Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
18-07-2022 18:35
Static task
static1
Behavioral task
behavioral1
Sample
Details.exe
Resource
win7-20220718-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Details.exe
Resource
win10v2004-20220718-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
Details.exe
-
Size
224KB
-
MD5
913fcca8aa37351d548fcb1ef3af9f10
-
SHA1
8955832408079abc33723d48135f792c9930b598
-
SHA256
2f59e661904f9a4c62123f024eb7968cdc234f826bab077914ad8896ebf001c9
-
SHA512
0283e875dfbc7b04eb5ce5a82e66fb99e945626ed7e2ed4f2bc90e54e4ef99c065e2f98464f0aec24c921bae020ff3a6f1b3a01bfd8bdcea8459113670519c2b
Score
10/10
Malware Config
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1420-57-0x0000000000400000-0x00000000004BF000-memory.dmp family_onlylogger behavioral1/memory/1420-56-0x0000000000220000-0x0000000000250000-memory.dmp family_onlylogger
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1420-54-0x0000000075591000-0x0000000075593000-memory.dmpFilesize
8KB
-
memory/1420-57-0x0000000000400000-0x00000000004BF000-memory.dmpFilesize
764KB
-
memory/1420-56-0x0000000000220000-0x0000000000250000-memory.dmpFilesize
192KB
-
memory/1420-55-0x00000000005AB000-0x00000000005C7000-memory.dmpFilesize
112KB