Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
292s -
max time network
309s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
24/02/2024, 13:16
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 1972 b2e.exe 3152 cpuminer-sse2.exe -
Loads dropped DLL 6 IoCs
pid Process 3152 cpuminer-sse2.exe 3152 cpuminer-sse2.exe 3152 cpuminer-sse2.exe 3152 cpuminer-sse2.exe 3152 cpuminer-sse2.exe 3152 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/4192-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4192 wrote to memory of 1972 4192 batexe.exe 93 PID 4192 wrote to memory of 1972 4192 batexe.exe 93 PID 4192 wrote to memory of 1972 4192 batexe.exe 93 PID 1972 wrote to memory of 3700 1972 b2e.exe 94 PID 1972 wrote to memory of 3700 1972 b2e.exe 94 PID 1972 wrote to memory of 3700 1972 b2e.exe 94 PID 3700 wrote to memory of 3152 3700 cmd.exe 97 PID 3700 wrote to memory of 3152 3700 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\4DFC.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\4DFC.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\4DFC.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5C92.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3152
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
283KB
MD5f21a9549955c3af289dd6f483c95077b
SHA17cb0a1a96be3d225dbfee43b11a90b9185779f2c
SHA2568190b9e1fb84d18c74afab2b627ecba04a8bd0e7a7ccfd06295c4e980cf06af8
SHA5123b9786297b104021554074a061f2b6ea2191d96f41dfe0ae6c0997240822ed51fc2a2b749e0c67915744be73d91ed00384e64bd00297aaa9a85a20fe9acfbb94
-
Filesize
1.0MB
MD5f831cc93cb6dd766d3d6e1e1e0fedb92
SHA1712bd4a84d0bea064b8d8e1936eff91ed43ba974
SHA256c3c1a37bf365530da8e6ee076df6b692c27458f461edc7278b985248dfe42abf
SHA5123cf4644dfb1a01266951fa266e42c45fc08d19b55ef5a25cec23d95c301cbba9ed52b5caf82e7e54b55af6cb44f40da14a25783dda39adb0518ad69025e18fe1
-
Filesize
983KB
MD5520d622083df272b8e0c6391f9489065
SHA1e9d40515d40b9383150987945acf9798da80b498
SHA256306b25f0c19905f65ad15481170d3ccdb5b9e69fa93d4a20dbdd119cd2ae6be5
SHA5125b3117c59e1f812c87211216482d287c063ca9af3140bd06d99e2f21d216a34ab6045e254bdd4c3b07e9b4dad538da64606cf178107cfe846c290c6507258d3e
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
309KB
MD5efa917ef9ea0adc74843107a7b7b7c13
SHA106f6a9228c879959e04fab9e8ecaab63c27afddc
SHA2567a9291f8314a4e4e12af5abc78dbdb123aa3f6856cabcbbf2fed61722b22b751
SHA5126d36cac813ccbcf5a4d8859f576dafdffdd30c9bbe07a472149491a7a8d14d93c3b0b2b99ef2adb0990570b83c42bb69bd6edd51a26928eb485a582526d2efc6
-
Filesize
350KB
MD5967b05774fc443eabd381f4c8007427e
SHA129be90ea14cfc043b722afce9070f0484d1eff41
SHA256af327928e7bd72bda9b41649ae838681c0b83e239b27ce2d3afcfe576e404f79
SHA512f6c01cfa891a2f3ec0f90ef5eba830bf8ce9e67356facea84652201bd9a7acb1de213e63e5b7f1bf270a15270673e8419eca1c5c21a25393f74ec7d2c2d1a0d8
-
Filesize
260KB
MD5fc6fa7fec8b9b7af18dcf45e68d872a2
SHA15f7f4e75a778637fcc9c43b36d2fb037556db205
