Analysis

  • max time kernel
    1799s
  • max time network
    1793s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 02:56

General

  • Target

    pepew(Copy 15).bat

  • Size

    176B

  • MD5

    1be75d8a5633ca3faa40dd35c9590738

  • SHA1

    c436079bd12399996837ea16c94fa84ae24f57d6

  • SHA256

    aa6b5546f99d43159591faf44921a1c28a922fddc027cf7f5cc24d4ccfa331c9

  • SHA512

    0d465e44e5386a0f69927bfa631b2ab965cf6b98556ff0deba590b7a9fc89bb3a120ee1432a9f632347515f00953ad1c28758491ef9688c6301dd65375191ada

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\pepew(Copy 15).bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Users\Admin\AppData\Local\Temp\SRBMiner.exe
      SRBMiner.exe --algorithm xelishashv2_pepew --pool stratum+tcp://na.mining4people.com:4176 --wallet PRnLRcurtkNtVx2MYeKrVUWWk9oRPLk4zM --password x --worker RiG15 --disable-gpu
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1680
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c set
        3⤵
          PID:2436

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1680-44-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1680-1-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1680-3-0x0000000356B30000-0x0000000356DE3000-memory.dmp

      Filesize

      2.7MB

    • memory/1680-11-0x000000037C1A0000-0x000000037C231000-memory.dmp

      Filesize

      580KB

    • memory/1680-15-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/1680-18-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1680-17-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1680-16-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1680-19-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1680-20-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1680-80-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1680-35-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1680-39-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/1680-38-0x000000037C1A0000-0x000000037C231000-memory.dmp

      Filesize

      580KB

    • memory/1680-37-0x0000000356B30000-0x0000000356DE3000-memory.dmp

      Filesize

      2.7MB

    • memory/1680-36-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1680-47-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/1680-40-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1680-75-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/1680-48-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1680-52-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1680-59-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/1680-56-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1680-60-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1680-67-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/1680-64-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1680-71-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/1680-68-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1680-83-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/1680-74-0x000000037C1A0000-0x000000037C231000-memory.dmp

      Filesize

      580KB

    • memory/1680-72-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1680-73-0x0000000356B30000-0x0000000356DE3000-memory.dmp

      Filesize

      2.7MB

    • memory/1680-79-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/1680-76-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/2368-0-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/2368-34-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB