Analysis
-
max time kernel
150s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2022 00:12
Behavioral task
behavioral1
Sample
b74bd46fbb22ddbf4ebc64fd0a6c09ab58cdeecac16b9e5a6254f7fba223c5c0.exe
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
b74bd46fbb22ddbf4ebc64fd0a6c09ab58cdeecac16b9e5a6254f7fba223c5c0.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
b74bd46fbb22ddbf4ebc64fd0a6c09ab58cdeecac16b9e5a6254f7fba223c5c0.exe
-
Size
57KB
-
MD5
2dc89053d46b37edb6507c037018ee30
-
SHA1
7ac948b7a10b6a79d119775db56001ad4f2ec5b0
-
SHA256
b74bd46fbb22ddbf4ebc64fd0a6c09ab58cdeecac16b9e5a6254f7fba223c5c0
-
SHA512
edd250b45f0a42d1c8f1b96d1023b291802c7882bf9811c34442ddc69d0279df44be7948b5901c40d7b2bba809603367ceaa264c3e6eab292bff86f312f7f676
-
SSDEEP
1536:tHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVtZ:tHoLde/OgV432UcP39hXJZnZ
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4808-132-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe b74bd46fbb22ddbf4ebc64fd0a6c09ab58cdeecac16b9e5a6254f7fba223c5c0.exe