Analysis
-
max time kernel
187s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 05:41
Behavioral task
behavioral1
Sample
04b6f2266a546bcc1d016e0cc4684fc035ae5b7630a62270e837401150a7e877.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
04b6f2266a546bcc1d016e0cc4684fc035ae5b7630a62270e837401150a7e877.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
04b6f2266a546bcc1d016e0cc4684fc035ae5b7630a62270e837401150a7e877.exe
-
Size
80KB
-
MD5
0a34eff4d8863695e522bff2de52b500
-
SHA1
40e4c6b3ca709819e61b39c3424c16c2fd00e68e
-
SHA256
04b6f2266a546bcc1d016e0cc4684fc035ae5b7630a62270e837401150a7e877
-
SHA512
4effbc0e00521488345c30e0725be51018b91873348574dea06869d0edfe37392986c3be2b4caa36d31cbb40d5028feeebec0f7e7ca2638588a54cd83d57752c
-
SSDEEP
1536:KHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6k2L5brrU0m/ftULYWxeo4qe7:KHoLde/OgV432UcP39hvF+XtULVBm
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1660-132-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1660-133-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\driv64.exe 04b6f2266a546bcc1d016e0cc4684fc035ae5b7630a62270e837401150a7e877.exe