Analysis
-
max time kernel
131s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:55
Static task
static1
Behavioral task
behavioral1
Sample
4d00bfbf6ec63b49f1feff67d08bb78fb093306ae7d0ffe51b0b145e6e5f2287.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4d00bfbf6ec63b49f1feff67d08bb78fb093306ae7d0ffe51b0b145e6e5f2287.exe
Resource
win10v2004-20220901-en
General
-
Target
4d00bfbf6ec63b49f1feff67d08bb78fb093306ae7d0ffe51b0b145e6e5f2287.exe
-
Size
522KB
-
MD5
f37661d79b2887ef28d94e810d748f83
-
SHA1
d3530edb93fec8aaebe9ac614be1a635d455b8f5
-
SHA256
4d00bfbf6ec63b49f1feff67d08bb78fb093306ae7d0ffe51b0b145e6e5f2287
-
SHA512
f590941e0c19923c3fa600aaad7ab6ad65393bb8686927f72e341a0df181d0f4da731c0c1b8d11046a819f95590ffcd718f41d4d1243851cd367adadb5a14cf6
-
SSDEEP
12288:XVb8L4MtfjkopdqK/QRnp1w9cZJBYP543g4qXf3k:XVb0BfpdqKoR3wiZJBYG3gbvk
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1724-55-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/1724-56-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/1724-57-0x0000000000400000-0x00000000004C7000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
4d00bfbf6ec63b49f1feff67d08bb78fb093306ae7d0ffe51b0b145e6e5f2287.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\AS2014 = "C:\\ProgramData\\iRalsadd\\iRalsadd.exe" 4d00bfbf6ec63b49f1feff67d08bb78fb093306ae7d0ffe51b0b145e6e5f2287.exe