Analysis Overview
SHA256
6feeea94219e2b7ffd3837d784201bf28ffd7bc83706401bf656550485d899cc
Threat Level: No (potentially) malicious behavior was detected
The file 6feeea94219e2b7ffd3837d784201bf28ffd7bc83706401bf656550485d899cc was found to be: No (potentially) malicious behavior was detected.
Malicious Activity Summary
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2020-07-06 07:26
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2020-07-06 07:26
Reported
2020-07-06 07:32
Platform
win7
Max time kernel
120s
Max time network
126s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\6feeea94219e2b7ffd3837d784201bf28ffd7bc83706401bf656550485d899cc.exe
"C:\Users\Admin\AppData\Local\Temp\6feeea94219e2b7ffd3837d784201bf28ffd7bc83706401bf656550485d899cc.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 10.7.0.255:138 | udp | |
| N/A | 239.255.255.250:1900 | udp | |
| N/A | 239.255.255.250:1900 | udp | |
| N/A | 10.7.0.255:137 | udp |
Files
Analysis: behavioral2
Detonation Overview
Submitted
2020-07-06 07:26
Reported
2020-07-06 07:32
Platform
win10
Max time kernel
74s
Max time network
125s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\6feeea94219e2b7ffd3837d784201bf28ffd7bc83706401bf656550485d899cc.exe
"C:\Users\Admin\AppData\Local\Temp\6feeea94219e2b7ffd3837d784201bf28ffd7bc83706401bf656550485d899cc.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 239.255.255.250:1900 | udp | |
| N/A | 239.255.255.250:1900 | udp | |
| N/A | 127.0.0.1:47001 | tcp | |
| N/A | 10.10.0.255:137 | udp | |
| N/A | 10.10.0.40:137 | udp | |
| N/A | 10.10.0.14:137 | udp | |
| N/A | 10.10.0.25:137 | udp | |
| N/A | 10.10.0.21:137 | udp | |
| N/A | 10.10.0.23:137 | udp | |
| N/A | 10.10.0.11:137 | udp | |
| N/A | 10.10.0.32:137 | udp | |
| N/A | 10.10.0.13:137 | udp | |
| N/A | 10.10.0.10:137 | udp |