Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 23:28
Static task
static1
Behavioral task
behavioral1
Sample
815a91cae7577610229b4ae33740a45e8c19adfe8d2e1a3cd518d02b975d464f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
815a91cae7577610229b4ae33740a45e8c19adfe8d2e1a3cd518d02b975d464f.exe
Resource
win10v2004-20240226-en
General
-
Target
815a91cae7577610229b4ae33740a45e8c19adfe8d2e1a3cd518d02b975d464f.exe
-
Size
72KB
-
MD5
8ad0b834142b4961b2e9d5818d4c0173
-
SHA1
35c8973b42b37f0a9dfff5951ce5c804d25f44f0
-
SHA256
815a91cae7577610229b4ae33740a45e8c19adfe8d2e1a3cd518d02b975d464f
-
SHA512
0cbc479666a3e173cb2b708f47e88721f7163c32109ed5df8519bc5fc8b393db2383c0e2a66cd0f84b3446b5b3c0de1cf4cf8dc328450b15376f2cf02aa7021c
-
SSDEEP
1536:flNdxgtZHIy/bx02iPXXVVj+gBwoY3BXTBCqZ4qoVs5I5:flXxgtyWbxgXXVJ+vVNjeqoVsE
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 3 IoCs
resource yara_rule behavioral1/files/0x0008000000013a4d-4.dat UPX behavioral1/memory/2068-8-0x0000000000400000-0x0000000000428000-memory.dmp UPX behavioral1/memory/2068-103-0x0000000000400000-0x0000000000428000-memory.dmp UPX -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe 815a91cae7577610229b4ae33740a45e8c19adfe8d2e1a3cd518d02b975d464f.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD58ad0b834142b4961b2e9d5818d4c0173
SHA135c8973b42b37f0a9dfff5951ce5c804d25f44f0
SHA256815a91cae7577610229b4ae33740a45e8c19adfe8d2e1a3cd518d02b975d464f
SHA5120cbc479666a3e173cb2b708f47e88721f7163c32109ed5df8519bc5fc8b393db2383c0e2a66cd0f84b3446b5b3c0de1cf4cf8dc328450b15376f2cf02aa7021c