Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 07:22
Behavioral task
behavioral1
Sample
2a7adc82cbfbe520d4d277c4c0ac0cb4dd07405726b9c2a80a6d47404d18625b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2a7adc82cbfbe520d4d277c4c0ac0cb4dd07405726b9c2a80a6d47404d18625b.exe
Resource
win10v2004-20220812-en
General
-
Target
2a7adc82cbfbe520d4d277c4c0ac0cb4dd07405726b9c2a80a6d47404d18625b.exe
-
Size
196KB
-
MD5
0c232609b8db88ea53bfde63731c103e
-
SHA1
3e35b9be15748bf2278ab9823c409b108b713cc3
-
SHA256
2a7adc82cbfbe520d4d277c4c0ac0cb4dd07405726b9c2a80a6d47404d18625b
-
SHA512
93cc90521cbb7354018b7999971de6d41f172db9501243ab5ae87589f689f8bb64270606d82f6be42ee25aeac711fcdaa6d67ebff54a845eaab5a514f3b503a8
-
SSDEEP
3072:IZTseF1YqzI0B0UWTnlT4y1ci96rre8M8uTzSFk6b4kf2EPQNm1XjFZTK8kIlNy+:+su1YDl4Ji96fO3TmfMkf5QNm9jFbX4i
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1000-132-0x0000000000400000-0x00000000004A4000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe 2a7adc82cbfbe520d4d277c4c0ac0cb4dd07405726b9c2a80a6d47404d18625b.exe