Analysis
-
max time kernel
27s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 17:46
Behavioral task
behavioral1
Sample
13532e5db51b42c2d7a8fcb73661d564fa3cf442b0ee57f18696e5b86ed12c45.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
13532e5db51b42c2d7a8fcb73661d564fa3cf442b0ee57f18696e5b86ed12c45.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
13532e5db51b42c2d7a8fcb73661d564fa3cf442b0ee57f18696e5b86ed12c45.exe
-
Size
164KB
-
MD5
8165debf601dc231b4d65b64fd2e4b08
-
SHA1
fd24713d89a5e547128754ab297abe4b329dcd76
-
SHA256
13532e5db51b42c2d7a8fcb73661d564fa3cf442b0ee57f18696e5b86ed12c45
-
SHA512
9f4ef1dc488005642f3ec334e1aa1fa9a4354cfcde069b8d859ad06aa56a9bcfc51bcdb9a0cab7817a834954e654d987e7875440646e5eff87e5ab61b21ed28c
-
SSDEEP
3072:yxTqpdA3f6QNf2IPO4DpmWpAsfYbTOBoefYi6a9k20tAvnkzkuIPbutmcZ:02pdqfv2IPOGfXf5ovWvakbu7Z
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1508-54-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\driv64.exe 13532e5db51b42c2d7a8fcb73661d564fa3cf442b0ee57f18696e5b86ed12c45.exe