Analysis
-
max time kernel
129s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:39
Static task
static1
Behavioral task
behavioral1
Sample
919a141f8e0582ba8a7423594ce6524eb4b75ca0ab5bfced1b26af05a1e8c505.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
919a141f8e0582ba8a7423594ce6524eb4b75ca0ab5bfced1b26af05a1e8c505.exe
Resource
win10v2004-20220812-en
General
-
Target
919a141f8e0582ba8a7423594ce6524eb4b75ca0ab5bfced1b26af05a1e8c505.exe
-
Size
603KB
-
MD5
b974c2cb3ce936ccab7bbf8bba593f38
-
SHA1
4d9d46e9bff3fa865f31b24d7cf64206eb543580
-
SHA256
919a141f8e0582ba8a7423594ce6524eb4b75ca0ab5bfced1b26af05a1e8c505
-
SHA512
c4170c9de4519c002d3cfcba2c223d2d53fd4ae9f3fd66153b15820151fc6c90f888a146f2841234c99f56e3b113f2c1cca80f7e000199ac8abf100b56b86765
-
SSDEEP
12288:yEVDL2QSVkEgqCLabW+F6KAkUwrFSPF/lMQ:yMLAkCXYKAkU8FWF9MQ
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1972-54-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral1/memory/1972-58-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral1/memory/1972-59-0x0000000000400000-0x00000000004D8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
919a141f8e0582ba8a7423594ce6524eb4b75ca0ab5bfced1b26af05a1e8c505.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\AS2014 = "C:\\ProgramData\\RpD333lD\\RpD333lD.exe" 919a141f8e0582ba8a7423594ce6524eb4b75ca0ab5bfced1b26af05a1e8c505.exe