Analysis
-
max time kernel
93s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 19:39
Behavioral task
behavioral1
Sample
2516664260c2152752730b35cf4f32fb272a5e8a19ac9f9527c9b3a6e3483032.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2516664260c2152752730b35cf4f32fb272a5e8a19ac9f9527c9b3a6e3483032.exe
Resource
win10v2004-20240226-en
General
-
Target
2516664260c2152752730b35cf4f32fb272a5e8a19ac9f9527c9b3a6e3483032.exe
-
Size
160KB
-
MD5
b989718141f43d240c950b54ee16bd09
-
SHA1
341bb5ae82fe2a48c5386c1369c27d4c58a2d790
-
SHA256
2516664260c2152752730b35cf4f32fb272a5e8a19ac9f9527c9b3a6e3483032
-
SHA512
013c2ef0c0a908e7907ab5fc4f947e635d452b215ade289071fcdd71850f8adab11c3efaf9292a5e80b47c5ee948158d1201b18e947e6de69bc9f3ef3569eea8
-
SSDEEP
3072:axTqpdA3f6QNf2IPO4DpmWpAsfYbTOBoefYi6a9k20tA3ZQkz1wpsaRay:c2pdqfv2IPOGfXf5ovWJb1WsUay
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2952-0-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/files/0x0007000000023209-5.dat upx behavioral2/memory/2952-102-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe 2516664260c2152752730b35cf4f32fb272a5e8a19ac9f9527c9b3a6e3483032.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD5b989718141f43d240c950b54ee16bd09
SHA1341bb5ae82fe2a48c5386c1369c27d4c58a2d790
SHA2562516664260c2152752730b35cf4f32fb272a5e8a19ac9f9527c9b3a6e3483032
SHA512013c2ef0c0a908e7907ab5fc4f947e635d452b215ade289071fcdd71850f8adab11c3efaf9292a5e80b47c5ee948158d1201b18e947e6de69bc9f3ef3569eea8