Source: DrvMonitor.exe |
ReversingLabs: Detection: 95% |
Source: DrvMonitor.exe |
Virustotal: Detection: 83% |
Perma Link |
Source: DrvMonitor.exe |
Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
Source: C:\Users\user\Desktop\DrvMonitor.exe |
Window found: window name: AutoHotkey |
Source: DrvMonitor.exe |
Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
Source: DrvMonitor.exe |
Static PE information: Section: UPX1 ZLIB complexity 0.9946760770234987 |
Source: classification engine |
Classification label: mal56.evad.winEXE@1/0@0/0 |
Source: C:\Users\user\Desktop\DrvMonitor.exe |
Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Source: DrvMonitor.exe |
ReversingLabs: Detection: 95% |
Source: DrvMonitor.exe |
Virustotal: Detection: 83% |
Source: C:\Users\user\Desktop\DrvMonitor.exe |
File read: C:\Users\user\Desktop\DrvMonitor.exe |
Source: C:\Users\user\Desktop\DrvMonitor.exe |
Section loaded: apphelp.dll |
Source: C:\Users\user\Desktop\DrvMonitor.exe |
Section loaded: version.dll |
Source: C:\Users\user\Desktop\DrvMonitor.exe |
Section loaded: winmm.dll |
Source: C:\Users\user\Desktop\DrvMonitor.exe |
Section loaded: wsock32.dll |
Source: C:\Users\user\Desktop\DrvMonitor.exe |
Section loaded: uxtheme.dll |
Source: C:\Users\user\Desktop\DrvMonitor.exe |
Section loaded: textshaping.dll |
Source: initial sample |
Static PE information: section name: UPX0 |
Source: initial sample |
Static PE information: section name: UPX1 |
Source: C:\Users\user\Desktop\DrvMonitor.exe |
User Timer Set: Timeout: 100ms |
Source: C:\Users\user\Desktop\DrvMonitor.exe |
User Timer Set: Timeout: 10ms |
Source: C:\Users\user\Desktop\DrvMonitor.exe |
User Timer Set: Timeout: 10ms |
Source: C:\Users\user\Desktop\DrvMonitor.exe |
Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: DeviceType |
Source: C:\Users\user\Desktop\DrvMonitor.exe |
Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: Identifier |
Source: C:\Users\user\Desktop\DrvMonitor.exe |
Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: InquiryData |
Source: C:\Users\user\Desktop\DrvMonitor.exe |
Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: DeviceIdentifierPage |
Source: C:\Users\user\Desktop\DrvMonitor.exe |
Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: SerialNumber |
Source: all processes |
Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Users\user\Desktop\DrvMonitor.exe |
Process information queried: ProcessInformation |
Source: all processes |
Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |