Analysis
-
max time kernel
151s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
resource tags
arch:x64arch:x86image:win10v2004-20220414-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2022 15:42
Static task
static1
Behavioral task
behavioral1
Sample
cmd.bat
Resource
win7-20220414-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
cmd.bat
Resource
win10v2004-20220414-en
windows10-2004-x64
1 signatures
150 seconds
Behavioral task
behavioral3
Sample
receive-64.dll
Resource
win7-20220414-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral4
Sample
receive-64.dll
Resource
win10v2004-20220414-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
cmd.bat
-
Size
192B
-
MD5
966d235cf7f9966972c8c9325216bdc9
-
SHA1
b50704c9a0ef70637a9c0ab8144595a010e445a9
-
SHA256
b8025c914752b5ed8db55b595521ba7c15d93d3c6fcd9e3476b17b228c075d8c
-
SHA512
8f8be6bcdf23dd56915d4fedcea633f5d58d05c7633cd2620edfbceb605c29e92e0219c0d5089ed93823e35998137bebdc9c84bce304f153ac46b7feff1fee35
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
cmd.exedescription pid process target process PID 2240 wrote to memory of 1404 2240 cmd.exe rundll32.exe PID 2240 wrote to memory of 1404 2240 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cmd.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\core\receive-64.dat,DllMain --ma="license.dat"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1404-130-0x0000000000000000-mapping.dmp