Analysis
-
max time kernel
266s -
max time network
352s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 05:17
Static task
static1
Behavioral task
behavioral1
Sample
9306afcee1aff2cf3316ed9eff6a2df6014ed0b18da748ae6582c773fc3f16e6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9306afcee1aff2cf3316ed9eff6a2df6014ed0b18da748ae6582c773fc3f16e6.exe
Resource
win10v2004-20221111-en
General
-
Target
9306afcee1aff2cf3316ed9eff6a2df6014ed0b18da748ae6582c773fc3f16e6.exe
-
Size
800KB
-
MD5
219b52b444403d89ca3095a12dd0323f
-
SHA1
1b5244791930c0c5067682c9cc0788b9673eb96d
-
SHA256
9306afcee1aff2cf3316ed9eff6a2df6014ed0b18da748ae6582c773fc3f16e6
-
SHA512
3461aafa090be28aef3d1a0c6c4e68b9d1e9589943b6b88508ce66ae0c1ffb889a8a05a6c35019331ae7c586cce8a7d9ab9d1ceb873221c03493e478ee80d844
-
SSDEEP
24576:a2m2x07lFq+IOsaK20yeUAt91pdu3T/d3Dypy2:XFx0R4+IOsaK20/tW3T/dmpy2
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/940-57-0x0000000001000000-0x0000000001204000-memory.dmp upx behavioral1/memory/940-58-0x0000000001000000-0x0000000001204000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 9306afcee1aff2cf3316ed9eff6a2df6014ed0b18da748ae6582c773fc3f16e6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SonyAgent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9306afcee1aff2cf3316ed9eff6a2df6014ed0b18da748ae6582c773fc3f16e6.exe" 9306afcee1aff2cf3316ed9eff6a2df6014ed0b18da748ae6582c773fc3f16e6.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.