Analysis
-
max time kernel
113s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 09:11
Behavioral task
behavioral1
Sample
55a4fc4211033f47d6df5355f4f6556d201f52eca0dd3e3d13343ff40388c0e8.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
55a4fc4211033f47d6df5355f4f6556d201f52eca0dd3e3d13343ff40388c0e8.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
55a4fc4211033f47d6df5355f4f6556d201f52eca0dd3e3d13343ff40388c0e8.exe
-
Size
157KB
-
MD5
a2901f276e7f45f307e23b2e3499f470
-
SHA1
6e68a0d0375505c473294906009b6b53c3313a03
-
SHA256
55a4fc4211033f47d6df5355f4f6556d201f52eca0dd3e3d13343ff40388c0e8
-
SHA512
d1d3c44a0507200593b0b3a555b8a4e27ab4e71529af020e01d129ee7516d339b75af53aabe823bfdd85252d15ded2c91761ae31f880c57095062cd1fdab520f
-
SSDEEP
3072:yxTqpdA3f6QNf2IPO4DpmWpAsfYbTOBoefYi6a9k20tAvnkzkuIW:02pdqfv2IPOGfXf5ovWvake
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2176-132-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/2176-133-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\driv64.exe 55a4fc4211033f47d6df5355f4f6556d201f52eca0dd3e3d13343ff40388c0e8.exe