Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 10:35
Behavioral task
behavioral1
Sample
96fa6e0285769f60f0530abf97cdaf60N.exe
Resource
win7-20240704-en
General
-
Target
96fa6e0285769f60f0530abf97cdaf60N.exe
-
Size
169KB
-
MD5
96fa6e0285769f60f0530abf97cdaf60
-
SHA1
029778a355ceadba8eff3db25eebd2cd2509cd23
-
SHA256
180e7c7f805ceb6eee854964a5f039eb5c9b6d7e6c618bf7720512a76a9aea2f
-
SHA512
edead7972f2b07a204b91b56503b58d175a1aa2564f74fe2067c626d99ba0939be1a79b6b8567669c66203ec820fd101619fd8ba3234617dac803467ad8fb897
-
SSDEEP
3072:SxTqpdA3f6QNf2IPO4DpmWpAsfYbTOBoefYi6a9k20tAvdqkzk6t5uYE4o:U2pdqfv2IPOGfXf5ovWvdNk6rrEn
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2460-0-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/files/0x000600000001867d-5.dat upx behavioral1/memory/2460-102-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\driv64.exe 96fa6e0285769f60f0530abf97cdaf60N.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD596fa6e0285769f60f0530abf97cdaf60
SHA1029778a355ceadba8eff3db25eebd2cd2509cd23
SHA256180e7c7f805ceb6eee854964a5f039eb5c9b6d7e6c618bf7720512a76a9aea2f
SHA512edead7972f2b07a204b91b56503b58d175a1aa2564f74fe2067c626d99ba0939be1a79b6b8567669c66203ec820fd101619fd8ba3234617dac803467ad8fb897