Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 18:57
Static task
static1
Behavioral task
behavioral1
Sample
f7950e2f86eed54b1b61106baedcfc2a4de956a51d726e68bcab94657731a510.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f7950e2f86eed54b1b61106baedcfc2a4de956a51d726e68bcab94657731a510.exe
Resource
win10v2004-20220901-en
General
-
Target
f7950e2f86eed54b1b61106baedcfc2a4de956a51d726e68bcab94657731a510.exe
-
Size
763KB
-
MD5
6b54d2e280c0f10373daa6fb438896e2
-
SHA1
6627b2aa6b417109a86a1238fcb0abcd2d44c13a
-
SHA256
f7950e2f86eed54b1b61106baedcfc2a4de956a51d726e68bcab94657731a510
-
SHA512
fa7a304491372292428a9ad0b2b32a1d56aa4400ee4f13a083b6de75374c5bead2d4b96d2cbd49fd028b7165198cb3fda6e58cf75494968fece0ae512299b05a
-
SSDEEP
12288:BFfOq46Id1pPE3fBO45klVO0T73+NnXIDmHp1Z23gItwmdPN1Dei1CH:BRO2IWfBO4ul1uNnL/ZlgzdF1I
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1348-54-0x0000000000400000-0x000000000060C000-memory.dmp upx behavioral1/memory/1348-56-0x0000000000400000-0x000000000060C000-memory.dmp upx behavioral1/memory/1348-58-0x0000000000400000-0x000000000060C000-memory.dmp upx behavioral1/memory/1348-59-0x0000000000400000-0x000000000060C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run f7950e2f86eed54b1b61106baedcfc2a4de956a51d726e68bcab94657731a510.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SonyAgent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f7950e2f86eed54b1b61106baedcfc2a4de956a51d726e68bcab94657731a510.exe" f7950e2f86eed54b1b61106baedcfc2a4de956a51d726e68bcab94657731a510.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.