Analysis
-
max time kernel
42s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 18:36
Behavioral task
behavioral1
Sample
49accb26bd48c5b22a3436519e6edbffecc2021c4095d15c582a02fc03247995.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
49accb26bd48c5b22a3436519e6edbffecc2021c4095d15c582a02fc03247995.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
49accb26bd48c5b22a3436519e6edbffecc2021c4095d15c582a02fc03247995.exe
-
Size
58KB
-
MD5
81c59150b6800721b3a3fa9432f7a3a4
-
SHA1
8d5f879745e640a9d656ffef04fdb820eacecf99
-
SHA256
49accb26bd48c5b22a3436519e6edbffecc2021c4095d15c582a02fc03247995
-
SHA512
c81f370bdb551526548c2b5ef5ac9d42c0ef3afdd3dbc4112b7b933be8fd6b2393d2e4eba2980869903c1c3d08f02042aba68ab09517779411f7f4d80976544f
-
SSDEEP
1536:tHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVtMp+2r:tHoLde/OgV432UcP39hXJZns+2r
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1560-54-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe 49accb26bd48c5b22a3436519e6edbffecc2021c4095d15c582a02fc03247995.exe