Analysis

  • max time kernel
    4294183s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20220223-en
  • submitted
    10-03-2022 02:33

General

  • Target

    6d1a0ed948c798de95e7bdd984392fa873bee68cb9041c8145bb56fe28a682d9.exe

  • Size

    552KB

  • MD5

    c698d914efc095070f1a1cde5344790e

  • SHA1

    f0eab2c4599f50ee5e4cf9f0cf8ddc8cc609ef46

  • SHA256

    6d1a0ed948c798de95e7bdd984392fa873bee68cb9041c8145bb56fe28a682d9

  • SHA512

    e6b414d1bc0e2ae755b6132b3f7fe3caffc41016bce44f7391d150ecb107e317c1237566fa610f4a440cc34bac6d26e26bd0957181bb2fdbb40808cb86c3e59a

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d1a0ed948c798de95e7bdd984392fa873bee68cb9041c8145bb56fe28a682d9.exe
    "C:\Users\Admin\AppData\Local\Temp\6d1a0ed948c798de95e7bdd984392fa873bee68cb9041c8145bb56fe28a682d9.exe"
    1⤵
      PID:1104

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1104-54-0x0000000074FF1000-0x0000000074FF3000-memory.dmp

      Filesize

      8KB

    • memory/1104-55-0x00000000744B0000-0x0000000074A5B000-memory.dmp

      Filesize

      5.7MB

    • memory/1104-56-0x0000000000A30000-0x0000000000A31000-memory.dmp

      Filesize

      4KB

    • memory/1104-57-0x00000000744B0000-0x0000000074A5B000-memory.dmp

      Filesize

      5.7MB