Analysis
-
max time kernel
24s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 17:37
Behavioral task
behavioral1
Sample
8c403efdc646bf7f838450773cefb328ccc646805dbf3cf632dacc0bb0c58ff5.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
8c403efdc646bf7f838450773cefb328ccc646805dbf3cf632dacc0bb0c58ff5.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
8c403efdc646bf7f838450773cefb328ccc646805dbf3cf632dacc0bb0c58ff5.exe
-
Size
65KB
-
MD5
a126d7be654044edb7778560ecd26430
-
SHA1
4f4d04399fc33d15e2314f63698e474e63674ebb
-
SHA256
8c403efdc646bf7f838450773cefb328ccc646805dbf3cf632dacc0bb0c58ff5
-
SHA512
c5de34ca90cd1eee1835570b4e2e0f7610f9bc61387ff341365e0fb2dda4b32474cc414caa142eee963c705e17ce09b6e44e5f5c396e2a51285fff5ca61a8ccb
-
SSDEEP
1536:KHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6k2L5badvF1oV:KHoLde/OgV432UcP39hvF+pFmV
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/940-54-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\driv64.exe 8c403efdc646bf7f838450773cefb328ccc646805dbf3cf632dacc0bb0c58ff5.exe