Analysis
-
max time kernel
301s -
max time network
273s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2023 18:31
Behavioral task
behavioral1
Sample
1.bat
Resource
win10v2004-20231020-en
Behavioral task
behavioral2
Sample
2.bat
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
3.bat
Resource
win10v2004-20231023-en
Behavioral task
behavioral4
Sample
exe/ntregopt.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
exe/reshacker.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral6
Sample
exe/upx.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
reg.bat
Resource
win10v2004-20231020-en
General
-
Target
reg.bat
-
Size
4KB
-
MD5
2329da61fff0c2a03feb6892d8672f20
-
SHA1
fb3c252a80727fe051c3d4ff822a62519b965e20
-
SHA256
c0d5406ec03324dcb171272a0671d4da87f3d9df2533a0f78bbc2354762d1833
-
SHA512
6f3b1babab9015ff2fef194ed20428398091eb8459e3474c0fc77e99419e7f9c38d70de8258e527b2bae87d617605c380d2004dfa693602930de182ba89d356f
-
SSDEEP
48:6Zh8+K0xVjZhEssb8/IecfE13O4lRooptoE9HD5gjDKnE22Qo0L0wB9F8Vevd4lp:6D8+K0xRRp5lSopmE9HVij0LzlvKHklo
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3512 wrote to memory of 3696 3512 cmd.exe 85 PID 3512 wrote to memory of 3696 3512 cmd.exe 85 PID 3696 wrote to memory of 1956 3696 cmd.exe 87 PID 3696 wrote to memory of 1956 3696 cmd.exe 87 PID 1956 wrote to memory of 3616 1956 cmd.exe 88 PID 1956 wrote to memory of 3616 1956 cmd.exe 88 PID 3616 wrote to memory of 1764 3616 cmd.exe 89 PID 3616 wrote to memory of 1764 3616 cmd.exe 89 PID 1764 wrote to memory of 4724 1764 cmd.exe 90 PID 1764 wrote to memory of 4724 1764 cmd.exe 90 PID 4724 wrote to memory of 1488 4724 cmd.exe 91 PID 4724 wrote to memory of 1488 4724 cmd.exe 91 PID 1488 wrote to memory of 2328 1488 cmd.exe 92 PID 1488 wrote to memory of 2328 1488 cmd.exe 92 PID 2328 wrote to memory of 2844 2328 cmd.exe 93 PID 2328 wrote to memory of 2844 2328 cmd.exe 93 PID 2844 wrote to memory of 4016 2844 cmd.exe 94 PID 2844 wrote to memory of 4016 2844 cmd.exe 94 PID 4016 wrote to memory of 4064 4016 cmd.exe 95 PID 4016 wrote to memory of 4064 4016 cmd.exe 95 PID 4064 wrote to memory of 2620 4064 cmd.exe 96 PID 4064 wrote to memory of 2620 4064 cmd.exe 96 PID 2620 wrote to memory of 4204 2620 cmd.exe 97 PID 2620 wrote to memory of 4204 2620 cmd.exe 97 PID 4204 wrote to memory of 5004 4204 cmd.exe 98 PID 4204 wrote to memory of 5004 4204 cmd.exe 98 PID 5004 wrote to memory of 1328 5004 cmd.exe 99 PID 5004 wrote to memory of 1328 5004 cmd.exe 99 PID 1328 wrote to memory of 4288 1328 cmd.exe 100 PID 1328 wrote to memory of 4288 1328 cmd.exe 100 PID 4288 wrote to memory of 3364 4288 cmd.exe 101 PID 4288 wrote to memory of 3364 4288 cmd.exe 101 PID 3364 wrote to memory of 4940 3364 cmd.exe 102 PID 3364 wrote to memory of 4940 3364 cmd.exe 102 PID 4940 wrote to memory of 4304 4940 cmd.exe 103 PID 4940 wrote to memory of 4304 4940 cmd.exe 103 PID 4304 wrote to memory of 336 4304 cmd.exe 104 PID 4304 wrote to memory of 336 4304 cmd.exe 104 PID 336 wrote to memory of 4700 336 cmd.exe 105 PID 336 wrote to memory of 4700 336 cmd.exe 105 PID 4700 wrote to memory of 4876 4700 cmd.exe 106 PID 4700 wrote to memory of 4876 4700 cmd.exe 106 PID 4876 wrote to memory of 2692 4876 cmd.exe 107 PID 4876 wrote to memory of 2692 4876 cmd.exe 107 PID 2692 wrote to memory of 2036 2692 cmd.exe 108 PID 2692 wrote to memory of 2036 2692 cmd.exe 108 PID 2036 wrote to memory of 3136 2036 cmd.exe 109 PID 2036 wrote to memory of 3136 2036 cmd.exe 109 PID 3136 wrote to memory of 4052 3136 cmd.exe 110 PID 3136 wrote to memory of 4052 3136 cmd.exe 110 PID 4052 wrote to memory of 2744 4052 cmd.exe 111 PID 4052 wrote to memory of 2744 4052 cmd.exe 111 PID 2744 wrote to memory of 2688 2744 cmd.exe 112 PID 2744 wrote to memory of 2688 2744 cmd.exe 112 PID 2688 wrote to memory of 4356 2688 cmd.exe 113 PID 2688 wrote to memory of 4356 2688 cmd.exe 113 PID 4356 wrote to memory of 3564 4356 cmd.exe 114 PID 4356 wrote to memory of 3564 4356 cmd.exe 114 PID 3564 wrote to memory of 4836 3564 cmd.exe 115 PID 3564 wrote to memory of 4836 3564 cmd.exe 115 PID 4836 wrote to memory of 4932 4836 cmd.exe 116 PID 4836 wrote to memory of 4932 4836 cmd.exe 116 PID 4932 wrote to memory of 4752 4932 cmd.exe 117 PID 4932 wrote to memory of 4752 4932 cmd.exe 117
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\reg.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR2⤵
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR3⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR4⤵
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR5⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR6⤵
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR7⤵
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR8⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR9⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR10⤵
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR11⤵
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR12⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR13⤵
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR14⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR15⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR16⤵
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR17⤵
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR18⤵
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR19⤵
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR20⤵
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR21⤵
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR22⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR23⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR24⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR25⤵
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR26⤵
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR27⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR28⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR29⤵
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR30⤵
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR31⤵
