Overview
overview
7Static
static
3pepew(Copy 10).bat
windows10-2004-x64
7pepew(Copy 11).bat
windows10-2004-x64
7pepew(Copy 12).bat
windows10-2004-x64
7pepew(Copy 13).bat
windows10-2004-x64
7pepew(Copy 14).bat
windows10-2004-x64
7pepew(Copy 15).bat
windows10-2004-x64
7pepew(Copy 16).bat
windows10-2004-x64
7pepew(Copy 17).bat
windows10-2004-x64
7pepew(Copy 18).bat
windows10-2004-x64
7pepew(Copy 19).bat
windows10-2004-x64
7pepew(Copy 2).bat
windows10-2004-x64
7pepew(Copy 20).bat
windows10-2004-x64
7pepew(Copy 21).bat
windows10-2004-x64
7pepew(Copy 22).bat
windows10-2004-x64
7pepew(Copy 23).bat
windows10-2004-x64
7pepew(Copy 24).bat
windows10-2004-x64
7pepew(Copy 25).bat
windows10-2004-x64
7pepew(Copy 26).bat
windows10-2004-x64
7pepew(Copy 27).bat
windows10-2004-x64
7pepew(Copy 28).bat
windows10-2004-x64
7pepew(Copy 29).bat
windows10-2004-x64
7pepew(Copy 3).bat
windows10-2004-x64
7pepew(Copy 30).bat
windows10-2004-x64
7pepew(Copy 31).bat
windows10-2004-x64
7pepew(Copy 32).bat
windows10-2004-x64
7pepew(Copy 4).bat
windows10-2004-x64
7pepew(Copy 5).bat
windows10-2004-x64
7pepew(Copy 6).bat
windows10-2004-x64
7pepew(Copy 7).bat
windows10-2004-x64
7pepew(Copy 8).bat
windows10-2004-x64
7pepew(Copy 9).bat
windows10-2004-x64
7pepew.bat
windows10-2004-x64
7Analysis
-
max time kernel
1794s -
max time network
1790s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 06:22
Static task
static1
Behavioral task
behavioral1
Sample
pepew(Copy 10).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
pepew(Copy 11).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
pepew(Copy 12).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
pepew(Copy 13).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
pepew(Copy 14).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
pepew(Copy 15).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
pepew(Copy 16).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
pepew(Copy 17).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
pepew(Copy 18).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
pepew(Copy 19).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
pepew(Copy 2).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
pepew(Copy 20).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
pepew(Copy 21).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
pepew(Copy 22).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
pepew(Copy 23).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
pepew(Copy 24).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
pepew(Copy 25).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
pepew(Copy 26).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
pepew(Copy 27).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
pepew(Copy 28).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
pepew(Copy 29).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral22
Sample
pepew(Copy 3).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
pepew(Copy 30).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral24
Sample
pepew(Copy 31).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
pepew(Copy 32).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral26
Sample
pepew(Copy 4).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
pepew(Copy 5).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral28
Sample
pepew(Copy 6).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
pepew(Copy 7).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral30
Sample
pepew(Copy 8).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
pepew(Copy 9).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral32
Sample
pepew.bat
Resource
win10v2004-20241007-en
General
-
Target
pepew(Copy 8).bat
-
Size
175B
-
MD5
bd8cb0565a161f0adb4d5ad75b2f9726
-
SHA1
70656d40bcffb3f548055fd9fad573aec56e690f
-
SHA256
790d93af307c926a5ffcc0d88835d82920a8a8542d94bf21d3ad945051f36280
-
SHA512
2271a0dcd3963f8612a305281967b494be95b80a31938d6c43175d1918a298c5bc55bc379a334362737bead297f30c5610e0ddf798e3ccc01a4f66ba3ad945fe
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe 3960 SRBMiner.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 3960 SRBMiner.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1328 wrote to memory of 3960 1328 cmd.exe 85 PID 1328 wrote to memory of 3960 1328 cmd.exe 85 PID 3960 wrote to memory of 3836 3960 SRBMiner.exe 86 PID 3960 wrote to memory of 3836 3960 SRBMiner.exe 86
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\pepew(Copy 8).bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\SRBMiner.exeSRBMiner.exe --algorithm xelishashv2_pepew --pool stratum+tcp://na.mining4people.com:4176 --wallet PRnLRcurtkNtVx2MYeKrVUWWk9oRPLk4zM --password x --worker RiG8 --disable-gpu2⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c set3⤵PID:3836
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54998c826b605ee77c13a2018618facb4
SHA16c60755c430669f9d4c14c63001b222a53a5b5fb
SHA256145450471b410b8b6dac975d43f0b9dbcda06747ac41b87e93fb33c3d7f77e3c
SHA5129dc7fdfbc26fe06599c70d2999952fe64d19faa39896e32a7f10e8c765f51bc9670569eb702de43e426a2fad36ac5a4a9955d415523ccda5733af8f741b7dec2
-
Filesize
1KB
MD5ca71ec205cde2578292b6b7afc68af7a
SHA1176960a041c3faa545ee95835ea23b3bd6ebefff
SHA256a9356cd19cf5f28575aa2531b900711fcf229505cb07381f8de30c210b62e09c
SHA5122cb22f163f4e7b5d77254113f81a54918fd0bf21004f41f783216031759e97693eb58230532edb918b1e5dc3a0fff80f06b5504e88c386721dc0934809bbd0b4
-
Filesize
1KB
MD5be10ecef22e448c25fa481e75cab6f14
SHA16205232aa5d8fafa2aa3d7101221372d4ec979e1
SHA25602d479a16dd1b7d35718422d579e4cf8800b17c89bbed276e0c4d7fa5bf07eba
SHA512d33ed5bc85adf6cefc9a6fa949c3055ecdb7fb8058766772bdd5065b97f8e6a797474980039435b96d315c4b8e9f46d270b149e2fe216677a924cedb8eb75072