Overview
overview
3Static
static
3CD/!startF.cmd
windows7-x64
1CD/!startF.cmd
windows10-2004-x64
1CD/start.cmd
windows7-x64
1CD/start.cmd
windows10-2004-x64
1CD/startd.cmd
windows7-x64
1CD/startd.cmd
windows10-2004-x64
1links.htm
windows7-x64
3links.htm
windows10-2004-x64
3start.exe
windows7-x64
3start.exe
windows10-2004-x64
3startd.cmd
windows7-x64
3startd.cmd
windows10-2004-x64
3startf.exe
windows7-x64
3startf.exe
windows10-2004-x64
3Analysis
-
max time kernel
133s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 01:57
Static task
static1
Behavioral task
behavioral1
Sample
CD/!startF.cmd
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
CD/!startF.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
CD/start.cmd
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
CD/start.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
CD/startd.cmd
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
CD/startd.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
links.htm
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
links.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
start.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
start.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
startd.cmd
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
startd.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
startf.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
startf.exe
Resource
win10v2004-20240802-en
General
-
Target
CD/startd.cmd
-
Size
114B
-
MD5
50204828b87ca8f732fd755c2518dbb7
-
SHA1
ff07b258175fc16e33a05b933c49dea093f5abda
-
SHA256
f78b03e49c67959c3576138381912259dd22213cc78a4f86770cb95cf053ef44
-
SHA512
8625bc517aac0d7b357549bfc2a3441a2cef2784cd1d9d93bd6d95d071bf8895bd0c107ac0a76c7fc424fbefd82b67fff404bf1a5b4ad3f4a0d0b29aefccf4b8
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2452 wrote to memory of 5048 2452 cmd.exe 85 PID 2452 wrote to memory of 5048 2452 cmd.exe 85
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\CD\startd.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\system32\cmd.execmd.exe /D /C"(md c:\$uvs_285 || cd c:\$uvs_285) && copy /Y uvs\*.* c:\$uvs_285 && start c:\$uvs_285\start.exe /D"2⤵PID:5048
-