Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:42
Static task
static1
Behavioral task
behavioral1
Sample
f44c825793ae91bc0234a89523aec87110ec35c08c3f640f5f99aac546efe525.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f44c825793ae91bc0234a89523aec87110ec35c08c3f640f5f99aac546efe525.exe
Resource
win10v2004-20220812-en
General
-
Target
f44c825793ae91bc0234a89523aec87110ec35c08c3f640f5f99aac546efe525.exe
-
Size
800KB
-
MD5
4c80aed43b253f719893975bac2ee25b
-
SHA1
84dcd1f4da00c907c63621103e0b105e4d4c12c4
-
SHA256
f44c825793ae91bc0234a89523aec87110ec35c08c3f640f5f99aac546efe525
-
SHA512
9169898d9c793f711b6358f02a2103add38effbea77842af6888aceba1fd3fcc213acf943ebd441dde1c53826ba3287cd6eec3c3aaeaa59bfd45c9401b1705e5
-
SSDEEP
12288:EaFYru1hYyLOKCzoDi4NGMHM/mk0HmE0H7o9x049WWaH0d3rlvHxe9oNlwM2pf+Q:E4hYyLvxNLHMONJi7oQ49WexqMAGa
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/560-54-0x0000000000400000-0x0000000000628000-memory.dmp upx behavioral1/memory/560-55-0x0000000000400000-0x0000000000628000-memory.dmp upx behavioral1/memory/560-57-0x0000000000400000-0x0000000000628000-memory.dmp upx behavioral1/memory/560-58-0x0000000000400000-0x0000000000628000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
f44c825793ae91bc0234a89523aec87110ec35c08c3f640f5f99aac546efe525.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run f44c825793ae91bc0234a89523aec87110ec35c08c3f640f5f99aac546efe525.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SonyAgent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f44c825793ae91bc0234a89523aec87110ec35c08c3f640f5f99aac546efe525.exe" f44c825793ae91bc0234a89523aec87110ec35c08c3f640f5f99aac546efe525.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.