Analysis
-
max time kernel
127s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2022 21:01
Behavioral task
behavioral1
Sample
e770ce1a297e84582aa46c235baa33a357ff2f72c925f2cfcb0c5f15c2416e9e.exe
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
e770ce1a297e84582aa46c235baa33a357ff2f72c925f2cfcb0c5f15c2416e9e.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
e770ce1a297e84582aa46c235baa33a357ff2f72c925f2cfcb0c5f15c2416e9e.exe
-
Size
57KB
-
MD5
84330de03c4cf2cc5c891e16522326d0
-
SHA1
a96e4226a318ed244999415e21e29dee461e77d8
-
SHA256
e770ce1a297e84582aa46c235baa33a357ff2f72c925f2cfcb0c5f15c2416e9e
-
SHA512
3e72e0a5631d197336a00bc2369c4104f2c6e54e996c138a6aa7b19aaff5a723e4052bd683bda79713c8f0ab07417255f39ee0589530592aeac78628839be1e9
-
SSDEEP
1536:tHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVtz7:tHoLde/OgV432UcP39hXJZnz7
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/876-132-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/876-133-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe e770ce1a297e84582aa46c235baa33a357ff2f72c925f2cfcb0c5f15c2416e9e.exe