Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:38
Static task
static1
Behavioral task
behavioral1
Sample
32597fef3858d407645f9a79f35861f80eeec12c0b8dbc20bb3ef6b583e0c747.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
32597fef3858d407645f9a79f35861f80eeec12c0b8dbc20bb3ef6b583e0c747.exe
Resource
win10v2004-20221111-en
General
-
Target
32597fef3858d407645f9a79f35861f80eeec12c0b8dbc20bb3ef6b583e0c747.exe
-
Size
504KB
-
MD5
f77c20e721317dc42bdf715c800ae1b2
-
SHA1
b08b3931069020d4e55b1ac36c340a88a900a4cd
-
SHA256
32597fef3858d407645f9a79f35861f80eeec12c0b8dbc20bb3ef6b583e0c747
-
SHA512
292cf6b84bbcd74665186f61f987c16ed72d07bac3122c568b0c99ac5773965a8a0893a8d97a8471429e827c3711ae4ccd8ff43cafa92ac36434fb1a168ac788
-
SSDEEP
12288:B298RDZERwRx3cSpeanHZFi3z7xWv7yhpCL+QSSE:BrRDlspanHZozrbRK
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1064-55-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral1/memory/1064-56-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral1/memory/1064-58-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral1/memory/1064-59-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral1/memory/1064-60-0x0000000000400000-0x0000000000510000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
32597fef3858d407645f9a79f35861f80eeec12c0b8dbc20bb3ef6b583e0c747.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\AS2014 = "C:\\ProgramData\\i9VVig6x\\i9VVig6x.exe" 32597fef3858d407645f9a79f35861f80eeec12c0b8dbc20bb3ef6b583e0c747.exe