Analysis
-
max time kernel
27s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 17:34
Behavioral task
behavioral1
Sample
a8c5247e0564b7a82073eca43cda4fb7c6a36802d87cc9d01c2c7c72b4dab073.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
a8c5247e0564b7a82073eca43cda4fb7c6a36802d87cc9d01c2c7c72b4dab073.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
a8c5247e0564b7a82073eca43cda4fb7c6a36802d87cc9d01c2c7c72b4dab073.exe
-
Size
66KB
-
MD5
a2259fc944bb1c779856d83c4b7a7df0
-
SHA1
dd4d99a5dc808eff98f71df84fe2de2a41d38308
-
SHA256
a8c5247e0564b7a82073eca43cda4fb7c6a36802d87cc9d01c2c7c72b4dab073
-
SHA512
f45ac49e14157bd0bb3ad8e4c810e0f873253a31f3b683a79fe71d511dbcfa7f39823087dfbc31409a73e37a9630d38f416d56b65bac6f3cdfc80a844d3253ed
-
SSDEEP
1536:KHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6k2L5baULR46xo:KHoLde/OgV432UcP39hvF+8R4J
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/112-54-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/memory/112-55-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\driv64.exe a8c5247e0564b7a82073eca43cda4fb7c6a36802d87cc9d01c2c7c72b4dab073.exe