Analysis
-
max time kernel
17s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 19:17
Behavioral task
behavioral1
Sample
50b30813371cbb78165b57296ebb1d03fdbecf6ec1ee5734dcf2f62a7ea3af01.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
50b30813371cbb78165b57296ebb1d03fdbecf6ec1ee5734dcf2f62a7ea3af01.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
50b30813371cbb78165b57296ebb1d03fdbecf6ec1ee5734dcf2f62a7ea3af01.exe
-
Size
56KB
-
MD5
c66fddbdbbe010af4d70f84eeab31a54
-
SHA1
1f0a19a67cdc01e3454768dec9cab0a099c1679d
-
SHA256
50b30813371cbb78165b57296ebb1d03fdbecf6ec1ee5734dcf2f62a7ea3af01
-
SHA512
0a2ea5c43c4d3e7fa8e5d4a7c5800845944631c4591f140a715ae3953799d07945b84c8768bdaec215922d22d8c015628d2b2ac0a747e9208b1142cfdbcd71ac
-
SSDEEP
1536:tHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVti:tHoLde/OgV432UcP39hXJZni
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1028-54-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe 50b30813371cbb78165b57296ebb1d03fdbecf6ec1ee5734dcf2f62a7ea3af01.exe