Analysis
-
max time kernel
151s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:46
Static task
static1
Behavioral task
behavioral1
Sample
ea93bcf7e741a7a692f142194b9a39455c3e98c3c22a9ed11e421cad9192e46f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ea93bcf7e741a7a692f142194b9a39455c3e98c3c22a9ed11e421cad9192e46f.exe
Resource
win10v2004-20220812-en
General
-
Target
ea93bcf7e741a7a692f142194b9a39455c3e98c3c22a9ed11e421cad9192e46f.exe
-
Size
853KB
-
MD5
dde0c436cdeb3bb7c96f59c02eadf676
-
SHA1
86f121c0da59ca908e61e292da069801da0b5713
-
SHA256
ea93bcf7e741a7a692f142194b9a39455c3e98c3c22a9ed11e421cad9192e46f
-
SHA512
17336235bbadfa9786446049bf5f2c4b874d6d1dd57cc7b1d2616b8f2307345f174095d5d80f8e4fd3b007a47dac10f87c24ab4d671130e91e624bb857215e73
-
SSDEEP
12288:N5yfy1FHvnnzVg4ARZNN7iEcRHgsB8OfEWFB76NTmHf0ALSEWt:u6nn5jARZNsEAAwl3j2BmZpWt
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/880-55-0x0000000000400000-0x0000000000603000-memory.dmp upx behavioral1/memory/880-54-0x0000000000400000-0x0000000000603000-memory.dmp upx behavioral1/memory/880-57-0x0000000000400000-0x0000000000603000-memory.dmp upx behavioral1/memory/880-58-0x0000000000400000-0x0000000000603000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ea93bcf7e741a7a692f142194b9a39455c3e98c3c22a9ed11e421cad9192e46f.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run ea93bcf7e741a7a692f142194b9a39455c3e98c3c22a9ed11e421cad9192e46f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SonyAgent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ea93bcf7e741a7a692f142194b9a39455c3e98c3c22a9ed11e421cad9192e46f.exe" ea93bcf7e741a7a692f142194b9a39455c3e98c3c22a9ed11e421cad9192e46f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.