Analysis

  • max time kernel
    139s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/10/2022, 23:53

General

  • Target

    fd841574710498c370be4b0bb43c4083fd5efb46c1ebb2683281eef9cb5d0ea6.exe

  • Size

    33KB

  • MD5

    48fee81acc6d21e67884f4c69b81a9df

  • SHA1

    41bf8f03db3b4c77196a1d4382344ff0e13c1a81

  • SHA256

    fd841574710498c370be4b0bb43c4083fd5efb46c1ebb2683281eef9cb5d0ea6

  • SHA512

    4273510087f1a85cc91db5731fa2db819710ebe35977edbcb235e006925a37ba2e69a20365624c4807ee453f7a0139684c8fe28dc04ffe69cfcee439128700a5

  • SSDEEP

    384:LCTFb4yUeSaSCn0l0DpRHh1I9UYrmUIkd6OlgXXQau+rT:KFkyS0n0l0l1p7kd64gnhRrT

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd841574710498c370be4b0bb43c4083fd5efb46c1ebb2683281eef9cb5d0ea6.exe
    "C:\Users\Admin\AppData\Local\Temp\fd841574710498c370be4b0bb43c4083fd5efb46c1ebb2683281eef9cb5d0ea6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4236
    • C:\Users\Admin\AppData\Local\Temp\irvigline.exe
      C:\Users\Admin\AppData\Local\Temp\irvigline.exe
      2⤵
      • Executes dropped EXE
      PID:2384

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\irvigline.exe

    Filesize

    33KB

    MD5

    3b279b1300ac05d50e309cf104d2993e

    SHA1

    408fc1db06f1178536382837820147017a8889de

    SHA256

    e9fc1d42dd67fa0023d873baac740702f929db9656dc9b263012d4f4012430cb

    SHA512

    620f3a9fe55eb1adaf8fad47cabd9bee9f46e3a8cb7c195f8b4b0554e6920dedcb4043e620b6dc4500ab1c34948b59599d898fb6964abe42eceef8927f5703c9

  • C:\Users\Admin\AppData\Local\Temp\irvigline.exe

    Filesize

    33KB

    MD5

    3b279b1300ac05d50e309cf104d2993e

    SHA1

    408fc1db06f1178536382837820147017a8889de

    SHA256

    e9fc1d42dd67fa0023d873baac740702f929db9656dc9b263012d4f4012430cb

    SHA512

    620f3a9fe55eb1adaf8fad47cabd9bee9f46e3a8cb7c195f8b4b0554e6920dedcb4043e620b6dc4500ab1c34948b59599d898fb6964abe42eceef8927f5703c9

  • memory/2384-136-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4236-135-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB