Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
14-06-2022 16:57
Static task
static1
Behavioral task
behavioral1
Sample
cmd.bat
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
cmd.bat
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
exhibitx32.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral4
Sample
exhibitx32.dll
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
cmd.bat
-
Size
192B
-
MD5
2ba4cdb275178d03055e23e5a9065a1c
-
SHA1
737372b47f45e4d5862e6ff2875a94b2c8b7ae12
-
SHA256
0218a30d52297f6d8a36a833b8a67b51e290ea7cebd6c403cf8cd7fb9dec5250
-
SHA512
c4c083c98fb790e03679d41b42e021a4a595203fccbda52142d3564640b76b46fc4130034c0a8e7e0d9f6c8ee49bcdad96e786a9f26028fe242ec43aeb4f15fc
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1092 wrote to memory of 1648 1092 cmd.exe rundll32.exe PID 1092 wrote to memory of 1648 1092 cmd.exe rundll32.exe PID 1092 wrote to memory of 1648 1092 cmd.exe rundll32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1648-54-0x0000000000000000-mapping.dmp