Analysis

  • max time kernel
    163s
  • max time network
    168s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 08:17

General

  • Target

    af206c939729b643b08fc1b7e658b2d260361ed6f815a300ded77f1c52ea9c83.exe

  • Size

    237KB

  • MD5

    80272345b9aaa156902a2aa19e8b8e80

  • SHA1

    e264e179e6ffdf9d088af15eec7bf27a2c5f24d4

  • SHA256

    af206c939729b643b08fc1b7e658b2d260361ed6f815a300ded77f1c52ea9c83

  • SHA512

    3dab12d2ab19ce1753719ae56103d3bd9211e89a21583ac0dc8d2b2a9bbd7474c6990fdc8650eddc6e35825681239c14edd0c945113872843d0573cd615f0d1c

  • SSDEEP

    3072:/XWEfZ+gCZJSWcjg9MmBhDXuCbt/EElxrCbgXtoCqtTBfTMylOo3:/X1BPCbr9ZD+Ch/EQxrRXCCqtTBmo3

Score
7/10

Malware Config

Signatures

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af206c939729b643b08fc1b7e658b2d260361ed6f815a300ded77f1c52ea9c83.exe
    "C:\Users\Admin\AppData\Local\Temp\af206c939729b643b08fc1b7e658b2d260361ed6f815a300ded77f1c52ea9c83.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1676

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1676-54-0x0000000074C91000-0x0000000074C93000-memory.dmp

    Filesize

    8KB