Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 10:34
Static task
static1
Behavioral task
behavioral1
Sample
ab59ab43bca69e4d8da366c81fc85b94ac14d12996d2743e0e1dba11dcc3eec8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ab59ab43bca69e4d8da366c81fc85b94ac14d12996d2743e0e1dba11dcc3eec8.exe
Resource
win10v2004-20220901-en
General
-
Target
ab59ab43bca69e4d8da366c81fc85b94ac14d12996d2743e0e1dba11dcc3eec8.exe
-
Size
769KB
-
MD5
74252893ab3fd0a0026122e6037d444e
-
SHA1
602c46a56191405114067d7b13e2f086d564b912
-
SHA256
ab59ab43bca69e4d8da366c81fc85b94ac14d12996d2743e0e1dba11dcc3eec8
-
SHA512
eed74fbda287d78e5a9d17a9f6d0f8a091eb86c328a4f0735d0fd53a150c8cf94fb9792b89b9edd7224aaf686d8d2ca06e35867289dce2291d65ca2a948115c5
-
SSDEEP
24576:Qa7VX9dsfan3JgPv0PvY+1L285yYZvfoANZ0wv3:X7VX92g3JLT1L285yYBzU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1200-54-0x0000000000400000-0x0000000000618000-memory.dmp upx behavioral1/memory/1200-56-0x0000000000400000-0x0000000000618000-memory.dmp upx behavioral1/memory/1200-58-0x0000000000400000-0x0000000000618000-memory.dmp upx behavioral1/memory/1200-59-0x0000000000400000-0x0000000000618000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SonyAgent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ab59ab43bca69e4d8da366c81fc85b94ac14d12996d2743e0e1dba11dcc3eec8.exe" ab59ab43bca69e4d8da366c81fc85b94ac14d12996d2743e0e1dba11dcc3eec8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run ab59ab43bca69e4d8da366c81fc85b94ac14d12996d2743e0e1dba11dcc3eec8.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.