Analysis

  • max time kernel
    1799s
  • max time network
    1801s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 09:59

General

  • Target

    pepew(Copy 8).bat

  • Size

    175B

  • MD5

    bd8cb0565a161f0adb4d5ad75b2f9726

  • SHA1

    70656d40bcffb3f548055fd9fad573aec56e690f

  • SHA256

    790d93af307c926a5ffcc0d88835d82920a8a8542d94bf21d3ad945051f36280

  • SHA512

    2271a0dcd3963f8612a305281967b494be95b80a31938d6c43175d1918a298c5bc55bc379a334362737bead297f30c5610e0ddf798e3ccc01a4f66ba3ad945fe

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\pepew(Copy 8).bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:292
    • C:\Users\Admin\AppData\Local\Temp\SRBMiner.exe
      SRBMiner.exe --algorithm xelishashv2_pepew --pool stratum+tcp://na.mining4people.com:4176 --wallet PRnLRcurtkNtVx2MYeKrVUWWk9oRPLk4zM --password x --worker RiG8 --disable-gpu
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1512
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c set
        3⤵
          PID:2912

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/292-34-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/292-0-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1512-47-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/1512-18-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1512-1-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1512-44-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1512-17-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1512-16-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1512-20-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1512-19-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1512-4-0x0000000356B30000-0x0000000356DE3000-memory.dmp

      Filesize

      2.7MB

    • memory/1512-38-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/1512-37-0x000000037C1A0000-0x000000037C231000-memory.dmp

      Filesize

      580KB

    • memory/1512-36-0x0000000356B30000-0x0000000356DE3000-memory.dmp

      Filesize

      2.7MB

    • memory/1512-35-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1512-39-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1512-43-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/1512-40-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1512-15-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/1512-48-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1512-11-0x000000037C1A0000-0x000000037C231000-memory.dmp

      Filesize

      580KB

    • memory/1512-55-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/1512-52-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1512-59-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/1512-56-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1512-60-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1512-67-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/1512-64-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1512-69-0x0000000356B30000-0x0000000356DE3000-memory.dmp

      Filesize

      2.7MB

    • memory/1512-71-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/1512-70-0x000000037C1A0000-0x000000037C231000-memory.dmp

      Filesize

      580KB

    • memory/1512-68-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1512-75-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/1512-72-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1512-79-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/1512-76-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB

    • memory/1512-83-0x00000002E3650000-0x00000002E3666000-memory.dmp

      Filesize

      88KB

    • memory/1512-80-0x0000000140000000-0x0000000143207000-memory.dmp

      Filesize

      50.0MB