Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:35
Static task
static1
Behavioral task
behavioral1
Sample
ff88f999b7ada48307c24f9ac0ae07e81b3179149ee82bd0fc7b5c5949542216.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ff88f999b7ada48307c24f9ac0ae07e81b3179149ee82bd0fc7b5c5949542216.exe
Resource
win10v2004-20221111-en
General
-
Target
ff88f999b7ada48307c24f9ac0ae07e81b3179149ee82bd0fc7b5c5949542216.exe
-
Size
516KB
-
MD5
91b981b56fbc7cd8bf1b9c7960a4462c
-
SHA1
b1733351f54771810550ed02563de76d9ec05292
-
SHA256
ff88f999b7ada48307c24f9ac0ae07e81b3179149ee82bd0fc7b5c5949542216
-
SHA512
4fb999cb32229937f34f212c8de637cae83e79ff2dcb49eeace7d5c69e3fa4d96bafc854bcbdf99e6892c70c31e314b2642d93e0f235a925f4526e766157828e
-
SSDEEP
12288:oKMc1tmf+Gt37H2nsEMM3oJdSms+vBla1pHFasFnivVbJO92Nq:kc0ztLdHMwEms+5lG9IsFEVdO4N
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/748-55-0x0000000000400000-0x00000000004CD000-memory.dmp upx behavioral1/memory/748-56-0x0000000000400000-0x00000000004CD000-memory.dmp upx behavioral1/memory/748-58-0x0000000000400000-0x00000000004CD000-memory.dmp upx behavioral1/memory/748-59-0x0000000000400000-0x00000000004CD000-memory.dmp upx behavioral1/memory/748-60-0x0000000000400000-0x00000000004CD000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ff88f999b7ada48307c24f9ac0ae07e81b3179149ee82bd0fc7b5c5949542216.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\AS2014 = "C:\\ProgramData\\aDs6UUR7\\aDs6UUR7.exe" ff88f999b7ada48307c24f9ac0ae07e81b3179149ee82bd0fc7b5c5949542216.exe