Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 21:54
Static task
static1
Behavioral task
behavioral1
Sample
cmd.bat
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
cmd.bat
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
ordinary_64.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
ordinary_64.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
pony_.dll
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
pony_.dll
Resource
win10v2004-20220414-en
General
-
Target
cmd.bat
-
Size
193B
-
MD5
3ab361d7b51fddd7960c2d64d28d46e1
-
SHA1
dbcf599550d5905059d327514de60c127d5ffef4
-
SHA256
44669ee8730255483c81532bb329a606549f3ac4eba92be1a755cb95868e6cb7
-
SHA512
c2627aa3bffbf1abf0ffc66771e40b5c38199b0762caf83fe15eb0aa3d6c47c977b569324605d5c85334b478c123b35fc1b7cb56a3dd530db00a5e86649edfcd
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1968 wrote to memory of 1464 1968 cmd.exe rundll32.exe PID 1968 wrote to memory of 1464 1968 cmd.exe rundll32.exe PID 1968 wrote to memory of 1464 1968 cmd.exe rundll32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1464-54-0x0000000000000000-mapping.dmp