Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14-02-2024 18:34
Static task
static1
Behavioral task
behavioral1
Sample
Document.lnk
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Document.lnk
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
hey/superstring.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
hey/superstring.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
hey/twelfth.bat
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
hey/twelfth.bat
Resource
win10v2004-20231222-en
General
-
Target
hey/twelfth.bat
-
Size
1KB
-
MD5
4e7c3ec7e4db2756209f5190355c3716
-
SHA1
183a6caaba0208f8bdfe3bf7e25f069ecddf19f5
-
SHA256
f2178583f6008d7ade32bb218bcd5d846859ce059875b4f603e18be57a59c7a8
-
SHA512
d3f3ddef38d17b9b2ac209719d6bcc83d13053abc9a97e4055f1b899fbfdba054317a5c94e2a688637b18440adb120065a89a7de5ae6b84ef7b91b8922bdd768
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1564 wrote to memory of 2232 1564 cmd.exe xcopy.exe PID 1564 wrote to memory of 2232 1564 cmd.exe xcopy.exe PID 1564 wrote to memory of 2232 1564 cmd.exe xcopy.exe