Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 18:51
Behavioral task
behavioral1
Sample
10473dcff0050f002cbb978d9e5e0cf1c45f338b19544d37920994e78c13f5b9.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
10473dcff0050f002cbb978d9e5e0cf1c45f338b19544d37920994e78c13f5b9.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
10473dcff0050f002cbb978d9e5e0cf1c45f338b19544d37920994e78c13f5b9.exe
-
Size
65KB
-
MD5
a25b71ab58dd3970828399323ac698b0
-
SHA1
9632ac79a0f11c3d6e6d64e09c4257b748b2d6e3
-
SHA256
10473dcff0050f002cbb978d9e5e0cf1c45f338b19544d37920994e78c13f5b9
-
SHA512
27f529cfb33e2b63966dc006a7da951b45287a84b6e3dad5435f063a80c617a1189bc8b469129f75ac6fce0b51a8779e01fe5d221d27595d8cf4a42163551ebf
-
SSDEEP
1536:tHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVtWY/SvIovPMb1f6:tHoLde/OgV432UcP39hXJZnWr1PMBC
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/948-54-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe 10473dcff0050f002cbb978d9e5e0cf1c45f338b19544d37920994e78c13f5b9.exe