Analysis
-
max time kernel
46s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 16:37
Behavioral task
behavioral1
Sample
6c84dc8ef06a748ab5d0f2b47c04461feb48b432867b36b5cec9f278c239de55.exe
Resource
win7-20220901-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
6c84dc8ef06a748ab5d0f2b47c04461feb48b432867b36b5cec9f278c239de55.exe
Resource
win10v2004-20220901-en
2 signatures
150 seconds
General
-
Target
6c84dc8ef06a748ab5d0f2b47c04461feb48b432867b36b5cec9f278c239de55.exe
-
Size
57KB
-
MD5
231e2433456889a0f64e464b4bab2ff0
-
SHA1
9a924909464db21a8676a74033bcce8686d0b560
-
SHA256
6c84dc8ef06a748ab5d0f2b47c04461feb48b432867b36b5cec9f278c239de55
-
SHA512
e39445ac389911e311e00a018cf11baf76e1995197cfa42c100ac3d9e36318afda354bd4eb680e02262b2cf8eae96d9bfc98128b697342800774d0a491390502
-
SSDEEP
1536:KHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6k2L5bauQH:KHoLde/OgV432UcP39hvFIH
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1308-54-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\driv64.exe 6c84dc8ef06a748ab5d0f2b47c04461feb48b432867b36b5cec9f278c239de55.exe