Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 10:00
Static task
static1
Behavioral task
behavioral1
Sample
de2559d85870b9e09f9769f8c240ba7ae9593825a515c5897e7e32ede5238419.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
de2559d85870b9e09f9769f8c240ba7ae9593825a515c5897e7e32ede5238419.exe
Resource
win10v2004-20221111-en
General
-
Target
de2559d85870b9e09f9769f8c240ba7ae9593825a515c5897e7e32ede5238419.exe
-
Size
827KB
-
MD5
0be40c1dc5d833ada5a491d7434e4ea4
-
SHA1
87e06ad1a1321a184ecccc6ac8a5bf5286c26b39
-
SHA256
de2559d85870b9e09f9769f8c240ba7ae9593825a515c5897e7e32ede5238419
-
SHA512
64362180a21d69f5a9c6acdc3a240964e52ba4a4da763c096911c0d38392444e7332fc4ffa171c594e4e368b4b78c3b68ae999f6e7bc20999f14226526ed1621
-
SSDEEP
24576:9rxXLDRiqJ+MLK+0JdAEo1mGajnVmLUx:9VLDEmp+RJgQJjnIAx
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/860-57-0x00000000012C0000-0x0000000001501000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run de2559d85870b9e09f9769f8c240ba7ae9593825a515c5897e7e32ede5238419.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SonyAgent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\de2559d85870b9e09f9769f8c240ba7ae9593825a515c5897e7e32ede5238419.exe" de2559d85870b9e09f9769f8c240ba7ae9593825a515c5897e7e32ede5238419.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.