Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    31-07-2022 05:37

General

  • Target

    d07d5d1b63793df8c6adc2cf59bfdb8e97b32dbaa99c101b00a31a45172c329f.exe

  • Size

    25KB

  • MD5

    cc1e80f0566eb718d4473a31bbdcb812

  • SHA1

    95a39bfe3b6146d5f5a7f77c22e8bc4c2b078b9c

  • SHA256

    d07d5d1b63793df8c6adc2cf59bfdb8e97b32dbaa99c101b00a31a45172c329f

  • SHA512

    903035ae6820e3f78dad1f1063414794d3507d7f526be256cf00e3da5e174d90b3aa729b27993b7690fc3607fa655dea0928b31b20900c688f471635092bf7d1

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d07d5d1b63793df8c6adc2cf59bfdb8e97b32dbaa99c101b00a31a45172c329f.exe
    "C:\Users\Admin\AppData\Local\Temp\d07d5d1b63793df8c6adc2cf59bfdb8e97b32dbaa99c101b00a31a45172c329f.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1940

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1940-54-0x00000000762A1000-0x00000000762A3000-memory.dmp
    Filesize

    8KB