Analysis
-
max time kernel
154s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 07:32
Behavioral task
behavioral1
Sample
16014de0600d800ef521d35f9539ddfe6a9f919119ce484a07b02628e470e2b3.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
16014de0600d800ef521d35f9539ddfe6a9f919119ce484a07b02628e470e2b3.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
16014de0600d800ef521d35f9539ddfe6a9f919119ce484a07b02628e470e2b3.exe
-
Size
57KB
-
MD5
0f0b93319d7e18c6b97ad717aa251cb0
-
SHA1
7a429d77f641c5b7fdd7c548c61b6c7ccc94b998
-
SHA256
16014de0600d800ef521d35f9539ddfe6a9f919119ce484a07b02628e470e2b3
-
SHA512
804594711465d17035a4257b4701453fb316e34d6462a5210ae26cc28c1cd15071a4374bd857a5474991e713a6cadacba57ad46253190378db104fefbae7cb54
-
SSDEEP
1536:tHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVtKj:tHoLde/OgV432UcP39hXJZnu
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2240-132-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/2240-133-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe 16014de0600d800ef521d35f9539ddfe6a9f919119ce484a07b02628e470e2b3.exe