Analysis
-
max time kernel
141s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 08:59
Behavioral task
behavioral1
Sample
32f147b420797a6797b588d6e940d5d362cbb6431de5bb47d4f5e3695ab6fdbc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
32f147b420797a6797b588d6e940d5d362cbb6431de5bb47d4f5e3695ab6fdbc.exe
Resource
win10v2004-20220812-en
General
-
Target
32f147b420797a6797b588d6e940d5d362cbb6431de5bb47d4f5e3695ab6fdbc.exe
-
Size
198KB
-
MD5
9325151bacd4d7d2e78a8d19989d19f0
-
SHA1
226c2f06934c9a69eaa3a5819ba3902d1e636dff
-
SHA256
32f147b420797a6797b588d6e940d5d362cbb6431de5bb47d4f5e3695ab6fdbc
-
SHA512
9ccaf13a01c615792f90f000b190b056cc730a057ea53d64c81750bb7a13f554521983ad7ca72d77a053933425710aa7b3800499f7bead05073b765e284f4634
-
SSDEEP
3072:IZTseF1YqzI0B0UWTnlT4y1ci96rre8M8uTzSFk6b4kf2EPQNm1XjFZTK8kIlNyV:+su1YDl4Ji96fO3TmfMkf5QNm9jFbX4p
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3560-132-0x0000000000400000-0x00000000004A4000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe 32f147b420797a6797b588d6e940d5d362cbb6431de5bb47d4f5e3695ab6fdbc.exe