Analysis
-
max time kernel
101s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2022 17:35
Behavioral task
behavioral1
Sample
a5daf7c2b6735830a38e083c5bd13d39c231dbddabc3072697ada127e8ee49a5.exe
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
a5daf7c2b6735830a38e083c5bd13d39c231dbddabc3072697ada127e8ee49a5.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
a5daf7c2b6735830a38e083c5bd13d39c231dbddabc3072697ada127e8ee49a5.exe
-
Size
65KB
-
MD5
a0cdb7a60dd70129511cda3c0e31c570
-
SHA1
e6427360652230257fe59e6a8447425347c905cb
-
SHA256
a5daf7c2b6735830a38e083c5bd13d39c231dbddabc3072697ada127e8ee49a5
-
SHA512
61b452e7e85e481dcae257ac4be6d1e085ec9e04ac105c167675e3be48d03a777fd6bfa1a5995f379f4d2e8d44f7c507b3c8651c551c5082808fcce0100d4b77
-
SSDEEP
1536:KHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6k2L5baULiLQDT8pk:KHoLde/OgV432UcP39hvF+80QDT8pk
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4960-132-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/4960-133-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\driv64.exe a5daf7c2b6735830a38e083c5bd13d39c231dbddabc3072697ada127e8ee49a5.exe