Analysis
-
max time kernel
35s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 17:35
Behavioral task
behavioral1
Sample
89b774225c1929166339e1938022770960cdbef3afb149eee51e8b005e852038.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
89b774225c1929166339e1938022770960cdbef3afb149eee51e8b005e852038.exe
Resource
win10v2004-20220812-en
General
-
Target
89b774225c1929166339e1938022770960cdbef3afb149eee51e8b005e852038.exe
-
Size
198KB
-
MD5
a03ff4486f5f3f4ba7c93316a56a82d0
-
SHA1
61f95f2b6d3988b9293c4e0069f7581643ef8f52
-
SHA256
89b774225c1929166339e1938022770960cdbef3afb149eee51e8b005e852038
-
SHA512
9494d4f31faec8126b2d71508825343e4f8574c3bf4226341321b5444cae592242e2397de5a55b9f97543bf59571430811676d804fdb6bfca9de6f0ed05f291c
-
SSDEEP
3072:IZTseF1YqzI0B0UWTnlT4y1ci96rre8M8uTzSFk6b4kf2EPQNm1XjFZTK8kIlNyV:+su1YDl4Ji96fO3TmfMkf5QNm9jFbX45
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/340-54-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/340-55-0x0000000000400000-0x00000000004A4000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe 89b774225c1929166339e1938022770960cdbef3afb149eee51e8b005e852038.exe