Analysis
-
max time kernel
41s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28/11/2022, 04:09
Behavioral task
behavioral1
Sample
15fe53688a91d56ff6fadd0360d1d545d558e43477e0b22469382ad3ad63611b.exe
Resource
win7-20221111-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
15fe53688a91d56ff6fadd0360d1d545d558e43477e0b22469382ad3ad63611b.exe
Resource
win10v2004-20221111-en
2 signatures
150 seconds
General
-
Target
15fe53688a91d56ff6fadd0360d1d545d558e43477e0b22469382ad3ad63611b.exe
-
Size
60KB
-
MD5
3dc59adc0d95f9e4fe79a88260af6679
-
SHA1
c7f1311c1b5d573f4ef046da14d9088b4a2757d5
-
SHA256
15fe53688a91d56ff6fadd0360d1d545d558e43477e0b22469382ad3ad63611b
-
SHA512
7ebd7eea6ad918cee49723f7cbe5144b8c86dcf7eb9b535051cecf30ca94a0e93c242716dc8f65236ce2f327f908efa8615be635a78c571ee40f075632de48de
-
SSDEEP
1536:KHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6k2L5baULs:KHoLde/OgV432UcP39hvF+8s
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1704-54-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/memory/1704-55-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\driv64.exe 15fe53688a91d56ff6fadd0360d1d545d558e43477e0b22469382ad3ad63611b.exe