Analysis

  • max time kernel
    36s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2023, 04:56

General

  • Target

    Desktop/drv-loader.exe

  • Size

    215KB

  • MD5

    e6bf6f860ae8535d3a117bfc504a238e

  • SHA1

    68e91a7285fd8e60acf5e539d3fed5d4d9c28819

  • SHA256

    ec9bcdd47b193031b4f1c7cc7365dd1bbc2ee96054f87e1d19d836d37970e076

  • SHA512

    424d823de466d89e40ae38d567801ca29a5fb3b84fc85f583d375f3449659ffe7ab8c5de9c0bf8c44d4a7b0de12b63a9dd34a0f61c1db3ee88bbfd475f114ece

  • SSDEEP

    3072:vrnDhRxeZtsGP48Yngbq6CYQ+3Muj6ALY4hxiEUvXWaEoYSvZxJQCQKxb:vrnDQPpfbQ+3MlEnvgXWaEo7vtf7

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Desktop\drv-loader.exe
    "C:\Users\Admin\AppData\Local\Temp\Desktop\drv-loader.exe"
    1⤵
    • Sets service image path in registry
    • Suspicious behavior: LoadsDriver
    • Suspicious use of AdjustPrivilegeToken
    PID:2176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2176-0-0x000000013FC90000-0x000000013FD21000-memory.dmp

    Filesize

    580KB

  • memory/2176-1-0x000000013FC90000-0x000000013FD21000-memory.dmp

    Filesize

    580KB