Analysis
-
max time kernel
154s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 17:59
Behavioral task
behavioral1
Sample
e3972cc16c86293055a9b1ad41f92f4fca35f4f4687d71573561f60345be14d5.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
e3972cc16c86293055a9b1ad41f92f4fca35f4f4687d71573561f60345be14d5.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
e3972cc16c86293055a9b1ad41f92f4fca35f4f4687d71573561f60345be14d5.exe
-
Size
58KB
-
MD5
a099eb855bbd45275d7587238f667680
-
SHA1
b89ca88c4ce509ac5cc9ae2a451c988f60deb51d
-
SHA256
e3972cc16c86293055a9b1ad41f92f4fca35f4f4687d71573561f60345be14d5
-
SHA512
36c61603e5a6ae9538e78fef2bdf57f34f6cf1036b776e79516d27e0f90679350f679254d730cbd0e2778326814d99cc445fe6cc4ceca768b3da45a4d8a0fc48
-
SSDEEP
1536:tHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVtI0:tHoLde/OgV432UcP39hXJZnh
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3404-132-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe e3972cc16c86293055a9b1ad41f92f4fca35f4f4687d71573561f60345be14d5.exe