Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-04-2024 20:57
Behavioral task
behavioral1
Sample
3c7b6870f6e5752aa46d327ce5d2e9a552ef1bf496d7466856a8c527e17d721a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3c7b6870f6e5752aa46d327ce5d2e9a552ef1bf496d7466856a8c527e17d721a.exe
Resource
win10v2004-20240419-en
General
-
Target
3c7b6870f6e5752aa46d327ce5d2e9a552ef1bf496d7466856a8c527e17d721a.exe
-
Size
170KB
-
MD5
597ba65add82cfbfbc58ee55d9c41dd3
-
SHA1
cade1fa93297f891b8db594ebc550526ed7491d3
-
SHA256
3c7b6870f6e5752aa46d327ce5d2e9a552ef1bf496d7466856a8c527e17d721a
-
SHA512
dbfac1971ca92e6dbd65298c34e798ab06f190d281550a733a63c8ccdcfd3450fefa9b355aa2a59459069413333345ed357433de46bafc79e870ff86c3ef4d6c
-
SSDEEP
3072:SxTqpdA3f6QNf2IPO4DpmWpAsfYbTOBoefYi6a9k20tAvdqkzk6tYgkpdSJ:U2pdqfv2IPOGfXf5ovWvdNk6UpI
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x0007000000015ce1-4.dat upx behavioral1/memory/2208-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2208-102-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\driv64.exe 3c7b6870f6e5752aa46d327ce5d2e9a552ef1bf496d7466856a8c527e17d721a.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170KB
MD5597ba65add82cfbfbc58ee55d9c41dd3
SHA1cade1fa93297f891b8db594ebc550526ed7491d3
SHA2563c7b6870f6e5752aa46d327ce5d2e9a552ef1bf496d7466856a8c527e17d721a
SHA512dbfac1971ca92e6dbd65298c34e798ab06f190d281550a733a63c8ccdcfd3450fefa9b355aa2a59459069413333345ed357433de46bafc79e870ff86c3ef4d6c