Analysis
-
max time kernel
178s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:35
Static task
static1
Behavioral task
behavioral1
Sample
ff88f999b7ada48307c24f9ac0ae07e81b3179149ee82bd0fc7b5c5949542216.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ff88f999b7ada48307c24f9ac0ae07e81b3179149ee82bd0fc7b5c5949542216.exe
Resource
win10v2004-20221111-en
General
-
Target
ff88f999b7ada48307c24f9ac0ae07e81b3179149ee82bd0fc7b5c5949542216.exe
-
Size
516KB
-
MD5
91b981b56fbc7cd8bf1b9c7960a4462c
-
SHA1
b1733351f54771810550ed02563de76d9ec05292
-
SHA256
ff88f999b7ada48307c24f9ac0ae07e81b3179149ee82bd0fc7b5c5949542216
-
SHA512
4fb999cb32229937f34f212c8de637cae83e79ff2dcb49eeace7d5c69e3fa4d96bafc854bcbdf99e6892c70c31e314b2642d93e0f235a925f4526e766157828e
-
SSDEEP
12288:oKMc1tmf+Gt37H2nsEMM3oJdSms+vBla1pHFasFnivVbJO92Nq:kc0ztLdHMwEms+5lG9IsFEVdO4N
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1272-133-0x0000000000400000-0x00000000004CD000-memory.dmp upx behavioral2/memory/1272-134-0x0000000000400000-0x00000000004CD000-memory.dmp upx behavioral2/memory/1272-135-0x0000000000400000-0x00000000004CD000-memory.dmp upx behavioral2/memory/1272-136-0x0000000000400000-0x00000000004CD000-memory.dmp upx behavioral2/memory/1272-137-0x0000000000400000-0x00000000004CD000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ff88f999b7ada48307c24f9ac0ae07e81b3179149ee82bd0fc7b5c5949542216.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AS2014 = "C:\\ProgramData\\na7XX6lg\\na7XX6lg.exe" ff88f999b7ada48307c24f9ac0ae07e81b3179149ee82bd0fc7b5c5949542216.exe -
Checks SCSI registry key(s) 3 TTPs 2 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
ff88f999b7ada48307c24f9ac0ae07e81b3179149ee82bd0fc7b5c5949542216.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 ff88f999b7ada48307c24f9ac0ae07e81b3179149ee82bd0fc7b5c5949542216.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName ff88f999b7ada48307c24f9ac0ae07e81b3179149ee82bd0fc7b5c5949542216.exe