Analysis
-
max time kernel
33s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 00:10
Behavioral task
behavioral1
Sample
3163f48148f772fe42845e8b95d2357038f82e2f38ae19f8af668f96cdf2e627.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
3163f48148f772fe42845e8b95d2357038f82e2f38ae19f8af668f96cdf2e627.exe
Resource
win10v2004-20220901-en
2 signatures
150 seconds
General
-
Target
3163f48148f772fe42845e8b95d2357038f82e2f38ae19f8af668f96cdf2e627.exe
-
Size
71KB
-
MD5
612bd7867097b2739e97c45bebabea5b
-
SHA1
2ea27b89574675511bcaa758cea4e1771b716871
-
SHA256
3163f48148f772fe42845e8b95d2357038f82e2f38ae19f8af668f96cdf2e627
-
SHA512
7d513362fc40775c2c0f992e099a46a725dee7e8cfa7e28223afe37c566dd264259377bd6cc2bee6242205662ba43f2ed545db071ecae626c3c320b047261e3e
-
SSDEEP
1536:KHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6k2L5baULRcWTIi7:KHoLde/OgV432UcP39hvF+8RcWT97
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1044-54-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/memory/1044-55-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\driv64.exe 3163f48148f772fe42845e8b95d2357038f82e2f38ae19f8af668f96cdf2e627.exe