Analysis

  • max time kernel
    4294191s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20220310-en
  • submitted
    14-03-2022 18:02

General

  • Target

    b67f8adf12ac9fc182d38bab985b4b020ec35f614cb4956f587738ff111b8dc5.exe

  • Size

    553KB

  • MD5

    d504f0c38156c93ec2cdde1b42677499

  • SHA1

    1359c6b4b4e688935d56b12fd7aa3c541e57e177

  • SHA256

    b67f8adf12ac9fc182d38bab985b4b020ec35f614cb4956f587738ff111b8dc5

  • SHA512

    7272b6096ea19c5137042c64951f3571cc9c32de7008ed0474dd241e751c459d55b89aafdc15142a6899b2e14714a14acdad3144be6aa698580ee64dbbd21750

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b67f8adf12ac9fc182d38bab985b4b020ec35f614cb4956f587738ff111b8dc5.exe
    "C:\Users\Admin\AppData\Local\Temp\b67f8adf12ac9fc182d38bab985b4b020ec35f614cb4956f587738ff111b8dc5.exe"
    1⤵
      PID:808

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/808-54-0x00000000758A1000-0x00000000758A3000-memory.dmp

      Filesize

      8KB

    • memory/808-55-0x0000000074DE0000-0x000000007538B000-memory.dmp

      Filesize

      5.7MB

    • memory/808-56-0x0000000000590000-0x0000000000591000-memory.dmp

      Filesize

      4KB

    • memory/808-57-0x0000000074DE0000-0x000000007538B000-memory.dmp

      Filesize

      5.7MB