Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2023, 05:26
Static task
static1
Behavioral task
behavioral1
Sample
使用帮助.chm
Resource
win7-20231020-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
使用帮助.chm
Resource
win10v2004-20231023-en
0 signatures
150 seconds
Behavioral task
behavioral3
Sample
点击打开.bat
Resource
win7-20231023-en
1 signatures
150 seconds
Behavioral task
behavioral4
Sample
点击打开.bat
Resource
win10v2004-20231020-en
1 signatures
150 seconds
General
-
Target
点击打开.bat
-
Size
263B
-
MD5
b071d93fd0b7e2b770deb97b199efe8a
-
SHA1
1154885d4ef21caee5339336b098c4afd9c7da10
-
SHA256
32ef94fd23ca1e28756ad1b3990775d99f1c59d645f9c867c5129480a5121939
-
SHA512
65b2bc000a9b7b01116c6af4635ca6e5617e69c95c0b848e7f6d0e8e71c7e88effa01ef527c8e8eb76a9be1b49ba463ec477f2debc3bae297c038faead31f39b
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4596 wrote to memory of 4492 4596 cmd.exe 87 PID 4596 wrote to memory of 4492 4596 cmd.exe 87
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\点击打开.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0" /v "1201" /d "0" /t REG_DWORD /f2⤵PID:4492
-