Analysis
-
max time kernel
172s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 05:37
Behavioral task
behavioral1
Sample
d07d5d1b63793df8c6adc2cf59bfdb8e97b32dbaa99c101b00a31a45172c329f.exe
Resource
win7-20220715-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
d07d5d1b63793df8c6adc2cf59bfdb8e97b32dbaa99c101b00a31a45172c329f.exe
Resource
win10v2004-20220721-en
2 signatures
150 seconds
General
-
Target
d07d5d1b63793df8c6adc2cf59bfdb8e97b32dbaa99c101b00a31a45172c329f.exe
-
Size
25KB
-
MD5
cc1e80f0566eb718d4473a31bbdcb812
-
SHA1
95a39bfe3b6146d5f5a7f77c22e8bc4c2b078b9c
-
SHA256
d07d5d1b63793df8c6adc2cf59bfdb8e97b32dbaa99c101b00a31a45172c329f
-
SHA512
903035ae6820e3f78dad1f1063414794d3507d7f526be256cf00e3da5e174d90b3aa729b27993b7690fc3607fa655dea0928b31b20900c688f471635092bf7d1
Score
6/10
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 24 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1008 d07d5d1b63793df8c6adc2cf59bfdb8e97b32dbaa99c101b00a31a45172c329f.exe 1008 d07d5d1b63793df8c6adc2cf59bfdb8e97b32dbaa99c101b00a31a45172c329f.exe