Analysis
-
max time kernel
124s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2022 15:31
Behavioral task
behavioral1
Sample
1e683aefa358fe348d77dae2053c9bbf2d782c8fab852978d3cc7f9d4e20032d.exe
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
1e683aefa358fe348d77dae2053c9bbf2d782c8fab852978d3cc7f9d4e20032d.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
1e683aefa358fe348d77dae2053c9bbf2d782c8fab852978d3cc7f9d4e20032d.exe
-
Size
141KB
-
MD5
45c4ccc41d9c8e97666b9ea210128eb0
-
SHA1
4bf3e7b0870784b2b4fee53096fb1ea0d449293e
-
SHA256
1e683aefa358fe348d77dae2053c9bbf2d782c8fab852978d3cc7f9d4e20032d
-
SHA512
d7aab51b13a5cb3790adfa8db7c7a81fe763fc3b41a1ce9e8b2b95a5de41143e710b8ae696e1a096651313bb8e468cfccfb8426d8744b11ac7879fcb70bb27af
-
SSDEEP
3072:t3gbYiGULALwoOZ6CVLWX5XPK7XCz39yfgUvIDx5ZfeoEwv8:tYYiGULALwFypy7XCz9yIUAwV
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4080-132-0x0000000000400000-0x000000000047F000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe 1e683aefa358fe348d77dae2053c9bbf2d782c8fab852978d3cc7f9d4e20032d.exe