Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 04:12
Static task
static1
Behavioral task
behavioral1
Sample
56501a74701b17218b40e5921aa08d90732800e30da22a0604f7b00b59107b77.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
56501a74701b17218b40e5921aa08d90732800e30da22a0604f7b00b59107b77.exe
Resource
win10v2004-20220721-en
General
-
Target
56501a74701b17218b40e5921aa08d90732800e30da22a0604f7b00b59107b77.exe
-
Size
316KB
-
MD5
1c45b7d62fc40ce7e880a3bebe4051d1
-
SHA1
07455b99e37a43aa538e2320af133650ab4a8b79
-
SHA256
56501a74701b17218b40e5921aa08d90732800e30da22a0604f7b00b59107b77
-
SHA512
89d7cedf88a611294cf7d157468246673ef97037bd60acad792ac5dd5bde51012cfd003a6192fad663ebb7042ae435c7f389551d92ff8d6fa2b4beb909ac1060
Malware Config
Signatures
-
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
-
Drops file in Windows directory 1 IoCs
Processes:
56501a74701b17218b40e5921aa08d90732800e30da22a0604f7b00b59107b77.exedescription ioc process File created C:\Windows\Tasks\LingoRock.job 56501a74701b17218b40e5921aa08d90732800e30da22a0604f7b00b59107b77.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4816-130-0x00000000027A0000-0x00000000027CF000-memory.dmpFilesize
188KB