Analysis
-
max time kernel
181s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 20:14
Behavioral task
behavioral1
Sample
NEAS.448d87935d280c5ea8a5ad608b2bf170.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.448d87935d280c5ea8a5ad608b2bf170.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.448d87935d280c5ea8a5ad608b2bf170.exe
-
Size
45KB
-
MD5
448d87935d280c5ea8a5ad608b2bf170
-
SHA1
1d5079fd7b13418cd71009110459c76c1c795248
-
SHA256
398c50a907b718abd49e13d2e561b9e8fe0181bf15c33c316844a0aad860b75f
-
SHA512
de0aa336e1b4616c7fc0b6aeabaff900d033c0944fff88fb4f64444c48cd95f5ebf843ef52896043018e786cd8b3675b0042ecf557b4fc01e4d59776ed03085a
-
SSDEEP
768:fllPp7JeTe5MLjH4B5NCPd7m+Z7hE6XmPkHledFCVzN7fpNWtBchcgEpGa:flEK5SYB5s1Zm6X1Fe4PK2cgAGa
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4004-0-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/files/0x00060000000231e8-5.dat upx behavioral2/memory/4004-102-0x0000000000400000-0x000000000041B000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe NEAS.448d87935d280c5ea8a5ad608b2bf170.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5448d87935d280c5ea8a5ad608b2bf170
SHA11d5079fd7b13418cd71009110459c76c1c795248
SHA256398c50a907b718abd49e13d2e561b9e8fe0181bf15c33c316844a0aad860b75f
SHA512de0aa336e1b4616c7fc0b6aeabaff900d033c0944fff88fb4f64444c48cd95f5ebf843ef52896043018e786cd8b3675b0042ecf557b4fc01e4d59776ed03085a