Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
07/08/2024, 03:54
Behavioral task
behavioral1
Sample
dfa7b0a9187774b63c79f4f2a151d1572dbe085cd5f3a61b689b56dbce3b71c1.exe
Resource
win7-20240705-en
General
-
Target
dfa7b0a9187774b63c79f4f2a151d1572dbe085cd5f3a61b689b56dbce3b71c1.exe
-
Size
169KB
-
MD5
8ad04e4bf2b536e1553ed2d2dd9afc83
-
SHA1
354f767914f8ec1896eeb0c03e6c00d12f446374
-
SHA256
dfa7b0a9187774b63c79f4f2a151d1572dbe085cd5f3a61b689b56dbce3b71c1
-
SHA512
c580fbd5d44afccc497d17087eda4dc2f23185b955a3150cdb25a685c6f3c76fa32abca5f0390533f6c40fc79f1300ce055ab7101fe66a8fcd880c208526181d
-
SSDEEP
3072:SxTqpdA3f6QNf2IPO4DpmWpAsfYbTOBoefYi6a9k20tAvdqkzk6t5uYE4V:U2pdqfv2IPOGfXf5ovWvdNk6rrEE
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2708-5-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/files/0x00060000000186c8-4.dat upx behavioral1/memory/2708-102-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\driv64.exe dfa7b0a9187774b63c79f4f2a151d1572dbe085cd5f3a61b689b56dbce3b71c1.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD58ad04e4bf2b536e1553ed2d2dd9afc83
SHA1354f767914f8ec1896eeb0c03e6c00d12f446374
SHA256dfa7b0a9187774b63c79f4f2a151d1572dbe085cd5f3a61b689b56dbce3b71c1
SHA512c580fbd5d44afccc497d17087eda4dc2f23185b955a3150cdb25a685c6f3c76fa32abca5f0390533f6c40fc79f1300ce055ab7101fe66a8fcd880c208526181d