Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-06-2022 17:26
Static task
static1
Behavioral task
behavioral1
Sample
cmd.bat
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
cmd.bat
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
erupt-x32.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
erupt-x32.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
sugar_x64.dll
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
sugar_x64.dll
Resource
win10v2004-20220414-en
General
-
Target
cmd.bat
-
Size
191B
-
MD5
dd156bbe1aebb324ea62611e7261bb25
-
SHA1
767d652a462a1d7cd710c49b3ffc2ecbb224beca
-
SHA256
e186ec154043943a8f05303633a2938ced627f4661b08ab345cc12a4b657ee53
-
SHA512
27d47ecc508735beea48070b5b229c97e0346fe99160d817ac5e8b10e34d83f69cd489eeb156489e4a6c06ce38abee7e80a52bf3b1271d229d48eaa0da0d54a7
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
cmd.exedescription pid process target process PID 3316 wrote to memory of 2064 3316 cmd.exe rundll32.exe PID 3316 wrote to memory of 2064 3316 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cmd.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\core\erupt-x32.dat,DllMain --ma="license.dat"2⤵PID:2064