Analysis
-
max time kernel
170s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 17:28
Behavioral task
behavioral1
Sample
e79453e309d0fe0c4bd03004ccdb4c7e083a0eb94411747515258ef349814e86.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
e79453e309d0fe0c4bd03004ccdb4c7e083a0eb94411747515258ef349814e86.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
e79453e309d0fe0c4bd03004ccdb4c7e083a0eb94411747515258ef349814e86.exe
-
Size
65KB
-
MD5
a0c6bb9636b0037971b1bdabb594a710
-
SHA1
168ffe37b9b7298f3abb2ee574c05e0d3144e27d
-
SHA256
e79453e309d0fe0c4bd03004ccdb4c7e083a0eb94411747515258ef349814e86
-
SHA512
4192c6c0aa69b4dafb7c242f7de5b7d1b942aa174ca9527d7ae9742f2b34606f129207ee6f52a44880372bda37b727e27d54685e04bc826f13d195d0b1a3ae79
-
SSDEEP
1536:KHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6k2L5baULRwMbK:KHoLde/OgV432UcP39hvF+8RwMO
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2144-132-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/2144-133-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\driv64.exe e79453e309d0fe0c4bd03004ccdb4c7e083a0eb94411747515258ef349814e86.exe