Analysis
-
max time kernel
131s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 05:03
Behavioral task
behavioral1
Sample
ddd9c9b51a5aec6010e9993ebd926db81b349e1f994e60bbf82329e6d6866d31.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ddd9c9b51a5aec6010e9993ebd926db81b349e1f994e60bbf82329e6d6866d31.exe
Resource
win10v2004-20240419-en
General
-
Target
ddd9c9b51a5aec6010e9993ebd926db81b349e1f994e60bbf82329e6d6866d31.exe
-
Size
197KB
-
MD5
75de576b1955e6e8152a640fa2a2e0df
-
SHA1
86f36a1810db2cec1d8572e5425e3703ea0fb5fc
-
SHA256
ddd9c9b51a5aec6010e9993ebd926db81b349e1f994e60bbf82329e6d6866d31
-
SHA512
7949014f1d132ef79d1c2e0a012fee419c3eba0c664a05562643a7896b8a097ae53c19728347d12bd27ef4c01e5ac5854b951b3ea40d6ffa6792c2fb941451ae
-
SSDEEP
3072:IZTseF1YqzI0B0UWTnlT4y1ci96rre8M8uTzSFk6b4kf2EPQNm1XjFZTK8kIlNyA:+su1YDl4Ji96fO3TmfMkf5QNm9jFbX4M
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4396-4-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral2/files/0x000a000000023b8a-5.dat upx behavioral2/memory/4396-103-0x0000000000400000-0x00000000004A4000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe ddd9c9b51a5aec6010e9993ebd926db81b349e1f994e60bbf82329e6d6866d31.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD575de576b1955e6e8152a640fa2a2e0df
SHA186f36a1810db2cec1d8572e5425e3703ea0fb5fc
SHA256ddd9c9b51a5aec6010e9993ebd926db81b349e1f994e60bbf82329e6d6866d31
SHA5127949014f1d132ef79d1c2e0a012fee419c3eba0c664a05562643a7896b8a097ae53c19728347d12bd27ef4c01e5ac5854b951b3ea40d6ffa6792c2fb941451ae