Overview
overview
7Static
static
3pepew(Copy 10).bat
windows10-2004-x64
7pepew(Copy 11).bat
windows10-2004-x64
7pepew(Copy 12).bat
windows10-2004-x64
7pepew(Copy 13).bat
windows10-2004-x64
7pepew(Copy 14).bat
windows10-2004-x64
7pepew(Copy 15).bat
windows10-2004-x64
7pepew(Copy 16).bat
windows10-2004-x64
7pepew(Copy 17).bat
windows10-2004-x64
7pepew(Copy 18).bat
windows10-2004-x64
7pepew(Copy 19).bat
windows10-2004-x64
7pepew(Copy 2).bat
windows10-2004-x64
7pepew(Copy 20).bat
windows10-2004-x64
7pepew(Copy 21).bat
windows10-2004-x64
7pepew(Copy 22).bat
windows10-2004-x64
7pepew(Copy 23).bat
windows10-2004-x64
7pepew(Copy 24).bat
windows10-2004-x64
7pepew(Copy 25).bat
windows10-2004-x64
7pepew(Copy 26).bat
windows10-2004-x64
7pepew(Copy 27).bat
windows10-2004-x64
7pepew(Copy 28).bat
windows10-2004-x64
7pepew(Copy 29).bat
windows10-2004-x64
7pepew(Copy 3).bat
windows10-2004-x64
7pepew(Copy 30).bat
windows10-2004-x64
7pepew(Copy 31).bat
windows10-2004-x64
7pepew(Copy 32).bat
windows10-2004-x64
7pepew(Copy 4).bat
windows10-2004-x64
7pepew(Copy 5).bat
windows10-2004-x64
7pepew(Copy 6).bat
windows10-2004-x64
7pepew(Copy 7).bat
windows10-2004-x64
7pepew(Copy 8).bat
windows10-2004-x64
7pepew(Copy 9).bat
windows10-2004-x64
7pepew.bat
windows10-2004-x64
7Analysis
-
max time kernel
1797s -
max time network
1795s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 06:22
Static task
static1
Behavioral task
behavioral1
Sample
pepew(Copy 10).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
pepew(Copy 11).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
pepew(Copy 12).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
pepew(Copy 13).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
pepew(Copy 14).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
pepew(Copy 15).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
pepew(Copy 16).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
pepew(Copy 17).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
pepew(Copy 18).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
pepew(Copy 19).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
pepew(Copy 2).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
pepew(Copy 20).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
pepew(Copy 21).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
pepew(Copy 22).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
pepew(Copy 23).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
pepew(Copy 24).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
pepew(Copy 25).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
pepew(Copy 26).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
pepew(Copy 27).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
pepew(Copy 28).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
pepew(Copy 29).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral22
Sample
pepew(Copy 3).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
pepew(Copy 30).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral24
Sample
pepew(Copy 31).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
pepew(Copy 32).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral26
Sample
pepew(Copy 4).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
pepew(Copy 5).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral28
Sample
pepew(Copy 6).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
pepew(Copy 7).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral30
Sample
pepew(Copy 8).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
pepew(Copy 9).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral32
Sample
pepew.bat
Resource
win10v2004-20241007-en
General
-
Target
pepew(Copy 18).bat
-
Size
176B
-
MD5
c7658c411bf58a3051f9dba72a93a735
-
SHA1
d75adf3830ca4abb34dc042d064bc7a5884b87cd
-
SHA256
2cabf1bb022b49b1a3e56b88a6bc62d464de28d66f02f3913e181b365d4c7e9a
-
SHA512
8ad50f866e37ef912137630285c6e8f792de85a7aa9f161eb4334cf09f83a4b376abe30aa7088ba536b2fc93c3165db602a50d1f681ee914737fc3afb459afb8
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe 4884 SRBMiner.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 4884 SRBMiner.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 4884 1948 cmd.exe 86 PID 1948 wrote to memory of 4884 1948 cmd.exe 86 PID 4884 wrote to memory of 3612 4884 SRBMiner.exe 87 PID 4884 wrote to memory of 3612 4884 SRBMiner.exe 87
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\pepew(Copy 18).bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\SRBMiner.exeSRBMiner.exe --algorithm xelishashv2_pepew --pool stratum+tcp://na.mining4people.com:4176 --wallet PRnLRcurtkNtVx2MYeKrVUWWk9oRPLk4zM --password x --worker RiG18 --disable-gpu2⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c set3⤵PID:3612
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54998c826b605ee77c13a2018618facb4
SHA16c60755c430669f9d4c14c63001b222a53a5b5fb
SHA256145450471b410b8b6dac975d43f0b9dbcda06747ac41b87e93fb33c3d7f77e3c
SHA5129dc7fdfbc26fe06599c70d2999952fe64d19faa39896e32a7f10e8c765f51bc9670569eb702de43e426a2fad36ac5a4a9955d415523ccda5733af8f741b7dec2
-
Filesize
1KB
MD5ca71ec205cde2578292b6b7afc68af7a
SHA1176960a041c3faa545ee95835ea23b3bd6ebefff
SHA256a9356cd19cf5f28575aa2531b900711fcf229505cb07381f8de30c210b62e09c
SHA5122cb22f163f4e7b5d77254113f81a54918fd0bf21004f41f783216031759e97693eb58230532edb918b1e5dc3a0fff80f06b5504e88c386721dc0934809bbd0b4
-
Filesize
1KB
MD5be10ecef22e448c25fa481e75cab6f14
SHA16205232aa5d8fafa2aa3d7101221372d4ec979e1
SHA25602d479a16dd1b7d35718422d579e4cf8800b17c89bbed276e0c4d7fa5bf07eba
SHA512d33ed5bc85adf6cefc9a6fa949c3055ecdb7fb8058766772bdd5065b97f8e6a797474980039435b96d315c4b8e9f46d270b149e2fe216677a924cedb8eb75072