Analysis
-
max time kernel
16s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 09:11
Behavioral task
behavioral1
Sample
535f8f356db4779e4a35afa924833f130ae9bc69495eb20c89154b02142f45aa.exe
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
535f8f356db4779e4a35afa924833f130ae9bc69495eb20c89154b02142f45aa.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
535f8f356db4779e4a35afa924833f130ae9bc69495eb20c89154b02142f45aa.exe
-
Size
63KB
-
MD5
a29297832736223cb21526f6b71292d0
-
SHA1
0236df13ccc4f3c54160c9134b2d054110e91a85
-
SHA256
535f8f356db4779e4a35afa924833f130ae9bc69495eb20c89154b02142f45aa
-
SHA512
b1f2d10488bf1c4d9a3d3fbb0bc86d9667bbeb94ba62fe351aed2af12dd10061a71b02d2a32abe317677f50a0d91c9a4e473218e1b67b71ab52f3313891d4a9b
-
SSDEEP
1536:KHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6k2L5baULRt:KHoLde/OgV432UcP39hvF+8Rt
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1164-54-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\driv64.exe 535f8f356db4779e4a35afa924833f130ae9bc69495eb20c89154b02142f45aa.exe