Analysis

  • max time kernel
    26s
  • max time network
    56s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    21-07-2021 14:05

General

  • Target

    ad2917599132e15656b78cca87799907.exe

  • Size

    6.6MB

  • MD5

    ad2917599132e15656b78cca87799907

  • SHA1

    6420a174293f9530ca89ff618ca9d42ac4a38c47

  • SHA256

    157da2de491550c5ac25dc65049e0d6188cb1cad5d5e6124afabf5627b669573

  • SHA512

    fa3c60abfc32d45f3dc442cffc6a4420b0eb57718c8aa65404fbeccf3aadc03a11c284473d6c091c7d596fa99142742632a3eaaec3c2d55e9891daf104b3f65b

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad2917599132e15656b78cca87799907.exe
    "C:\Users\Admin\AppData\Local\Temp\ad2917599132e15656b78cca87799907.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1660

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1660-60-0x0000000001120000-0x0000000001121000-memory.dmp

    Filesize

    4KB

  • memory/1660-62-0x0000000000200000-0x0000000000201000-memory.dmp

    Filesize

    4KB

  • memory/1660-63-0x0000000005180000-0x0000000005181000-memory.dmp

    Filesize

    4KB

  • memory/1660-64-0x000000000BE80000-0x000000000C620000-memory.dmp

    Filesize

    7.6MB

  • memory/1660-65-0x0000000000430000-0x0000000000431000-memory.dmp

    Filesize

    4KB

  • memory/1660-66-0x0000000005185000-0x0000000005196000-memory.dmp

    Filesize

    68KB

  • memory/1660-67-0x00000000106C0000-0x00000000106C1000-memory.dmp

    Filesize

    4KB

  • memory/1660-68-0x000000000D980000-0x000000000D981000-memory.dmp

    Filesize

    4KB

  • memory/1660-69-0x0000000010910000-0x0000000010911000-memory.dmp

    Filesize

    4KB

  • memory/1660-70-0x0000000010DF0000-0x0000000010DF1000-memory.dmp

    Filesize

    4KB