Analysis
-
max time kernel
39s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-10-2022 21:17
Behavioral task
behavioral1
Sample
28def0486e8d5449ada2f3ea6f0566aa7020893d73b506aa2d0feffec574433f.exe
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
28def0486e8d5449ada2f3ea6f0566aa7020893d73b506aa2d0feffec574433f.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
28def0486e8d5449ada2f3ea6f0566aa7020893d73b506aa2d0feffec574433f.exe
-
Size
68KB
-
MD5
a348bbc7629c615c4b333766016af830
-
SHA1
91740a6c39894577c51562d3ae8965672a00bf9a
-
SHA256
28def0486e8d5449ada2f3ea6f0566aa7020893d73b506aa2d0feffec574433f
-
SHA512
8f82f7ab41d6e145bd955b19a879e7489f09f449913297d77cdc910b61abb3a4d2b62f264f2961b6d22a12f4e9498cf685e59301f2fd98363123e9aa7a0f1886
-
SSDEEP
1536:tHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVtWc++zfv:tHoLde/OgV432UcP39hXJZnWcPzfv
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1184-54-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/memory/1184-55-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe 28def0486e8d5449ada2f3ea6f0566aa7020893d73b506aa2d0feffec574433f.exe