Analysis

  • max time kernel
    147s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20-10-2022 09:07

General

  • Target

    240ba65fafdc26aab40107b4787752610f477911a8bbff15e9b64212bb7851cb.exe

  • Size

    225KB

  • MD5

    8024fef95b803546ec17dad086812f00

  • SHA1

    5a9fe21a2c72b9ebda222e693594ab584bdef1ad

  • SHA256

    240ba65fafdc26aab40107b4787752610f477911a8bbff15e9b64212bb7851cb

  • SHA512

    e7a90a1b1b7dd35515737446377a8c7c8f5640caa2f2729dddeb563faeec8ac27f1bfd175273efe5d4ad38c2b78b1e55074d8580e84d4b388ca455011391371a

  • SSDEEP

    6144:HaLOHXkaSSxtmrR3h0+LNC0Kd1B4O+Vdmh/3Yj9MPcU+2enqtTBiN30:HJ3kVSxtm1a+LNCxVL+Vc934U4nqtTE0

Score
7/10

Malware Config

Signatures

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\240ba65fafdc26aab40107b4787752610f477911a8bbff15e9b64212bb7851cb.exe
    "C:\Users\Admin\AppData\Local\Temp\240ba65fafdc26aab40107b4787752610f477911a8bbff15e9b64212bb7851cb.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1112

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1112-54-0x0000000074D61000-0x0000000074D63000-memory.dmp

    Filesize

    8KB