Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
21/10/2022, 05:44
Behavioral task
behavioral1
Sample
17434589c934a980be2668e3e82d8bf206fcc1649ee3baa98ec032f85b3950be.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
17434589c934a980be2668e3e82d8bf206fcc1649ee3baa98ec032f85b3950be.exe
Resource
win10v2004-20220812-en
General
-
Target
17434589c934a980be2668e3e82d8bf206fcc1649ee3baa98ec032f85b3950be.exe
-
Size
191KB
-
MD5
4a000b0b0d45cc15b695a8ea6819ab80
-
SHA1
354f77d776a15075828a08a3f7251a3ba95f7d25
-
SHA256
17434589c934a980be2668e3e82d8bf206fcc1649ee3baa98ec032f85b3950be
-
SHA512
1d95f64e4e64b92c31b295d2e0bff777f487e8d188d7347b3633973feb0127c261085dd4d9ccbec0bb9e0945b4bcf02d278886dc1eaa622c7909afca09d275e0
-
SSDEEP
3072:IZTseF1YqzI0B0UWTnlT4y1ci96rre8M8uTzSFk6b4kf2EPQNm1XjFZTK8kIlNyT:+su1YDl4Ji96fO3TmfMkf5QNm9jFbX4P
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1380-54-0x0000000000400000-0x00000000004A4000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe 17434589c934a980be2668e3e82d8bf206fcc1649ee3baa98ec032f85b3950be.exe