Analysis
-
max time kernel
158s -
max time network
202s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 17:44
Static task
static1
Behavioral task
behavioral1
Sample
e5901c800afd62bc4fe1760add98d4a9f399f7242139aea23f5679bff934c4be.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e5901c800afd62bc4fe1760add98d4a9f399f7242139aea23f5679bff934c4be.exe
Resource
win10v2004-20221111-en
General
-
Target
e5901c800afd62bc4fe1760add98d4a9f399f7242139aea23f5679bff934c4be.exe
-
Size
506KB
-
MD5
20d11b84a8ae505e3dfaa1a97407b261
-
SHA1
a56f3b751c63c12ed897140b1993a99c6a234970
-
SHA256
e5901c800afd62bc4fe1760add98d4a9f399f7242139aea23f5679bff934c4be
-
SHA512
f233a52485db02bb976c3173a99e80ca99d0f7b8dd4577e7287b1732ffe3d4e246f28166f36b0220705752a6eca5d51e83587664a6ea469dd537bc4b82072c75
-
SSDEEP
12288:gfuR+uyMuGwv5bEMPBMqAp3nO/xu0Rt0ysRl3DDkYbn:gIAKCiqA9O/xaRTpn
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1776-55-0x0000000000400000-0x000000000050F000-memory.dmp upx behavioral1/memory/1776-54-0x0000000000400000-0x000000000050F000-memory.dmp upx behavioral1/memory/1776-57-0x0000000000400000-0x000000000050F000-memory.dmp upx behavioral1/memory/1776-58-0x0000000000400000-0x000000000050F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
e5901c800afd62bc4fe1760add98d4a9f399f7242139aea23f5679bff934c4be.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\AS2014 = "C:\\ProgramData\\nX7l9srv\\nX7l9srv.exe" e5901c800afd62bc4fe1760add98d4a9f399f7242139aea23f5679bff934c4be.exe