Analysis

  • max time kernel
    1799s
  • max time network
    1803s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 06:33

General

  • Target

    pepew(Copy 6).bat

  • Size

    175B

  • MD5

    d59d9c28c517a630fcc53c79a0645370

  • SHA1

    9177efd52640846f69c167d7ac1c7e0385cb961d

  • SHA256

    b38b6beddec1ff0cddabbeba97cfbf0c97d623c6819b6a55adfa011f70cec568

  • SHA512

    f48f73115fcc3e2dbb15bbf40a571dd8525352816206be23f28c9c402b8d98d885a52dd5cc61bd07f80cd8ba590f66a930ee770abcb529dd6eb6333552b71b2c

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\pepew(Copy 6).bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:388
    • C:\Users\Admin\AppData\Local\Temp\SRBMiner.exe
      SRBMiner.exe --algorithm xelishashv2_pepew --pool stratum+tcp://na.mining4people.com:4176 --wallet PRnLRcurtkNtVx2MYeKrVUWWk9oRPLk4zM --password x --worker RiG6 --disable-gpu
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2184
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c set
        3⤵
          PID:2636

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/388-34-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/388-0-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/2184-39-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/2184-19-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/2184-15-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/2184-47-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/2184-20-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/2184-16-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/2184-18-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/2184-54-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/2184-3-0x0000000356B30000-0x0000000356DE3000-memory.dmp

      Filesize

      2.7MB

    • memory/2184-38-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/2184-37-0x000000037C1A0000-0x000000037C231000-memory.dmp

      Filesize

      580KB

    • memory/2184-36-0x0000000356B30000-0x0000000356DE3000-memory.dmp

      Filesize

      2.7MB

    • memory/2184-35-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/2184-51-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/2184-1-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/2184-43-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/2184-17-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/2184-11-0x000000037C1A0000-0x000000037C231000-memory.dmp

      Filesize

      580KB

    • memory/2184-42-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/2184-55-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/2184-59-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/2184-66-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/2184-63-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/2184-70-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/2184-69-0x000000037C1A0000-0x000000037C231000-memory.dmp

      Filesize

      580KB

    • memory/2184-67-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/2184-68-0x0000000356B30000-0x0000000356DE3000-memory.dmp

      Filesize

      2.7MB

    • memory/2184-74-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/2184-71-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/2184-78-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/2184-75-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/2184-82-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/2184-79-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB