Analysis
-
max time kernel
36s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 17:45
Behavioral task
behavioral1
Sample
2128ff2ba9ab3e79879c76f793faea8461d15c71ea8be464ca9d56cbc5f69736.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2128ff2ba9ab3e79879c76f793faea8461d15c71ea8be464ca9d56cbc5f69736.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
2128ff2ba9ab3e79879c76f793faea8461d15c71ea8be464ca9d56cbc5f69736.exe
-
Size
64KB
-
MD5
a03226a5e57172c7773c579e0b499380
-
SHA1
8cc5f7ab55562c605db30f971b33eaa2d5c33075
-
SHA256
2128ff2ba9ab3e79879c76f793faea8461d15c71ea8be464ca9d56cbc5f69736
-
SHA512
11faf37f3cf88a2e23c9b4e4521547f6096c164c09ce13fb199aab8b9203ed07833de28414aef6382cf88ea2a531b96f1e71f38e1498372ccab4e269c8e25c18
-
SSDEEP
1536:KHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6k2L5baULRdCpq4:KHoLde/OgV432UcP39hvF+8RdC1
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2020-54-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/memory/2020-55-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\driv64.exe 2128ff2ba9ab3e79879c76f793faea8461d15c71ea8be464ca9d56cbc5f69736.exe