Analysis
-
max time kernel
187s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 02:41
Static task
static1
Behavioral task
behavioral1
Sample
7be7f3abe70fd58b965c5ea968504efc2b91876cb00dfb62eea3a0292f6f29a8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7be7f3abe70fd58b965c5ea968504efc2b91876cb00dfb62eea3a0292f6f29a8.exe
Resource
win10v2004-20220812-en
General
-
Target
7be7f3abe70fd58b965c5ea968504efc2b91876cb00dfb62eea3a0292f6f29a8.exe
-
Size
828KB
-
MD5
69278d68d64ad7d86e3ff227362f0c90
-
SHA1
1f307551da405e30f4756151824bda7053d74a21
-
SHA256
7be7f3abe70fd58b965c5ea968504efc2b91876cb00dfb62eea3a0292f6f29a8
-
SHA512
49d24c6dc8858e9dab00cae6342f458cdd9fa8b1bf86c5a7aeac93188c5fc964f082a19108bae48628261f602d4ee1feba6fc4d3a1565f10ee8824b4f97f1f23
-
SSDEEP
24576:y4p0hj9o7fR8w/FSgtggp/UMPKSI6ldw25YfG+wBJpsfeCg:ij2bew/FSCgkXOhwBsLg
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2008-57-0x0000000000390000-0x00000000005CB000-memory.dmp upx behavioral1/memory/2008-58-0x0000000000390000-0x00000000005CB000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 7be7f3abe70fd58b965c5ea968504efc2b91876cb00dfb62eea3a0292f6f29a8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SonyAgent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7be7f3abe70fd58b965c5ea968504efc2b91876cb00dfb62eea3a0292f6f29a8.exe" 7be7f3abe70fd58b965c5ea968504efc2b91876cb00dfb62eea3a0292f6f29a8.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.