Analysis
-
max time kernel
189s -
max time network
211s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 18:50
Behavioral task
behavioral1
Sample
1182ef79869f1fb3fefa053e0adb36c4e51b900d87ac7bf33d34bf253f2fd5b0.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
1182ef79869f1fb3fefa053e0adb36c4e51b900d87ac7bf33d34bf253f2fd5b0.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
1182ef79869f1fb3fefa053e0adb36c4e51b900d87ac7bf33d34bf253f2fd5b0.exe
-
Size
67KB
-
MD5
a0ed8f4ca940c155db666c9898dc4a50
-
SHA1
0f181954a33ff09cb412fdf91dc0d60973baee3b
-
SHA256
1182ef79869f1fb3fefa053e0adb36c4e51b900d87ac7bf33d34bf253f2fd5b0
-
SHA512
99a2124fafd71876d769746e84208f7c05a7857e094621410f47e3094e824b437b9232dc5eef5df24f637f7aff52500e2c25dc2c713d58ccfdfb43194813ae04
-
SSDEEP
1536:tHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVtWc++u8:tHoLde/OgV432UcP39hXJZnWcPu8
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4392-132-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/4392-133-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/4392-134-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe 1182ef79869f1fb3fefa053e0adb36c4e51b900d87ac7bf33d34bf253f2fd5b0.exe