Analysis
-
max time kernel
112s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 07:28
Behavioral task
behavioral1
Sample
63cc645ec10800de7a3eb108b4e7fd9fad208274dcefd6bb68efc6d45fbddb6c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
63cc645ec10800de7a3eb108b4e7fd9fad208274dcefd6bb68efc6d45fbddb6c.exe
Resource
win10v2004-20220901-en
General
-
Target
63cc645ec10800de7a3eb108b4e7fd9fad208274dcefd6bb68efc6d45fbddb6c.exe
-
Size
14KB
-
MD5
6136b3c49b37b08c913211ee83d86156
-
SHA1
2d3ba6f29d74f40d7960ffedc05328322afab7e4
-
SHA256
63cc645ec10800de7a3eb108b4e7fd9fad208274dcefd6bb68efc6d45fbddb6c
-
SHA512
4ca5cb8051a45937087f2ae9ba0f22b7f863c798f959501a04d09cbb721b3a46fc91a024bc9f2154d87bb6bc218698c3e97c4ddacb3c29471030161a18a1b29b
-
SSDEEP
192:IhvGRYs88x4EPl6ZOrojkkcUbuITV76XoZixmBgmVEyncjWOKwbgSHs14D+NU3:IB64EdOgojkkcUbuITM75mTnPCHzDk2
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3948-132-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 664 Process not Found