Analysis

  • max time kernel
    4294183s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20220310-en
  • submitted
    10-03-2022 19:55

General

  • Target

    4cc802b63d37244b9a429b41b9877f9ca5bec8228cd89de54ee9a174baeb3804.exe

  • Size

    553KB

  • MD5

    02156b7788e18b515c56c62d04d77efd

  • SHA1

    24a4499830ad78de0d71f4e9a5e95e9e0e1119e4

  • SHA256

    4cc802b63d37244b9a429b41b9877f9ca5bec8228cd89de54ee9a174baeb3804

  • SHA512

    f516d06fc519bee942f480128b403d991d8ece15cb8b48a8688e1c98a15a44f12beadd0633c464ffc2083ceda73d206dc21874077c02abb9fec298428918bdf6

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4cc802b63d37244b9a429b41b9877f9ca5bec8228cd89de54ee9a174baeb3804.exe
    "C:\Users\Admin\AppData\Local\Temp\4cc802b63d37244b9a429b41b9877f9ca5bec8228cd89de54ee9a174baeb3804.exe"
    1⤵
      PID:1988

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1988-54-0x0000000075931000-0x0000000075933000-memory.dmp

      Filesize

      8KB

    • memory/1988-55-0x00000000744E0000-0x0000000074A8B000-memory.dmp

      Filesize

      5.7MB

    • memory/1988-56-0x00000000021C0000-0x00000000021C1000-memory.dmp

      Filesize

      4KB