Analysis

  • max time kernel
    302s
  • max time network
    272s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    23-08-2021 20:55

General

  • Target

    wTzxLyAQL7H5FI0GIaor5FbA.exe

  • Size

    900KB

  • MD5

    7714deedb24c3dcfa81dc660dd383492

  • SHA1

    56fae3ab1186009430e175c73b914c77ed714cc0

  • SHA256

    435badbad2fc138245a4771a74ebb9075658e294d1bcfcf191ccea466eea825c

  • SHA512

    2cf05ac9470ab4e6d487ec9e4d7ab36fb2c8ce1405dba01b58934778829c7c4db703818087e0c5fbffe6cf821dfa190427e1205530409359ace2ad416e781c58

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

Processes

  • C:\Users\Admin\AppData\Local\Temp\wTzxLyAQL7H5FI0GIaor5FbA.exe
    "C:\Users\Admin\AppData\Local\Temp\wTzxLyAQL7H5FI0GIaor5FbA.exe"
    1⤵
      PID:500

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/500-118-0x000001A212600000-0x000001A212761000-memory.dmp
      Filesize

      1.4MB

    • memory/500-117-0x000001A2123B0000-0x000001A212494000-memory.dmp
      Filesize

      912KB