Analysis
-
max time kernel
40s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
05-07-2022 22:07
Static task
static1
Behavioral task
behavioral1
Sample
borrow-64.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
borrow-64.dll
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
cmd.bat
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral4
Sample
cmd.bat
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
cmd.bat
-
Size
191B
-
MD5
6bc8e4b5ba872d45efaca23a67d7b371
-
SHA1
97c5b35b39f32b356dc9337efbd3b1a7eda8de84
-
SHA256
6903d7c37e936ab55eac34849d59b338da9ff39eb57f2b5de533638a247a560e
-
SHA512
ffd6afbd2e3450c15ee46500d2e16574a50b8719903590bd6efb5c9c33184eceeba2a8abc0c76ba762e161fa4ee8b48a8842178ac9a39ceeda406aafbaf702f9
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 316 wrote to memory of 1108 316 cmd.exe rundll32.exe PID 316 wrote to memory of 1108 316 cmd.exe rundll32.exe PID 316 wrote to memory of 1108 316 cmd.exe rundll32.exe