Analysis
-
max time kernel
153s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 01:38
Static task
static1
Behavioral task
behavioral1
Sample
8c8f9b6cf6259e648788327bf7132ef5b4a2ba3080ca153afc21f55b70e0b299.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8c8f9b6cf6259e648788327bf7132ef5b4a2ba3080ca153afc21f55b70e0b299.exe
Resource
win10v2004-20220812-en
General
-
Target
8c8f9b6cf6259e648788327bf7132ef5b4a2ba3080ca153afc21f55b70e0b299.exe
-
Size
822KB
-
MD5
d716445461e280570fdf4f25f375455e
-
SHA1
c212be80c39d7eb73baf78e777b8200ebce2bcbe
-
SHA256
8c8f9b6cf6259e648788327bf7132ef5b4a2ba3080ca153afc21f55b70e0b299
-
SHA512
e81b48322122b344175a7ae41ade5fa53874f84bbcf9122b03b1d10096d840b518b0373471472a73ac3aac425446acc2cd2272ff2e35f005bc390e681ca80d9e
-
SSDEEP
24576:IK+6ujjYHP+UK9x5tiQs3GxD/2LEZJvP41FAQ:vfu55ZIQs3w72LEfo1F
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2044-57-0x00000000013C0000-0x00000000015EE000-memory.dmp upx behavioral1/memory/2044-58-0x00000000013C0000-0x00000000015EE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 8c8f9b6cf6259e648788327bf7132ef5b4a2ba3080ca153afc21f55b70e0b299.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SonyAgent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8c8f9b6cf6259e648788327bf7132ef5b4a2ba3080ca153afc21f55b70e0b299.exe" 8c8f9b6cf6259e648788327bf7132ef5b4a2ba3080ca153afc21f55b70e0b299.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.