Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:23
Behavioral task
behavioral1
Sample
5b51cb2c1f0c81e69e9d2ff6c6f57501b77c63abae7f12f27a8536baa5688215.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5b51cb2c1f0c81e69e9d2ff6c6f57501b77c63abae7f12f27a8536baa5688215.exe
Resource
win10v2004-20220812-en
General
-
Target
5b51cb2c1f0c81e69e9d2ff6c6f57501b77c63abae7f12f27a8536baa5688215.exe
-
Size
59KB
-
MD5
533ffb58e0490fad093a07d442475f50
-
SHA1
8ccb58a0cd4cb29f5630f6b06ab8fae88d8f4e03
-
SHA256
5b51cb2c1f0c81e69e9d2ff6c6f57501b77c63abae7f12f27a8536baa5688215
-
SHA512
f2e515217257631df7d1581f44262e4d96c352bbac7678844e4cdc99e42e80071123266925f9d4eac53b1f6c714a08f78a3868e9494a94661b81ba7581f5aa4a
-
SSDEEP
1536:tHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVtCoC:tHoLde/OgV432UcP39hXJZnCN
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1724-54-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
Processes:
5b51cb2c1f0c81e69e9d2ff6c6f57501b77c63abae7f12f27a8536baa5688215.exedescription ioc process File created C:\Windows\dextor32.exe 5b51cb2c1f0c81e69e9d2ff6c6f57501b77c63abae7f12f27a8536baa5688215.exe