Analysis

  • max time kernel
    154s
  • max time network
    174s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    12-07-2022 11:54

General

  • Target

    4ad959759e71a47614f6059dcc8ec03ddd0cfda08b2f37a7d842277bebb422ad.exe

  • Size

    433KB

  • MD5

    789642b1d784a05de91de6f74a2e61ba

  • SHA1

    82a27918673c1c0a41e9739f0f41ca25620ed9e7

  • SHA256

    4ad959759e71a47614f6059dcc8ec03ddd0cfda08b2f37a7d842277bebb422ad

  • SHA512

    59f703572b07431298eceda28d8195c00b61c9b6afe9a2477fe605400166be60f4281a4c48dd1e9ffad90eea7aa7da5d31638cb3235056f403b85f5dfa1d1cd5

Score
10/10

Malware Config

Signatures

  • OnlyLogger

    A tiny loader that uses IPLogger to get its payload.

  • OnlyLogger payload 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ad959759e71a47614f6059dcc8ec03ddd0cfda08b2f37a7d842277bebb422ad.exe
    "C:\Users\Admin\AppData\Local\Temp\4ad959759e71a47614f6059dcc8ec03ddd0cfda08b2f37a7d842277bebb422ad.exe"
    1⤵
      PID:1700

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1700-54-0x00000000753B1000-0x00000000753B3000-memory.dmp
      Filesize

      8KB

    • memory/1700-56-0x0000000000250000-0x0000000000294000-memory.dmp
      Filesize

      272KB

    • memory/1700-55-0x0000000002C7D000-0x0000000002CA5000-memory.dmp
      Filesize

      160KB

    • memory/1700-57-0x0000000000400000-0x0000000002B34000-memory.dmp
      Filesize

      39.2MB

    • memory/1700-58-0x0000000002C7D000-0x0000000002CA5000-memory.dmp
      Filesize

      160KB

    • memory/1700-59-0x0000000000400000-0x0000000002B34000-memory.dmp
      Filesize

      39.2MB