Analysis

  • max time kernel
    4294180s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20220310-en
  • submitted
    14-03-2022 17:36

General

  • Target

    b80a84f2e301665f4fe49d2b33a6bc25efd565cad9a7ad73e5750346cb9640cd.exe

  • Size

    552KB

  • MD5

    15bfaea98e4b5fae084e3df3cf813e38

  • SHA1

    a9b8d08ed14189eb5f23f04b0f8febe411e1b55b

  • SHA256

    b80a84f2e301665f4fe49d2b33a6bc25efd565cad9a7ad73e5750346cb9640cd

  • SHA512

    8a9a99bd11acdf35e457645b9f26ed3aacff61d7e0b99a3780898433e6bf298d3e4fb0e747e33ff4554619ecbf671e967f297589b4401857b2cc9281d0ccc1ff

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b80a84f2e301665f4fe49d2b33a6bc25efd565cad9a7ad73e5750346cb9640cd.exe
    "C:\Users\Admin\AppData\Local\Temp\b80a84f2e301665f4fe49d2b33a6bc25efd565cad9a7ad73e5750346cb9640cd.exe"
    1⤵
      PID:1748

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1748-54-0x0000000076AE1000-0x0000000076AE3000-memory.dmp

      Filesize

      8KB

    • memory/1748-56-0x0000000000330000-0x0000000000331000-memory.dmp

      Filesize

      4KB

    • memory/1748-55-0x0000000074EA0000-0x000000007544B000-memory.dmp

      Filesize

      5.7MB

    • memory/1748-57-0x0000000074EA0000-0x000000007544B000-memory.dmp

      Filesize

      5.7MB