Analysis
-
max time kernel
65s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 09:45
Behavioral task
behavioral1
Sample
3f97a6660e3aa5e965fefec0806ce4903c0419311bcf8df9d5e1f01bfc63ea6b.exe
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
3f97a6660e3aa5e965fefec0806ce4903c0419311bcf8df9d5e1f01bfc63ea6b.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
3f97a6660e3aa5e965fefec0806ce4903c0419311bcf8df9d5e1f01bfc63ea6b.exe
-
Size
67KB
-
MD5
a2923d27796393038c1ec226787d8a00
-
SHA1
a33afc01119302d582705dee7ea235585937bafb
-
SHA256
3f97a6660e3aa5e965fefec0806ce4903c0419311bcf8df9d5e1f01bfc63ea6b
-
SHA512
c3801688bcc3dcad2f568d60c7583b5c44caf407469f53aabf980e76177dd0473a48b4362e3ba2514e2235d13aa4eddfb50005165a3e7b3fec9b3a53f65a9b7c
-
SSDEEP
1536:tHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVtWc++d1:tHoLde/OgV432UcP39hXJZnWcPD
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/736-132-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe 3f97a6660e3aa5e965fefec0806ce4903c0419311bcf8df9d5e1f01bfc63ea6b.exe