Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 19:41
Behavioral task
behavioral1
Sample
469c53815a8396385ddf1ad784fbd36314f5fd7e0f4a2db5628b03698560415d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
469c53815a8396385ddf1ad784fbd36314f5fd7e0f4a2db5628b03698560415d.exe
Resource
win10v2004-20240226-en
General
-
Target
469c53815a8396385ddf1ad784fbd36314f5fd7e0f4a2db5628b03698560415d.exe
-
Size
195KB
-
MD5
edb2507262e225b24843e8ee93b0479c
-
SHA1
2f0dcb7d89656c2133ecb4496eb2724886d0f109
-
SHA256
469c53815a8396385ddf1ad784fbd36314f5fd7e0f4a2db5628b03698560415d
-
SHA512
1f9ef05c00a301f5df722a877d18a8294a0909bf9197b5938b90ad280525d6d9fca0d55045fd07187e128091a0fbd9c93d00b51c37893323705a5d8fc548aa31
-
SSDEEP
6144:+su1YDl4Ji96fO3TmfMkf5QNm9jFbX4PV:+rK4JnfO3qfv5X9jFDU
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x0007000000015c87-4.dat upx behavioral1/memory/2612-9-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2612-102-0x0000000000400000-0x00000000004A4000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe 469c53815a8396385ddf1ad784fbd36314f5fd7e0f4a2db5628b03698560415d.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195KB
MD5edb2507262e225b24843e8ee93b0479c
SHA12f0dcb7d89656c2133ecb4496eb2724886d0f109
SHA256469c53815a8396385ddf1ad784fbd36314f5fd7e0f4a2db5628b03698560415d
SHA5121f9ef05c00a301f5df722a877d18a8294a0909bf9197b5938b90ad280525d6d9fca0d55045fd07187e128091a0fbd9c93d00b51c37893323705a5d8fc548aa31