Analysis
-
max time kernel
151s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 17:16
Static task
static1
Behavioral task
behavioral1
Sample
ee4ac582eb49981a5acf8a9186da109f3e6362a0ca71e5bba44b5ce808853618.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ee4ac582eb49981a5acf8a9186da109f3e6362a0ca71e5bba44b5ce808853618.exe
Resource
win10v2004-20220812-en
General
-
Target
ee4ac582eb49981a5acf8a9186da109f3e6362a0ca71e5bba44b5ce808853618.exe
-
Size
767KB
-
MD5
723740481e8771167fe77e2ffaca0dc0
-
SHA1
ac275ff55bf5376b97a35445a8dd4056e58f7564
-
SHA256
ee4ac582eb49981a5acf8a9186da109f3e6362a0ca71e5bba44b5ce808853618
-
SHA512
9ddd5466708aab4fde8fd67ea7ef3a27d8a3ffbe1496b1bd093774a79d66066ca3067fb9caef1d6a71d8b34dc174dca3e9bc2828f89d09857662c3a937c2cd7c
-
SSDEEP
12288:yqTexBibCNnghlRy9BKLENsvfJjg5gIuxNDNHvRV/HTF/nYlsuuAnaz6m2i+mnEp:yLx4bCN8IovBjg5gDrtJV/hv0svpHjEh
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/896-54-0x0000000000400000-0x0000000000617000-memory.dmp upx behavioral1/memory/896-56-0x0000000000400000-0x0000000000617000-memory.dmp upx behavioral1/memory/896-58-0x0000000000400000-0x0000000000617000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ee4ac582eb49981a5acf8a9186da109f3e6362a0ca71e5bba44b5ce808853618.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run ee4ac582eb49981a5acf8a9186da109f3e6362a0ca71e5bba44b5ce808853618.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SonyAgent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ee4ac582eb49981a5acf8a9186da109f3e6362a0ca71e5bba44b5ce808853618.exe" ee4ac582eb49981a5acf8a9186da109f3e6362a0ca71e5bba44b5ce808853618.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.