Analysis

  • max time kernel
    4294183s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20220310-en
  • submitted
    12-03-2022 11:03

General

  • Target

    874a1aee31e8a9de60baa7cc394697ceeb8caff9ffef3fbaa52b0881f56d4bf7.exe

  • Size

    552KB

  • MD5

    25e90845d6359aa8a144081318a18067

  • SHA1

    8e5cf239b0033de1aa9c101635e51c20f9a88394

  • SHA256

    874a1aee31e8a9de60baa7cc394697ceeb8caff9ffef3fbaa52b0881f56d4bf7

  • SHA512

    fbbc02d8b1b982950d7c67bc5be2d885b4212791e106b0dd5f9eea59543596d42e40eef636f67b078c7a34c33cecb676b05c6e38547d6869d1039af09f8c86cf

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

Processes

  • C:\Users\Admin\AppData\Local\Temp\874a1aee31e8a9de60baa7cc394697ceeb8caff9ffef3fbaa52b0881f56d4bf7.exe
    "C:\Users\Admin\AppData\Local\Temp\874a1aee31e8a9de60baa7cc394697ceeb8caff9ffef3fbaa52b0881f56d4bf7.exe"
    1⤵
      PID:1704

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1704-54-0x0000000073E90000-0x000000007443B000-memory.dmp

      Filesize

      5.7MB

    • memory/1704-55-0x00000000750C1000-0x00000000750C3000-memory.dmp

      Filesize

      8KB

    • memory/1704-56-0x0000000001DD0000-0x0000000001DD1000-memory.dmp

      Filesize

      4KB

    • memory/1704-57-0x0000000073E90000-0x000000007443B000-memory.dmp

      Filesize

      5.7MB