Analysis
-
max time kernel
93s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 02:31
Behavioral task
behavioral1
Sample
cccbd75d7e4dadf2f81c07238dc9f633a83b1a342e8060a471c3f77ed99b14c3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cccbd75d7e4dadf2f81c07238dc9f633a83b1a342e8060a471c3f77ed99b14c3.exe
Resource
win10v2004-20240226-en
General
-
Target
cccbd75d7e4dadf2f81c07238dc9f633a83b1a342e8060a471c3f77ed99b14c3.exe
-
Size
175KB
-
MD5
067366fdfc6cbd0b40bcef6b35172d44
-
SHA1
6c09e4069c63d96a08e0f970a8f604aaf5653b36
-
SHA256
cccbd75d7e4dadf2f81c07238dc9f633a83b1a342e8060a471c3f77ed99b14c3
-
SHA512
79626ba36ecf7c5d5f4faecf69ca496555e76cbc7271ab4db320154f9ea0f25f6427dc3917a2a418ebef9f60de266015ca824fad8b79e95e0b2cd3bd63699717
-
SSDEEP
3072:SxTqpdA3f6QNf2IPO4DpmWpAsfYbTOBoefYi6a9k20tAvdqkzk6t55WV:U2pdqfv2IPOGfXf5ovWvdNk6r5WV
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4856-0-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/files/0x00070000000231d9-5.dat upx behavioral2/memory/4856-102-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\driv64.exe cccbd75d7e4dadf2f81c07238dc9f633a83b1a342e8060a471c3f77ed99b14c3.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5067366fdfc6cbd0b40bcef6b35172d44
SHA16c09e4069c63d96a08e0f970a8f604aaf5653b36
SHA256cccbd75d7e4dadf2f81c07238dc9f633a83b1a342e8060a471c3f77ed99b14c3
SHA51279626ba36ecf7c5d5f4faecf69ca496555e76cbc7271ab4db320154f9ea0f25f6427dc3917a2a418ebef9f60de266015ca824fad8b79e95e0b2cd3bd63699717