Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 17:35
Static task
static1
Behavioral task
behavioral1
Sample
db25589051ddb1965933ff10b8c19cd2ca05b640d10ff03c37b74c6e36dd1650.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
db25589051ddb1965933ff10b8c19cd2ca05b640d10ff03c37b74c6e36dd1650.exe
Resource
win10v2004-20220812-en
General
-
Target
db25589051ddb1965933ff10b8c19cd2ca05b640d10ff03c37b74c6e36dd1650.exe
-
Size
782KB
-
MD5
633429fee3cb57e635194b6230a7ec50
-
SHA1
f934dbe9aac544684affd75d71da8177fa2f9015
-
SHA256
db25589051ddb1965933ff10b8c19cd2ca05b640d10ff03c37b74c6e36dd1650
-
SHA512
15fd2414a0ec1f13b3b806e160f2cd5659cec1e35d56474f9f78d509ebc6e96594edcb3db8a38e4b3e3ebaf2eb5eb25edb27faa2ba53b2e685c87f4252b13fd4
-
SSDEEP
12288:lDCACrKt/Cth2VV4ewIzbhLLaDLKSX1Q5dWSjYpADqyzJrOVKu4LySalr7vx0cwT:lI3E4xebRL7SXGWSmAT6Ku4LHal/mPFb
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/768-55-0x0000000000400000-0x0000000000623000-memory.dmp upx behavioral1/memory/768-59-0x0000000000400000-0x0000000000623000-memory.dmp upx behavioral1/memory/768-60-0x0000000000400000-0x0000000000623000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run db25589051ddb1965933ff10b8c19cd2ca05b640d10ff03c37b74c6e36dd1650.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SonyAgent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\db25589051ddb1965933ff10b8c19cd2ca05b640d10ff03c37b74c6e36dd1650.exe" db25589051ddb1965933ff10b8c19cd2ca05b640d10ff03c37b74c6e36dd1650.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.