Resubmissions
17-03-2022 16:28
220317-tyt45schbr 102-03-2022 07:56
220302-js74psdhh5 1024-02-2022 19:52
220224-ylj6maehbj 1Analysis
-
max time kernel
133s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
24-02-2022 19:52
Static task
static1
Behavioral task
behavioral1
Sample
core.bat
Resource
win7-20220223-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
core.bat
Resource
win10v2004-en-20220113
windows10-2004_x64
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
pumpkin-32.dll
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral4
Sample
pumpkin-32.dll
Resource
win10v2004-en-20220113
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
core.bat
-
Size
188B
-
MD5
5d557256208a36dcd239278ba626f30c
-
SHA1
1e54238d55ab57ab5e7b787d3f369d6a02374d2b
-
SHA256
26cfdedc156563695d6188240fa38ee5d3b29e468dee368facf66b8710eae3e2
-
SHA512
2cd8215e99f4d61035747670dd2109aa806fe4c505648982926bb1bd886eadf1da583823e019e8af34939531bf669b6ffb19a334f3c3e678c56a7f5ebe2745ad
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
cmd.exedescription pid process target process PID 2140 wrote to memory of 2972 2140 cmd.exe rundll32.exe PID 2140 wrote to memory of 2972 2140 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\core.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\pumpkin-32.tmp,DllMain /i="license.dat"2⤵PID:2972
-