Analysis
-
max time kernel
150s -
max time network
171s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 07:12
Static task
static1
Behavioral task
behavioral1
Sample
21cf9bf2397f664b1c43d197585f694e227686e9bb5098a3264a60cd614c6507.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
21cf9bf2397f664b1c43d197585f694e227686e9bb5098a3264a60cd614c6507.exe
Resource
win10v2004-20220812-en
General
-
Target
21cf9bf2397f664b1c43d197585f694e227686e9bb5098a3264a60cd614c6507.exe
-
Size
767KB
-
MD5
0cf84c18d74695a9a416db75652cfd9f
-
SHA1
23ab4a5930c5b537ebc64fe51dbe450246dc9c83
-
SHA256
21cf9bf2397f664b1c43d197585f694e227686e9bb5098a3264a60cd614c6507
-
SHA512
dd6b2453fbd7ffa49d2e75166b5bc6b55c81fe94bf8cd810caed8c7ad24314f23230b576c8bd248dd6607be12404db73c0c27b0f253425a5e3c161a4c3eeaf60
-
SSDEEP
12288:O3iM1XuDUkE7WrIadTIUMMRN6CoKnyka4JVK9hSBoBTJutgRi:O3iMduDkCrIadT09EPVshECR
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1952-55-0x0000000000400000-0x0000000000617000-memory.dmp upx behavioral1/memory/1952-57-0x0000000000400000-0x0000000000617000-memory.dmp upx behavioral1/memory/1952-58-0x0000000000400000-0x0000000000617000-memory.dmp upx behavioral1/memory/1952-59-0x0000000000400000-0x0000000000617000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 21cf9bf2397f664b1c43d197585f694e227686e9bb5098a3264a60cd614c6507.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SonyAgent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\21cf9bf2397f664b1c43d197585f694e227686e9bb5098a3264a60cd614c6507.exe" 21cf9bf2397f664b1c43d197585f694e227686e9bb5098a3264a60cd614c6507.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.