Overview
overview
10Static
static
ET.lnk
windows7-x64
10ET.lnk
windows10-1703-x64
10ET.lnk
windows10-2004-x64
10fumigating...es.cmd
windows7-x64
1fumigating...es.cmd
windows10-1703-x64
1fumigating...es.cmd
windows10-2004-x64
1fumigating/erupt.dll
windows7-x64
3fumigating/erupt.dll
windows10-1703-x64
3fumigating/erupt.dll
windows10-2004-x64
3fumigating...ty.cmd
windows7-x64
1fumigating...ty.cmd
windows10-1703-x64
1fumigating...ty.cmd
windows10-2004-x64
1Analysis
-
max time kernel
200s -
max time network
335s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
08-12-2022 14:08
Static task
static1
Behavioral task
behavioral1
Sample
ET.lnk
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ET.lnk
Resource
win10-20220812-en
Behavioral task
behavioral3
Sample
ET.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral4
Sample
fumigating/actuaries.cmd
Resource
win7-20220812-en
Behavioral task
behavioral5
Sample
fumigating/actuaries.cmd
Resource
win10-20220812-en
Behavioral task
behavioral6
Sample
fumigating/actuaries.cmd
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
fumigating/erupt.dll
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
fumigating/erupt.dll
Resource
win10-20220901-en
Behavioral task
behavioral9
Sample
fumigating/erupt.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral10
Sample
fumigating/perplexity.cmd
Resource
win7-20221111-en
Behavioral task
behavioral11
Sample
fumigating/perplexity.cmd
Resource
win10-20220901-en
Behavioral task
behavioral12
Sample
fumigating/perplexity.cmd
Resource
win10v2004-20221111-en
General
-
Target
fumigating/perplexity.cmd
-
Size
286B
-
MD5
c9272f3098f5af0eb3179c5c764e5cd5
-
SHA1
fa991da35d87d491c373e1ea90500f885ceb645d
-
SHA256
8821636bd9b82c303dc65dcfa986ee1d1b67463a84bfe940ee19d3dff86f2dcf
-
SHA512
04f25f060ab5d4b4b64cd8afdfdff808056346a9a8f1c9bf13a7948874c9360b91f707b79b5f292e8fd2ca6f0111bfccef6eeef7a20c0411c6e1ea971eda7153
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1872 wrote to memory of 996 1872 cmd.exe replace.exe PID 1872 wrote to memory of 996 1872 cmd.exe replace.exe PID 1872 wrote to memory of 996 1872 cmd.exe replace.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/996-54-0x0000000000000000-mapping.dmp