206
SHA172046c7701947dc26ddd49e76503d4170d2defdd
SHA25679284e3f557f5a1a56ad38a4c1f7efc6c455c20542e648452310b99a0c703c58
SHA512ce2bd614942baccfe2f84c72ac2e11e1dc0ee2daeec0fdf1e433a64287224d46a5becd64ed1388e686cd153ea77f65cbbbc1eb8bb3b3504115defb62205e088c
-
Filesize
197KB
MD5f66649b4f959bc38ca0369a430b60011
SHA1810f12808d85e522ae83f93f32da5a588ef3d902
SHA256c614ea782e8cd5bc4dc7ea9cae2a82c054cd79889c521a49198976abdf0062be
SHA51216e37668e502db4537aa2f550fdd58c5defee2722eb7da828332fbf07154ecc8c844812ed5e9560ea5ee4b5a04f3ee09dba1209da5d4a76e2e990206e758fda7
-
Filesize
201KB
MD5e5d46d69d132543159a85af41e2bcdc1
SHA16db638acafeaeceb48159a6a68eba6fb1235ad30
SHA256f56ada3d21b2005f2fff1cf2dc056df6a05e23b8b126677d2f4f24f600cdd0d5
SHA5129da983dd67693f4cf3077b1d99418d4a56d6e9926aae9274cd7065229f56239167ab553a751eb30e18e11b201190b1f68ce9733488cdec209cd1ed7aea0ba0df
-
Filesize
231KB
MD522c4badf84bb1ad0ba7c1dc07a84dcc2
SHA1e7024c2dc46a8157cca5ae4c3f30441b85478c77
SHA25694004c689a7246d4412b59d93b894a41ed11b26db40e4f970070eabdfc4c425a
SHA512d0026d2328643f9a9a28e267bd4af7bb3469583a256e206ea32bce88eab780b979513967cf2aac12cde77e8dc997e5cddeb59a937069b9009b3be770d7bebc18
-
Filesize
166KB
MD50d4a9e26c4c77694f4e7ef5d9bca0351
SHA1861dab978dd076475f22ec998a605ad3facb3792
SHA2565fe3924d233a74e5bbb56c6c6a6edf782ac0b2aa9207496034f9ca027acc23db
SHA5129cd09655a67798c481876bbed2ad5513a6c43309b68b2ec2be6e2c396a42aa91b77224938e35e89b487327468f6a05a0bf4695f1b6709ad215c3738f3eaa2d78
-
Filesize
270KB
MD5e621e1acee16815a8de95b5206631cec
SHA1deb97985342e51adbfcb6ff8265a68d5fd660702
SHA25685bd01c4e90eae7b566b04e43b3939897699d31c93ab61e9e8be9eb80043172c
SHA51279a80b0fb604924c5d3a975a416efb1e9be706bc5cdff6ec13f5564d5afb94a582f8c8228bf53db7d00c8d2aa428f85fed40382e6e780ff18e67c2862ad36b8c
-
Filesize
73KB
MD5fc025bd666151d393104354351478a13
SHA134db4a0806d5cb206d65b837a74f35e3fc88eccf
SHA2568d92ba98385656bbfd43d9cc253ffa1769b7d3aeb41f12649647f4a7615bf099
SHA5126faab4906a60537a3f7403844ae4496f28cb47c2dc593062a3287527e1c2fa6e6437439789f20ba3ffddb7e2d749c394fd8b4ff9a0a2e835d0b9e7073dc88951
-
Filesize
124KB
MD506e85e5efd81264d7be2c2a78a546fd7
SHA1236383b8a963be33a38e10ed8cb09e73d5539835
SHA256fd70af0926b75c3435db96341141a733f135ea5dc0143540f6b502722910e03b
SHA512a69bd118dd5ef9a1d90b6da9b18b80a1a8c88611e014e1dd486b7ec546f17eb19e3a12484e393673778d98951fbd7251ac8301e947201a23bb5084391f09316c
-
Filesize
153KB
MD5af05e3a5c8f4ddc216832eedca815fdc
SHA149dbfc9526a31d3276d41b6a23986e3ab892b14e
SHA256a14ac85d9da65fe3fbbb9796dff4b10f998b29a72c8d98624901b6afd33c5dd3
SHA512c64f9570556a560e4958c48c3437dde4fc33bed1592ab7064ef5ecd677ee25975827c655eeb42774a576e23145987aca844008b859c2d6bb98988c071589225f
-
Filesize
40KB
MD5ecc22e82a554d2245d23ddfc95b8202b
SHA1d1f6f1862574e38851f07f063cfbdfe0398d31b4
SHA2560a918c4d2d260055b4289c1f72de88179c7f73c340845027b2f5671baed1cd11
SHA512464af03c3b2d591d6307fbaae037bddc615fd8597ee85b422e926ae0e6759cb8fcfb41d73fed4bc334bbae568837ea55258d9473f755ed43ce2e57a792800c04