Analysis
-
max time kernel
124s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 17:26
Behavioral task
behavioral1
Sample
f52d1ec96d196ca8cb278090452ee626e3b83fe3343cd73d7eb3db71d6ab8f8b.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
f52d1ec96d196ca8cb278090452ee626e3b83fe3343cd73d7eb3db71d6ab8f8b.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
f52d1ec96d196ca8cb278090452ee626e3b83fe3343cd73d7eb3db71d6ab8f8b.exe
-
Size
156KB
-
MD5
a1de49d370ffabf191635a9a389c1ba0
-
SHA1
419ff60c28fc2f1056a750d2676e31cc0c06e4a8
-
SHA256
f52d1ec96d196ca8cb278090452ee626e3b83fe3343cd73d7eb3db71d6ab8f8b
-
SHA512
925d42959351d4e902a4a2bbe771a8843ce9db345cfef32572c89e90b29ae1e03af02c8a6e570de37ad5231872413e52c667e5e7f4a01c391015bb7efb740b6f
-
SSDEEP
3072:yxTqpdA3f6QNf2IPO4DpmWpAsfYbTOBoefYi6a9k20tAvnkzkuI8uO:02pdqfv2IPOGfXf5ovWvakHO
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4684-132-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/4684-133-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\driv64.exe f52d1ec96d196ca8cb278090452ee626e3b83fe3343cd73d7eb3db71d6ab8f8b.exe