Analysis
-
max time kernel
91s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2022, 02:50
Behavioral task
behavioral1
Sample
5b06046bcb48cdf7929f0e8872197d6d4bdb4833a5ebc093877294191ca5b5fa.exe
Resource
win7-20220901-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
5b06046bcb48cdf7929f0e8872197d6d4bdb4833a5ebc093877294191ca5b5fa.exe
Resource
win10v2004-20220901-en
2 signatures
150 seconds
General
-
Target
5b06046bcb48cdf7929f0e8872197d6d4bdb4833a5ebc093877294191ca5b5fa.exe
-
Size
27KB
-
MD5
40e35f94808371d5365be83022bb7977
-
SHA1
2fb7e353626805918f5cd90e969c8455708b9d71
-
SHA256
5b06046bcb48cdf7929f0e8872197d6d4bdb4833a5ebc093877294191ca5b5fa
-
SHA512
b34e2856edbac888f74737d15bd76f8b383a161b0753b368a22450fe12f8c9fed41dffc0b0a9015c6af11e8542d192a4cd35bedb613d2b2646cf2ece8f5f079a
-
SSDEEP
384:DN9HNBZe6jsfuku6vJhJ847pz3x/4dU8swYZ3jk88K2I3MwhDaPVPmnPZLriDk:DHlNjs2EXppZ8nv9w2unPlB
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1008-132-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral2/memory/1008-133-0x0000000000400000-0x0000000000413000-memory.dmp upx -
Suspicious behavior: LoadsDriver 10 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 660 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found