Analysis
-
max time kernel
151s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 03:42
Static task
static1
Behavioral task
behavioral1
Sample
4f359a785f8e1f996b02d114d7ceb6b2ec8e2fb4d2262ef02d663a6998e84e31.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4f359a785f8e1f996b02d114d7ceb6b2ec8e2fb4d2262ef02d663a6998e84e31.exe
Resource
win10v2004-20220812-en
General
-
Target
4f359a785f8e1f996b02d114d7ceb6b2ec8e2fb4d2262ef02d663a6998e84e31.exe
-
Size
773KB
-
MD5
13707467f45a1036b517f521be614301
-
SHA1
66b94eb4b1246f65eab047d3c4c0bbf7b0c07dbe
-
SHA256
4f359a785f8e1f996b02d114d7ceb6b2ec8e2fb4d2262ef02d663a6998e84e31
-
SHA512
5435ceafcca37feabe5f0a617000a83f5034ab2b32a63131ee0764be0576cd04d9c5c13679eda01aea51f963d70bdf7c5679d342173456bb831a4fc3f1f0f1a0
-
SSDEEP
24576:q+HHHP91M7uRZeY0kcBNrJg4nBF8FkaaN0d5d:9nvfMKRZezBNVB8aNG5d
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1340-54-0x0000000000400000-0x000000000060C000-memory.dmp upx behavioral1/memory/1340-56-0x0000000000400000-0x000000000060C000-memory.dmp upx behavioral1/memory/1340-58-0x0000000000400000-0x000000000060C000-memory.dmp upx behavioral1/memory/1340-59-0x0000000000400000-0x000000000060C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 4f359a785f8e1f996b02d114d7ceb6b2ec8e2fb4d2262ef02d663a6998e84e31.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SonyAgent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4f359a785f8e1f996b02d114d7ceb6b2ec8e2fb4d2262ef02d663a6998e84e31.exe" 4f359a785f8e1f996b02d114d7ceb6b2ec8e2fb4d2262ef02d663a6998e84e31.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.