Analysis
-
max time kernel
152s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 00:46
Static task
static1
Behavioral task
behavioral1
Sample
98b29be73a807b3dceacc44a5f7f54ebee48e7965adfda3b95ca625f64b974a7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
98b29be73a807b3dceacc44a5f7f54ebee48e7965adfda3b95ca625f64b974a7.exe
Resource
win10v2004-20221111-en
General
-
Target
98b29be73a807b3dceacc44a5f7f54ebee48e7965adfda3b95ca625f64b974a7.exe
-
Size
821KB
-
MD5
cb65af542b5d698593cbfe73fca08fd1
-
SHA1
6053567e5412b79b65c934e7b9b7318bcff0935b
-
SHA256
98b29be73a807b3dceacc44a5f7f54ebee48e7965adfda3b95ca625f64b974a7
-
SHA512
153869fae0788e2a6d693323979576dc0731e5c5c0f90b71363058600a760c70a29911834d8a2433ac17cf18114217745d9a83f515f17e880bab0c679b2c47bd
-
SSDEEP
12288:oWWY10n3ZzXwa1r3RKdK5sfml4He7Y3oEw3DJG3AYevcNGw8e/zl6/fYxaqbJfC7:bWln3Fwa1LR0K5j4T4aA6n8erlAGcuX
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/836-57-0x0000000000130000-0x0000000000356000-memory.dmp upx behavioral1/memory/836-58-0x0000000000130000-0x0000000000356000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 98b29be73a807b3dceacc44a5f7f54ebee48e7965adfda3b95ca625f64b974a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SonyAgent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\98b29be73a807b3dceacc44a5f7f54ebee48e7965adfda3b95ca625f64b974a7.exe" 98b29be73a807b3dceacc44a5f7f54ebee48e7965adfda3b95ca625f64b974a7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.