Analysis
-
max time kernel
188s -
max time network
234s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 17:44
Static task
static1
Behavioral task
behavioral1
Sample
e5901c800afd62bc4fe1760add98d4a9f399f7242139aea23f5679bff934c4be.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e5901c800afd62bc4fe1760add98d4a9f399f7242139aea23f5679bff934c4be.exe
Resource
win10v2004-20221111-en
General
-
Target
e5901c800afd62bc4fe1760add98d4a9f399f7242139aea23f5679bff934c4be.exe
-
Size
506KB
-
MD5
20d11b84a8ae505e3dfaa1a97407b261
-
SHA1
a56f3b751c63c12ed897140b1993a99c6a234970
-
SHA256
e5901c800afd62bc4fe1760add98d4a9f399f7242139aea23f5679bff934c4be
-
SHA512
f233a52485db02bb976c3173a99e80ca99d0f7b8dd4577e7287b1732ffe3d4e246f28166f36b0220705752a6eca5d51e83587664a6ea469dd537bc4b82072c75
-
SSDEEP
12288:gfuR+uyMuGwv5bEMPBMqAp3nO/xu0Rt0ysRl3DDkYbn:gIAKCiqA9O/xaRTpn
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4408-132-0x0000000000400000-0x000000000050F000-memory.dmp upx behavioral2/memory/4408-133-0x0000000000400000-0x000000000050F000-memory.dmp upx behavioral2/memory/4408-134-0x0000000000400000-0x000000000050F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
e5901c800afd62bc4fe1760add98d4a9f399f7242139aea23f5679bff934c4be.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AS2014 = "C:\\ProgramData\\na7XX6lg\\na7XX6lg.exe" e5901c800afd62bc4fe1760add98d4a9f399f7242139aea23f5679bff934c4be.exe -
Checks SCSI registry key(s) 3 TTPs 2 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
e5901c800afd62bc4fe1760add98d4a9f399f7242139aea23f5679bff934c4be.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 e5901c800afd62bc4fe1760add98d4a9f399f7242139aea23f5679bff934c4be.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName e5901c800afd62bc4fe1760add98d4a9f399f7242139aea23f5679bff934c4be.exe