Overview
overview
7Static
static
3pepew(Copy 10).bat
windows10-2004-x64
7pepew(Copy 11).bat
windows10-2004-x64
7pepew(Copy 12).bat
windows10-2004-x64
7pepew(Copy 13).bat
windows10-2004-x64
7pepew(Copy 14).bat
windows10-2004-x64
7pepew(Copy 15).bat
windows10-2004-x64
7pepew(Copy 16).bat
windows10-2004-x64
7pepew(Copy 17).bat
windows10-2004-x64
7pepew(Copy 18).bat
windows10-2004-x64
7pepew(Copy 19).bat
windows10-2004-x64
7pepew(Copy 2).bat
windows10-2004-x64
7pepew(Copy 20).bat
windows10-2004-x64
7pepew(Copy 21).bat
windows10-2004-x64
7pepew(Copy 22).bat
windows10-2004-x64
7pepew(Copy 23).bat
windows10-2004-x64
7pepew(Copy 24).bat
windows10-2004-x64
7pepew(Copy 25).bat
windows10-2004-x64
7pepew(Copy 26).bat
windows10-2004-x64
7pepew(Copy 27).bat
windows10-2004-x64
7pepew(Copy 28).bat
windows10-2004-x64
7pepew(Copy 29).bat
windows10-2004-x64
7pepew(Copy 3).bat
windows10-2004-x64
7pepew(Copy 30).bat
windows10-2004-x64
7pepew(Copy 31).bat
windows10-2004-x64
7pepew(Copy 32).bat
windows10-2004-x64
7pepew(Copy 4).bat
windows10-2004-x64
7pepew(Copy 5).bat
windows10-2004-x64
7pepew(Copy 6).bat
windows10-2004-x64
7pepew(Copy 7).bat
windows10-2004-x64
7pepew(Copy 8).bat
windows10-2004-x64
7pepew(Copy 9).bat
windows10-2004-x64
7pepew.bat
windows10-2004-x64
7Analysis
-
max time kernel
1794s -
max time network
1802s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 06:23
Static task
static1
Behavioral task
behavioral1
Sample
pepew(Copy 10).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
pepew(Copy 11).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
pepew(Copy 12).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
pepew(Copy 13).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
pepew(Copy 14).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
pepew(Copy 15).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
pepew(Copy 16).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
pepew(Copy 17).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
pepew(Copy 18).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
pepew(Copy 19).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
pepew(Copy 2).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
pepew(Copy 20).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
pepew(Copy 21).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
pepew(Copy 22).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
pepew(Copy 23).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
pepew(Copy 24).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
pepew(Copy 25).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
pepew(Copy 26).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
pepew(Copy 27).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
pepew(Copy 28).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
pepew(Copy 29).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral22
Sample
pepew(Copy 3).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
pepew(Copy 30).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral24
Sample
pepew(Copy 31).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
pepew(Copy 32).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral26
Sample
pepew(Copy 4).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
pepew(Copy 5).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral28
Sample
pepew(Copy 6).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
pepew(Copy 7).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral30
Sample
pepew(Copy 8).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
pepew(Copy 9).bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral32
Sample
pepew.bat
Resource
win10v2004-20241007-en
General
-
Target
pepew(Copy 9).bat
-
Size
175B
-
MD5
52fa7d1cae83d92b72a6e8d53f3ca434
-
SHA1
e1dd1b61d5796647ef87be7e4abd206beca5b719
-
SHA256
0d3aba6f605216c381c36399abc479bfd2c377c41f89625ee4009e42d30b3b40
-
SHA512
ad2a4785a14151af8dfb789bdf2679eb94d7bfdd16ff77bf4b8b40d19741c4786eec15d85c74ef37d93cfeb9998451f9566a59e2fc967917a3528ed07b3d8747
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe 316 SRBMiner.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 316 SRBMiner.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 60 wrote to memory of 316 60 cmd.exe 86 PID 60 wrote to memory of 316 60 cmd.exe 86 PID 316 wrote to memory of 4124 316 SRBMiner.exe 87 PID 316 wrote to memory of 4124 316 SRBMiner.exe 87
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\pepew(Copy 9).bat"1⤵
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Users\Admin\AppData\Local\Temp\SRBMiner.exeSRBMiner.exe --algorithm xelishashv2_pepew --pool stratum+tcp://na.mining4people.com:4176 --wallet PRnLRcurtkNtVx2MYeKrVUWWk9oRPLk4zM --password x --worker RiG9 --disable-gpu2⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c set3⤵PID:4124
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54998c826b605ee77c13a2018618facb4
SHA16c60755c430669f9d4c14c63001b222a53a5b5fb
SHA256145450471b410b8b6dac975d43f0b9dbcda06747ac41b87e93fb33c3d7f77e3c
SHA5129dc7fdfbc26fe06599c70d2999952fe64d19faa39896e32a7f10e8c765f51bc9670569eb702de43e426a2fad36ac5a4a9955d415523ccda5733af8f741b7dec2
-
Filesize
1KB
MD5ca71ec205cde2578292b6b7afc68af7a
SHA1176960a041c3faa545ee95835ea23b3bd6ebefff
SHA256a9356cd19cf5f28575aa2531b900711fcf229505cb07381f8de30c210b62e09c
SHA5122cb22f163f4e7b5d77254113f81a54918fd0bf21004f41f783216031759e97693eb58230532edb918b1e5dc3a0fff80f06b5504e88c386721dc0934809bbd0b4
-
Filesize
1KB
MD5be10ecef22e448c25fa481e75cab6f14
SHA16205232aa5d8fafa2aa3d7101221372d4ec979e1
SHA25602d479a16dd1b7d35718422d579e4cf8800b17c89bbed276e0c4d7fa5bf07eba
SHA512d33ed5bc85adf6cefc9a6fa949c3055ecdb7fb8058766772bdd5065b97f8e6a797474980039435b96d315c4b8e9f46d270b149e2fe216677a924cedb8eb75072