Analysis
-
max time kernel
68s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 18:37
Behavioral task
behavioral1
Sample
485affd80de9a3b9dd78d60bd78bb9aee4aba75c424a1c3f26c3035d1f94aef9.exe
Resource
win7-20220901-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
485affd80de9a3b9dd78d60bd78bb9aee4aba75c424a1c3f26c3035d1f94aef9.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
485affd80de9a3b9dd78d60bd78bb9aee4aba75c424a1c3f26c3035d1f94aef9.exe
-
Size
67KB
-
MD5
a0c40d9056854c16070392635a046b00
-
SHA1
4504524d3e8e1ad82a96c90e2eb406160e88a2fa
-
SHA256
485affd80de9a3b9dd78d60bd78bb9aee4aba75c424a1c3f26c3035d1f94aef9
-
SHA512
7002b0580898e1ffde0e494f5ad1c26f2033c64a7a6b5a6aada1db7112c057031e20ede75da99b89362d0c2f32f65d292d7b7d7661358ba53f23151d8821f60c
-
SSDEEP
1536:tHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVtWc++Je/7V:tHoLde/OgV432UcP39hXJZnWcPJkp
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2368-132-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/2368-133-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe 485affd80de9a3b9dd78d60bd78bb9aee4aba75c424a1c3f26c3035d1f94aef9.exe