Analysis
-
max time kernel
1s -
max time network
40s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
04-11-2021 15:43
Static task
static1
Behavioral task
behavioral1
Sample
s.bat
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
s.bat
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
dwm-x64.exe
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral4
Sample
dwm-x64.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
s.bat
-
Size
88B
-
MD5
d69a52a259d3ed368cb3133745839e8b
-
SHA1
601a7608e6fc25fee199eed858f97748a308f2ff
-
SHA256
db4e4564fece5cd02bc4278237b09fe674e91d0f2b73e7f5cfb3a29471f192e7
-
SHA512
5159241ad07b297e500b83d9874eb001fe149d6819e123d1d32b3364a9f55830539abd98a8256b747054f238c1869560144521a1d6b05970a1e38f63527a9715
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1212 wrote to memory of 1504 1212 cmd.exe dwm-x64.exe PID 1212 wrote to memory of 1504 1212 cmd.exe dwm-x64.exe PID 1212 wrote to memory of 1504 1212 cmd.exe dwm-x64.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1504-54-0x0000000000000000-mapping.dmp