Overview
overview
7Static
static
3pepew(Copy 10).bat
windows10-2004-x64
7pepew(Copy 11).bat
windows10-2004-x64
7pepew(Copy 12).bat
windows10-2004-x64
7pepew(Copy 13).bat
windows10-2004-x64
7pepew(Copy 14).bat
windows10-2004-x64
7pepew(Copy 15).bat
windows10-2004-x64
7pepew(Copy 16).bat
windows10-2004-x64
7pepew(Copy 17).bat
windows10-2004-x64
7pepew(Copy 18).bat
windows10-2004-x64
7pepew(Copy 19).bat
windows10-2004-x64
7pepew(Copy 2).bat
windows10-2004-x64
7pepew(Copy 20).bat
windows10-2004-x64
7pepew(Copy 21).bat
windows10-2004-x64
7pepew(Copy 22).bat
windows10-2004-x64
7pepew(Copy 23).bat
windows10-2004-x64
7pepew(Copy 24).bat
windows10-2004-x64
7pepew(Copy 25).bat
windows10-2004-x64
7pepew(Copy 26).bat
windows10-2004-x64
7pepew(Copy 27).bat
windows10-2004-x64
7pepew(Copy 28).bat
windows10-2004-x64
7pepew(Copy 29).bat
windows10-2004-x64
7pepew(Copy 3).bat
windows10-2004-x64
7pepew(Copy 30).bat
windows10-2004-x64
7pepew(Copy 31).bat
windows10-2004-x64
7pepew(Copy 32).bat
windows10-2004-x64
7pepew(Copy 4).bat
windows10-2004-x64
7pepew(Copy 5).bat
windows10-2004-x64
7pepew(Copy 6).bat
windows10-2004-x64
7pepew(Copy 7).bat
windows10-2004-x64
7pepew(Copy 8).bat
windows10-2004-x64
7pepew(Copy 9).bat
windows10-2004-x64
7pepew.bat
windows10-2004-x64
7Analysis
-
max time kernel
1799s -
max time network
1798s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 06:22
Static task
static1
Behavioral task
behavioral1
Sample
pepew(Copy 10).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
pepew(Copy 11).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
pepew(Copy 12).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
pepew(Copy 13).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
pepew(Copy 14).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
pepew(Copy 15).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
pepew(Copy 16).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
pepew(Copy 17).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
pepew(Copy 18).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
pepew(Copy 19).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
pepew(Copy 2).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
pepew(Copy 20).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
pepew(Copy 21).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
pepew(Copy 22).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
pepew(Copy 23).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
pepew(Copy 24).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
pepew(Copy 25).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
pepew(Copy 26).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
pepew(Copy 27).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
pepew(Copy 28).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
pepew(Copy 29).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral22
Sample
pepew(Copy 3).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
pepew(Copy 30).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral24
Sample
pepew(Copy 31).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
pepew(Copy 32).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral26
Sample
pepew(Copy 4).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
pepew(Copy 5).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral28
Sample
pepew(Copy 6).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
pepew(Copy 7).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral30
Sample
pepew(Copy 8).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
pepew(Copy 9).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral32
Sample
pepew.bat
Resource
win10v2004-20241007-en
General
-
Target
pepew(Copy 7).bat
-
Size
175B
-
MD5
938536bbf3af93a25b26f68b1d89595c
-
SHA1
e091f29eaa7f56134f7c786911a79877625d403e
-
SHA256
f59e5ef397f46a6d61a4e88ed33cb4d17086e92bb7aba7908a7578714fb2a809
-
SHA512
2bdf21af75efb3bf4077f8b03e5cd242df911bbdda0db36349d74bc26176ee4c716bf1f5f25c8df2b91a78b80f4c61f817d8d9ef15fa4a78ba50a383617425c5
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe 2820 SRBMiner.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 2820 SRBMiner.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4768 wrote to memory of 2820 4768 cmd.exe 82 PID 4768 wrote to memory of 2820 4768 cmd.exe 82 PID 2820 wrote to memory of 448 2820 SRBMiner.exe 83 PID 2820 wrote to memory of 448 2820 SRBMiner.exe 83
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\pepew(Copy 7).bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\SRBMiner.exeSRBMiner.exe --algorithm xelishashv2_pepew --pool stratum+tcp://na.mining4people.com:4176 --wallet PRnLRcurtkNtVx2MYeKrVUWWk9oRPLk4zM --password x --worker RiG7 --disable-gpu2⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c set3⤵PID:448
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54998c826b605ee77c13a2018618facb4
SHA16c60755c430669f9d4c14c63001b222a53a5b5fb
SHA256145450471b410b8b6dac975d43f0b9dbcda06747ac41b87e93fb33c3d7f77e3c
SHA5129dc7fdfbc26fe06599c70d2999952fe64d19faa39896e32a7f10e8c765f51bc9670569eb702de43e426a2fad36ac5a4a9955d415523ccda5733af8f741b7dec2
-
Filesize
1KB
MD5ca71ec205cde2578292b6b7afc68af7a
SHA1176960a041c3faa545ee95835ea23b3bd6ebefff
SHA256a9356cd19cf5f28575aa2531b900711fcf229505cb07381f8de30c210b62e09c
SHA5122cb22f163f4e7b5d77254113f81a54918fd0bf21004f41f783216031759e97693eb58230532edb918b1e5dc3a0fff80f06b5504e88c386721dc0934809bbd0b4
-
Filesize
1KB
MD5be10ecef22e448c25fa481e75cab6f14
SHA16205232aa5d8fafa2aa3d7101221372d4ec979e1
SHA25602d479a16dd1b7d35718422d579e4cf8800b17c89bbed276e0c4d7fa5bf07eba
SHA512d33ed5bc85adf6cefc9a6fa949c3055ecdb7fb8058766772bdd5065b97f8e6a797474980039435b96d315c4b8e9f46d270b149e2fe216677a924cedb8eb75072