Analysis
-
max time kernel
83s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2022 16:47
Static task
static1
Behavioral task
behavioral1
Sample
cmd.bat
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
cmd.bat
Resource
win10v2004-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral3
Sample
manage-32.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral4
Sample
manage-32.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
cmd.bat
-
Size
186B
-
MD5
449ca6f684e787e425d1078dbe5b3753
-
SHA1
5e20a80fecdd8393e163d09f71b857de0e5cff5e
-
SHA256
b3707c03eadf5cc88bd4c855ba3e85cb38617de8c3fe794ad56ce5557f385d68
-
SHA512
e97a20c9d73b774d1dcf9a7691a5d696e200c0b0587c3c80c1ea87c46e3f9282638c6f9acaeb716a75ee0a36e9a8a960291acf0a8aad52a50aa2f6624aa91ceb
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
cmd.exedescription pid process target process PID 2648 wrote to memory of 560 2648 cmd.exe rundll32.exe PID 2648 wrote to memory of 560 2648 cmd.exe rundll32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/560-132-0x0000000000000000-mapping.dmp