Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 20:03
Static task
static1
Behavioral task
behavioral1
Sample
94305dcc1630bcfe51fa4d4e4f085033.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
94305dcc1630bcfe51fa4d4e4f085033.exe
Resource
win10v2004-20240226-en
General
-
Target
94305dcc1630bcfe51fa4d4e4f085033.exe
-
Size
112KB
-
MD5
94305dcc1630bcfe51fa4d4e4f085033
-
SHA1
c6bc2ea4c1a76327155cfbd0de7912d7fec793df
-
SHA256
f40e09527bf70af8ac05fc696d81174080a584a04a3eb6ec0a237e5784f0400b
-
SHA512
3097118d093594c60362acae01fbee15047d8e867b38abe57b8645146c590c3f2f4c332920c5183340520a2df4323b76965787da63b34e22a588ecc06c155434
-
SSDEEP
3072:klXxgtyWbxgXXVJ+vVNjeqssiUW6VByx/Pf+dy:k/qy1VMjjGss6Vs+M
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe 94305dcc1630bcfe51fa4d4e4f085033.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD594305dcc1630bcfe51fa4d4e4f085033
SHA1c6bc2ea4c1a76327155cfbd0de7912d7fec793df
SHA256f40e09527bf70af8ac05fc696d81174080a584a04a3eb6ec0a237e5784f0400b
SHA5123097118d093594c60362acae01fbee15047d8e867b38abe57b8645146c590c3f2f4c332920c5183340520a2df4323b76965787da63b34e22a588ecc06c155434