Analysis
-
max time kernel
118s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10/10/2023, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
ddd.bat
Resource
win7-20230831-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
ddd.bat
Resource
win10v2004-20230915-en
2 signatures
150 seconds
General
-
Target
ddd.bat
-
Size
2KB
-
MD5
a890aaa4d936529cd8bd032d166922ca
-
SHA1
a4d7f79cbde5ed55464d4ecea93ba9ff80485a4f
-
SHA256
790d7c5887b3821cad07ea3da1db5aedc3d54c759f9545e66a7a963a657826f6
-
SHA512
5bdf3bed9394ffd468a979832e2040868a4e83d3bb95170476087068a0ac6804f1e3bd25518de5a50b1d8f7b23810dd47bebdd9a6e08277c77b8eae05286210e
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2628 wrote to memory of 2972 2628 cmd.exe 29 PID 2628 wrote to memory of 2972 2628 cmd.exe 29 PID 2628 wrote to memory of 2972 2628 cmd.exe 29 PID 2628 wrote to memory of 2552 2628 cmd.exe 30 PID 2628 wrote to memory of 2552 2628 cmd.exe 30 PID 2628 wrote to memory of 2552 2628 cmd.exe 30 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2552 attrib.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ddd.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\system32\mode.commode con cols=800 lines=1002⤵PID:2972
-
-
C:\Windows\system32\attrib.exeattrib +h C:\Users\Admin\AppData\Local\Temp\ddd.bat2⤵
- Views/modifies file attributes
PID:2552
-