Analysis
-
max time kernel
37s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-10-2022 00:08
Behavioral task
behavioral1
Sample
a12865fb7e9d6eaff113dc4c1adf62b49801268b5686b3664b28934804859746.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a12865fb7e9d6eaff113dc4c1adf62b49801268b5686b3664b28934804859746.exe
Resource
win10v2004-20220812-en
General
-
Target
a12865fb7e9d6eaff113dc4c1adf62b49801268b5686b3664b28934804859746.exe
-
Size
199KB
-
MD5
65eb480bc3e98ad4665deb096ff10520
-
SHA1
d89082a29ed0ca395b282f16d777ba166eac0d8f
-
SHA256
a12865fb7e9d6eaff113dc4c1adf62b49801268b5686b3664b28934804859746
-
SHA512
e5ac4c562f4da6226d74f86b60e746b4665da870a1a448b9fa3c5eb66d50606f844e03f35db4a28d09d7bc2869cd59891e0681e06127bf2b8f160b71ea13cb2e
-
SSDEEP
3072:IZTseF1YqzI0B0UWTnlT4y1ci96rre8M8uTzSFk6b4kf2EPQNm1XjFZTK8kIlNyO:+su1YDl4Ji96fO3TmfMkf5QNm9jFbX4S
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1224-54-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/1224-55-0x0000000000400000-0x00000000004A4000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe a12865fb7e9d6eaff113dc4c1adf62b49801268b5686b3664b28934804859746.exe