SHA2566533c5da471ee535d34a8bd6ece64f2675e555170f82a00d3e38d28e682f44e4
SHA512d731cf81bcd6ea352239a8433cc40f9c320e866396fbbdbc7418ce2ae8bb2baf15f7500761b2a720ff43cad341cf3d03acd2da5f96240a5e4163f618adc8a3a1
-
Filesize
328KB
MD5174b521b782265f923a7fbae8658546d
SHA10f4c5fef52695c7825c7c8eb30e70337ff945a91
SHA2567f07adcac67010ec2a94033219224ad97c5955f91999d90679ce876f681d94ee
SHA512c4f32de28b6db4336dc3a92a6294c83ed15516f56f2b1e9b3c7f0e0a5aa96e55503ed7e99472d9a21bc8b6a906004ec42d0dd9c89304abb89f85d0ccedcb3082
-
Filesize
101KB
MD53fd8add599f102ead8982b3f744a7cca
SHA1003210e5f1656fe264c7079d80308c2d155e2181
SHA25618068e8dcd3a33df60b4e3270236f75a1f23381bd9ae371bf8c1df559266f487
SHA51236bbd61d61656532342947f3439aa92b723148ff5e06e2d44239e27e3e8c5072614a45efe309c28cd8424a73c16ad73711b960c85cf8998995227dfdfb07d6fa
-
Filesize
213KB
MD584243dd282386127df9a1d4cdbb49ad3
SHA1c9f568151dc08f71d8d8543fd49b2980818f2a1b
SHA256fef34cb2ef9ad4628c7ab04236c93b798c277c6dc828be0bc2a7a5facec2eb56
SHA51249e259b538b70d2194634b637ee64946725ce1159400b0e814df0a71c2a202ac45614374fdc5028981d19cd55331d20f3aa0ee9b43eded98407cc3be30ff263e
-
Filesize
270KB
MD5c1890489b4ea511dcfdd167930563329
SHA1afaea864a424cee8ccf93c20bb9164b24048105c
SHA25652c49aec83ee29c0d6ea0c8f26b34f8c756ffeaa2ed6b6b1e1fbb5e9f502595f
SHA512db6db169d689e1068e1fede6f69d53776f1b88d835dd5b28f8f88973b73ab8c0a36fbd1f6301da02fef96158f3f3ae6e5736342b37b0b9fd3d3c0b98723dac09
-
Filesize
193KB
MD5f546dcf8025b4356acefcd92c0911f27
SHA15fb54374d39407ada9b093267300172205447d82
SHA2569615b6dc4fd14226890b1853be7784c4435edaecdd0f458373f3590d51d80f5c
SHA5120b09fd3e3d5271a661f0e538f22aea66c2bd84e32117a8a8b9cf2bcb02fbcb163e2a08b551c2e2668af7ccaa0e0412011e5df6d0ec1f30a8f7774791d9f30be7
-
Filesize
293KB
MD5599425e871b232cdf7ea8092ac2a9300
SHA1ea8f216315bbe4e59a9ae1264eecb22753cb53a9
SHA2560f5501cc59a936066185bca1b5b51e66bbfbae34bc7ac9f7987c464cbb7c008e
SHA5127bbc522057df368790caa4b60da83b97795a797bd32122fcd6519fa66dab93f717341ff7d105812da5e55515d3f7a35f4fdaa8b65edc3d62f87441bb9317d727
-
Filesize
235KB
MD5a1a04da0d14343a3f6373ec5224569d3
SHA1e91082eeec67ed5a1839cbe08db741e89a008b92
SHA256e5879eed635c998a6052772d7e4d909a1d1c8174d1b71dbd3a83cad27ceed52c
SHA51202d1ed33719c6921625c03b934079a6796f6d684ef68c7069b4391d57054778144e453098b2eb11d491ad5108d4b2b9dfb86b1bb6b58bae04a8637789ba57c45
-
Filesize
77KB
MD55b68dfb4c591bdb5abc3626c72ed09a2
SHA17bc0fb011a7f5ff4716b0f34adc639eec3bc9777
SHA2566cb0897009c35d801c6fe48ec0cbaa1b6e8e3a074c9f8766795ba0333fe38ae0
SHA512b54276ce70fbd76c99be44f122b2fb31b2382f15fa720ec88dd4c0f592eba2bb55b13becea0ed20f18684bdf6f488a5ec0ef7aa48d2c79d7103f8672fe8778b0
-
Filesize
13KB
MD59e221a374a5f6abf8c598d94271ef4bc
SHA1d456986fa36201c2853f923529a8a2bfa4950d46
SHA256ddfaedcb356e043e2b16111099a67c6f0062da9deefb6e0f8b966b1b8623cda3
SHA512d9520933b0f8c1a85b4be580f58a9cb7d209eaee59848ab2cf2cc882d39cd70161964d74c2e467992e547aca58cba343e7c75ab8b4b4e42ee043fa7f9bc3565a