Analysis
-
max time kernel
46s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19-10-2022 17:45
Behavioral task
behavioral1
Sample
46f0b7a1a44c8a67ef644e2bb48867621ce2d6fae7d3fdbb27eed3bb387a6b95.exe
Resource
win7-20220901-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
46f0b7a1a44c8a67ef644e2bb48867621ce2d6fae7d3fdbb27eed3bb387a6b95.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
46f0b7a1a44c8a67ef644e2bb48867621ce2d6fae7d3fdbb27eed3bb387a6b95.exe
-
Size
60KB
-
MD5
a1d12236f167fb78d1305539eb1c99b0
-
SHA1
bf4b84f9c8d8792c7446c1d0aec11e57921e15da
-
SHA256
46f0b7a1a44c8a67ef644e2bb48867621ce2d6fae7d3fdbb27eed3bb387a6b95
-
SHA512
18904c6ffb0c883dc70eb28f8e3729ac54d7728385be739580f736b9b8ed8a3df48331139744e0dd0e6bb4b1d0c16bd7ec3a2d3db527244b8b8cb096636e54f9
-
SSDEEP
1536:KHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6k2L5bTzNck:KHoLde/OgV432UcP39hvFhd
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1204-54-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\driv64.exe 46f0b7a1a44c8a67ef644e2bb48867621ce2d6fae7d3fdbb27eed3bb387a6b95.exe