Analysis

  • max time kernel
    4294183s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    14-03-2022 01:47

General

  • Target

    dac34a584f289e392fadb3edf51f52463a7c50a7c088ea392e712eba6a26f76d.exe

  • Size

    552KB

  • MD5

    c0804c215cd82e53242d31fcd5d39e86

  • SHA1

    3a007500216eb82920927853b2e281a501849433

  • SHA256

    dac34a584f289e392fadb3edf51f52463a7c50a7c088ea392e712eba6a26f76d

  • SHA512

    18fef0a5a0beedeeaeb85ac2e711b6102858a4deeb8370f91b8314c3671aa7ba7d971c3158940a79895bfd4ef438848d14faf43742ce0ccfb8312ee946d629b2

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dac34a584f289e392fadb3edf51f52463a7c50a7c088ea392e712eba6a26f76d.exe
    "C:\Users\Admin\AppData\Local\Temp\dac34a584f289e392fadb3edf51f52463a7c50a7c088ea392e712eba6a26f76d.exe"
    1⤵
      PID:1836

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1836-54-0x0000000075801000-0x0000000075803000-memory.dmp

      Filesize

      8KB

    • memory/1836-56-0x0000000002280000-0x0000000002281000-memory.dmp

      Filesize

      4KB

    • memory/1836-55-0x0000000074F40000-0x00000000754EB000-memory.dmp

      Filesize

      5.7MB

    • memory/1836-57-0x0000000074F40000-0x00000000754EB000-memory.dmp

      Filesize

      5.7MB