Analysis

  • max time kernel
    120s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    23-02-2022 00:01

General

  • Target

    043c169d0584b09a3b079fe7f34d61caf807b8ec8e0ab52c152d16f29fb2458c.exe

  • Size

    552KB

  • MD5

    541e971bd55a3659da4da1728d6b646b

  • SHA1

    b96bc48d66a6bad429d08c8d9ea10e4e6cd664c1

  • SHA256

    043c169d0584b09a3b079fe7f34d61caf807b8ec8e0ab52c152d16f29fb2458c

  • SHA512

    ade11924caca16c9b8427a165a76a77b2be97ec4c708008a91270bbfb0c9dea59c0e98adcecf4b3657c5b4a3ef6e6a4922d13e7c406d9d5df4791c3b7eeb4974

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

Processes

  • C:\Users\Admin\AppData\Local\Temp\043c169d0584b09a3b079fe7f34d61caf807b8ec8e0ab52c152d16f29fb2458c.exe
    "C:\Users\Admin\AppData\Local\Temp\043c169d0584b09a3b079fe7f34d61caf807b8ec8e0ab52c152d16f29fb2458c.exe"
    1⤵
      PID:960

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/960-55-0x0000000074E31000-0x0000000074E32000-memory.dmp

      Filesize

      4KB

    • memory/960-56-0x0000000076921000-0x0000000076923000-memory.dmp

      Filesize

      8KB

    • memory/960-57-0x0000000000BF0000-0x0000000000BF1000-memory.dmp

      Filesize

      4KB

    • memory/960-58-0x0000000074E32000-0x0000000074E34000-memory.dmp

      Filesize

      8KB