Analysis
-
max time kernel
152s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
cd09dd5144d432ce38f8c2c1ebf790a5657ad772db27c339d83ea22f0bbbd3f3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cd09dd5144d432ce38f8c2c1ebf790a5657ad772db27c339d83ea22f0bbbd3f3.exe
Resource
win10v2004-20220812-en
General
-
Target
cd09dd5144d432ce38f8c2c1ebf790a5657ad772db27c339d83ea22f0bbbd3f3.exe
-
Size
838KB
-
MD5
0c38a9e9e55418944a119490e066cc4a
-
SHA1
3bd4b1c891d08286e7375387cfa12ffb12f18280
-
SHA256
cd09dd5144d432ce38f8c2c1ebf790a5657ad772db27c339d83ea22f0bbbd3f3
-
SHA512
d4bd38190fb1885c49d75aa7366541e1c0cec050c6bf0ab5b9e154ebae91238788ff54f8a4aa09f3adb7c9380be48f754292deabf3bc7b863c0a4042a29b248e
-
SSDEEP
24576:XX+GDT2HgTKTW5DHyog1qCcWsPcwzer2DiWeR7rsIr:XOGDTi6TmVqcQvzeci1yIr
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1224-57-0x0000000000F70000-0x00000000011A6000-memory.dmp upx behavioral1/memory/1224-58-0x0000000000F70000-0x00000000011A6000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run cd09dd5144d432ce38f8c2c1ebf790a5657ad772db27c339d83ea22f0bbbd3f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SonyAgent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cd09dd5144d432ce38f8c2c1ebf790a5657ad772db27c339d83ea22f0bbbd3f3.exe" cd09dd5144d432ce38f8c2c1ebf790a5657ad772db27c339d83ea22f0bbbd3f3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.