Analysis
-
max time kernel
141s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 22:03
Behavioral task
behavioral1
Sample
45b85267f2b37d7c0f26f87c4b7cf186bfe06b9bf35855cfa3720aa3923480af.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
45b85267f2b37d7c0f26f87c4b7cf186bfe06b9bf35855cfa3720aa3923480af.exe
Resource
win10v2004-20240226-en
General
-
Target
45b85267f2b37d7c0f26f87c4b7cf186bfe06b9bf35855cfa3720aa3923480af.exe
-
Size
78KB
-
MD5
8bf0a5c10e57d800067609c7d032f499
-
SHA1
e916063f5c40d15914c785c55195f31d945791d8
-
SHA256
45b85267f2b37d7c0f26f87c4b7cf186bfe06b9bf35855cfa3720aa3923480af
-
SHA512
44a95e593c0e68531591963f1a3d4066bccfc41a02d294fb7da34b1f30a13da7a23781000f7493b5778590d1efb4225db7efc5c35d5125fa20712867bc5c0467
-
SSDEEP
1536:KHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6k2L5brrU0m/1IZdXaj8YwZ6:KHoLde/OgV432UcP39hvF+SZJU1O6
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2136-0-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/files/0x000a000000023139-5.dat upx behavioral2/memory/2136-102-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\driv64.exe 45b85267f2b37d7c0f26f87c4b7cf186bfe06b9bf35855cfa3720aa3923480af.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD58bf0a5c10e57d800067609c7d032f499
SHA1e916063f5c40d15914c785c55195f31d945791d8
SHA25645b85267f2b37d7c0f26f87c4b7cf186bfe06b9bf35855cfa3720aa3923480af
SHA51244a95e593c0e68531591963f1a3d4066bccfc41a02d294fb7da34b1f30a13da7a23781000f7493b5778590d1efb4225db7efc5c35d5125fa20712867bc5c0467