Analysis
-
max time kernel
200s -
max time network
195s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:09
Static task
static1
Behavioral task
behavioral1
Sample
62c9eeb471edf28c5389b5639ef3c36b752e5cd9ff8973a51c6addbca5de76dd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
62c9eeb471edf28c5389b5639ef3c36b752e5cd9ff8973a51c6addbca5de76dd.exe
Resource
win10v2004-20220812-en
General
-
Target
62c9eeb471edf28c5389b5639ef3c36b752e5cd9ff8973a51c6addbca5de76dd.exe
-
Size
221KB
-
MD5
a354752f57e2c473fd724664e82bf8a6
-
SHA1
b4592715be1705a2a1ee73c8882a18b379983a0b
-
SHA256
62c9eeb471edf28c5389b5639ef3c36b752e5cd9ff8973a51c6addbca5de76dd
-
SHA512
23c326be7891d48cfb83f2bf6570b9a92831b68906a57cb5cb9ba5e74b8fd0139a3307778bea2a88bc6f7686012b6dbfe16fd3e8a7c8750db98b7e67e3cf737d
-
SSDEEP
6144:E3ua76c5iL39xRh/3eTLTph+KqtTBL6WIl:iTJ58R93WdqtTRC
Malware Config
Signatures
-
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 35.205.61.67 -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
62c9eeb471edf28c5389b5639ef3c36b752e5cd9ff8973a51c6addbca5de76dd.exepid process 1252 62c9eeb471edf28c5389b5639ef3c36b752e5cd9ff8973a51c6addbca5de76dd.exe 1252 62c9eeb471edf28c5389b5639ef3c36b752e5cd9ff8973a51c6addbca5de76dd.exe 1252 62c9eeb471edf28c5389b5639ef3c36b752e5cd9ff8973a51c6addbca5de76dd.exe 1252 62c9eeb471edf28c5389b5639ef3c36b752e5cd9ff8973a51c6addbca5de76dd.exe 1252 62c9eeb471edf28c5389b5639ef3c36b752e5cd9ff8973a51c6addbca5de76dd.exe 1252 62c9eeb471edf28c5389b5639ef3c36b752e5cd9ff8973a51c6addbca5de76dd.exe 1252 62c9eeb471edf28c5389b5639ef3c36b752e5cd9ff8973a51c6addbca5de76dd.exe 1252 62c9eeb471edf28c5389b5639ef3c36b752e5cd9ff8973a51c6addbca5de76dd.exe 1252 62c9eeb471edf28c5389b5639ef3c36b752e5cd9ff8973a51c6addbca5de76dd.exe 1252 62c9eeb471edf28c5389b5639ef3c36b752e5cd9ff8973a51c6addbca5de76dd.exe 1252 62c9eeb471edf28c5389b5639ef3c36b752e5cd9ff8973a51c6addbca5de76dd.exe 1252 62c9eeb471edf28c5389b5639ef3c36b752e5cd9ff8973a51c6addbca5de76dd.exe 1252 62c9eeb471edf28c5389b5639ef3c36b752e5cd9ff8973a51c6addbca5de76dd.exe 1252 62c9eeb471edf28c5389b5639ef3c36b752e5cd9ff8973a51c6addbca5de76dd.exe 1252 62c9eeb471edf28c5389b5639ef3c36b752e5cd9ff8973a51c6addbca5de76dd.exe 1252 62c9eeb471edf28c5389b5639ef3c36b752e5cd9ff8973a51c6addbca5de76dd.exe 1252 62c9eeb471edf28c5389b5639ef3c36b752e5cd9ff8973a51c6addbca5de76dd.exe 1252 62c9eeb471edf28c5389b5639ef3c36b752e5cd9ff8973a51c6addbca5de76dd.exe 1252 62c9eeb471edf28c5389b5639ef3c36b752e5cd9ff8973a51c6addbca5de76dd.exe 1252 62c9eeb471edf28c5389b5639ef3c36b752e5cd9ff8973a51c6addbca5de76dd.exe