Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 06:48

General

  • Target

    66cc11cd4cdb3a13e670e972cb748010N.exe

  • Size

    661KB

  • MD5

    66cc11cd4cdb3a13e670e972cb748010

  • SHA1

    081201aaad6eae4f9d84c6359dafea0ece48db5f

  • SHA256

    0629ed9d9459c26f549ef56aa5169a3c60ed4286ca4817acb27ee567f464d2ee

  • SHA512

    54af8443828f87e9553b907848a24b9c61663f8385dd53d76b20c813c1cdb0a1d06a8318f6b8b77c69a89a9f11d97ccba39c062626875a78bd34cc4c6012f40d

  • SSDEEP

    3072:afKPw/6Nb8lztYpDzo83H6JrgboTlyMvXOqms0itTBf28Vo:+KP9NCzt8zErgsTlXvXBmJitTBe8Vo

Score
7/10

Malware Config

Signatures

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66cc11cd4cdb3a13e670e972cb748010N.exe
    "C:\Users\Admin\AppData\Local\Temp\66cc11cd4cdb3a13e670e972cb748010N.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2348

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads