Analysis

  • max time kernel
    4294180s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    15-03-2022 14:31

General

  • Target

    f891bd59c1f20b763e196ab43a8579cb39e4aa9122f5dcf3cff0b4ef72b880e0.exe

  • Size

    552KB

  • MD5

    6ecbb3a6667cfa539b220a0e48067c5d

  • SHA1

    3bd94922e5d70fdbf117a403a95047c471895e07

  • SHA256

    f891bd59c1f20b763e196ab43a8579cb39e4aa9122f5dcf3cff0b4ef72b880e0

  • SHA512

    eb727cba1ba6d34e28c6e050d18200bf4abff8b84cad2523238a3b04a9b6219b658567bf4850ea3f7cb01e2d11defd7306576110a3ff77665c5e61d22eb126f0

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f891bd59c1f20b763e196ab43a8579cb39e4aa9122f5dcf3cff0b4ef72b880e0.exe
    "C:\Users\Admin\AppData\Local\Temp\f891bd59c1f20b763e196ab43a8579cb39e4aa9122f5dcf3cff0b4ef72b880e0.exe"
    1⤵
      PID:2032

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2032-54-0x0000000074C91000-0x0000000074C93000-memory.dmp

      Filesize

      8KB

    • memory/2032-55-0x0000000074350000-0x00000000748FB000-memory.dmp

      Filesize

      5.7MB

    • memory/2032-56-0x00000000022A0000-0x00000000022A1000-memory.dmp

      Filesize

      4KB

    • memory/2032-57-0x0000000074350000-0x00000000748FB000-memory.dmp

      Filesize

      5.7MB