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR32⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR33⤵PID:4752
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR34⤵PID:4652
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR35⤵PID:3496
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR36⤵PID:1976
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR37⤵PID:3900
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR38⤵PID:1644
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR39⤵PID:2100
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR40⤵PID:4080
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR41⤵PID:3520
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR42⤵PID:3116
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR43⤵PID:5008
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR44⤵PID:3208
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR45⤵PID:2080
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR46⤵PID:3504
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR47⤵PID:5080
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR48⤵PID:2544
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR49⤵PID:484
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR50⤵PID:2084
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR51⤵PID:388
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR52⤵PID:816
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR53⤵PID:1168
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR54⤵PID:1076
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR55⤵PID:2412
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR56⤵PID:1544
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR57⤵PID:2748
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR58⤵PID:4436
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR59⤵PID:4856
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR60⤵PID:1924
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR61⤵PID:1596
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR62⤵PID:3796
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR63⤵PID:4544
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR64⤵PID:4784
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR65⤵PID:2972
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR66⤵PID:2392
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR67⤵PID:3412
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR68⤵PID:212
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR69⤵PID:2252
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR70⤵PID:4656
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR71⤵PID:4892
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR72⤵PID:4412
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR73⤵PID:1964
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR74⤵PID:4108
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR75⤵PID:4240
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR76⤵PID:764
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR77⤵PID:3976
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR78⤵PID:1612
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR79⤵PID:3840
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR80⤵PID:3872
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR81⤵PID:4484
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR82⤵PID:3000
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR83⤵PID:5128
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR84⤵PID:5164
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR85⤵PID:5196
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR86⤵PID:5228
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR87⤵PID:5252
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR88⤵PID:5288
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR89⤵PID:5312
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR90⤵PID:5360
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR91⤵PID:5384
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR92⤵PID:5440
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR93⤵PID:5488
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR94⤵PID:5508
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR95⤵PID:5528
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR96⤵PID:5552
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR97⤵PID:5572
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR98⤵PID:5592
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR99⤵PID:5624
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR100⤵PID:5640
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR101⤵PID:5656
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR102⤵PID:5672
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR103⤵PID:5688
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR104⤵PID:5704
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR105⤵PID:5720
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR106⤵PID:5736
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR107⤵PID:5752
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR108⤵PID:5772
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR109⤵PID:5788
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR110⤵PID:5804
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR111⤵PID:5820
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR112⤵PID:5836
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR113⤵PID:5852
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR114⤵PID:5868
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR115⤵PID:5884
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR116⤵PID:5900
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR117⤵PID:5916
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR118⤵PID:5932
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR119⤵PID:5948
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR120⤵PID:5964
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR121⤵PID:5980
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCR122⤵PID:5996
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-