Analysis

  • max time kernel
    112s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    14-06-2022 20:10

General

  • Target

    2d3538b68e1ae29ca4860e72a3767e51392c6ea40c6fac5b3da6479b5aef7aba.exe

  • Size

    129KB

  • MD5

    421b7fe098088b35d608b50e8043ca60

  • SHA1

    2590909f1994a900b73dea9ed928ac7cec792ead

  • SHA256

    2d3538b68e1ae29ca4860e72a3767e51392c6ea40c6fac5b3da6479b5aef7aba

  • SHA512

    df665e8b68e0ee873b6bd9ce240295a1ba867afb903823791c24339ad0a813e4b511453a4f7373c0f4652a17592e9fd2e0375b8189b498fefa9440494990ab1d

Score
7/10

Malware Config

Signatures

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d3538b68e1ae29ca4860e72a3767e51392c6ea40c6fac5b3da6479b5aef7aba.exe
    "C:\Users\Admin\AppData\Local\Temp\2d3538b68e1ae29ca4860e72a3767e51392c6ea40c6fac5b3da6479b5aef7aba.exe"
    1⤵
      PID:452

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads