Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:20
Behavioral task
behavioral1
Sample
fa3f5815f922696105b447597e64a7356ed733f3e7313101ab4d83a8249d9602.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fa3f5815f922696105b447597e64a7356ed733f3e7313101ab4d83a8249d9602.exe
Resource
win10v2004-20220812-en
General
-
Target
fa3f5815f922696105b447597e64a7356ed733f3e7313101ab4d83a8249d9602.exe
-
Size
58KB
-
MD5
4524ac2bc78b0de95af8cda56f59f3e0
-
SHA1
d76390b64c27eb0aa0f3510d1f3ec8023d532bdf
-
SHA256
fa3f5815f922696105b447597e64a7356ed733f3e7313101ab4d83a8249d9602
-
SHA512
08f09532d2b615b3eb37a15d5f5cc9da8e5c980faf8bd2fdcae9ea0505879463c3ab747850bac32d360d74eedafd9fe0412954f479ab3cdd46b26fdc500899e5
-
SSDEEP
1536:tHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVtWcIs:tHoLde/OgV432UcP39hXJZnWNs
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4028-132-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/4028-133-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
Processes:
fa3f5815f922696105b447597e64a7356ed733f3e7313101ab4d83a8249d9602.exedescription ioc process File created C:\Windows\dextor32.exe fa3f5815f922696105b447597e64a7356ed733f3e7313101ab4d83a8249d9602.exe