Analysis
-
max time kernel
136s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:29
Static task
static1
Behavioral task
behavioral1
Sample
22052024_0229_update.cmd
Resource
win7-20240221-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
22052024_0229_update.cmd
Resource
win10v2004-20240508-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
22052024_0229_update.cmd
-
Size
1KB
-
MD5
f82ed0d36d76909d586cca6965b6df07
-
SHA1
17ab6836e86dda0db9209747ba1c7bd78a818e15
-
SHA256
f0e14777df414adca02f5bc411675664bec7b2348a6710113aabaff9a592e6ed
-
SHA512
e794fae26290a38ddd5f9dfc66e4c62e1e928a92b982c1315b759f25b3c2e10ef649ba021a3e4a895925cd1e8c4e43748172b4976c971ce5057ecb017fc421a0
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
cmd.execmd.exedescription pid process target process PID 4736 wrote to memory of 5020 4736 cmd.exe cmd.exe PID 4736 wrote to memory of 5020 4736 cmd.exe cmd.exe PID 5020 wrote to memory of 756 5020 cmd.exe cmd.exe PID 5020 wrote to memory of 756 5020 cmd.exe cmd.exe PID 5020 wrote to memory of 5052 5020 cmd.exe cmd.exe PID 5020 wrote to memory of 5052 5020 cmd.exe cmd.exe PID 5020 wrote to memory of 3548 5020 cmd.exe cmd.exe PID 5020 wrote to memory of 3548 5020 cmd.exe cmd.exe PID 5020 wrote to memory of 116 5020 cmd.exe cmd.exe PID 5020 wrote to memory of 116 5020 cmd.exe cmd.exe PID 5020 wrote to memory of 4832 5020 cmd.exe cmd.exe PID 5020 wrote to memory of 4832 5020 cmd.exe cmd.exe PID 5020 wrote to memory of 3596 5020 cmd.exe cmd.exe PID 5020 wrote to memory of 3596 5020 cmd.exe cmd.exe PID 5020 wrote to memory of 2240 5020 cmd.exe cmd.exe PID 5020 wrote to memory of 2240 5020 cmd.exe cmd.exe PID 5020 wrote to memory of 2652 5020 cmd.exe cmd.exe PID 5020 wrote to memory of 2652 5020 cmd.exe cmd.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\22052024_0229_update.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\22052024_0229_update.cmd" MY_FLAG2⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\Pictures\kam.cmd""3⤵PID:756
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\Pictures\las.cmd""3⤵PID:5052
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\Pictures\zap.cmd""3⤵PID:3548
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\Pictures\sample.cmd""3⤵PID:116
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\Pictures\xff.cmd""3⤵PID:4832
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\Pictures\time.cmd""3⤵PID:3596
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\Pictures\upload.cmd""3⤵PID:2240
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\Pictures\update.cmd""3⤵PID:2652