Analysis
-
max time kernel
359s -
max time network
393s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 02:08
Static task
static1
Behavioral task
behavioral1
Sample
85d023063066ccad9276f26948c22921012278cb7eb29715b13fd3809941955f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
85d023063066ccad9276f26948c22921012278cb7eb29715b13fd3809941955f.exe
Resource
win10v2004-20221111-en
General
-
Target
85d023063066ccad9276f26948c22921012278cb7eb29715b13fd3809941955f.exe
-
Size
742KB
-
MD5
f3fa9291ec58c2c651d6013e2ce7b8d9
-
SHA1
43f7eea8c1349b5295895f390270b164da44c502
-
SHA256
85d023063066ccad9276f26948c22921012278cb7eb29715b13fd3809941955f
-
SHA512
bf0742306f7649026661d2ad74ea33b88142f681f85b5c396d2c7c7b72ddd7b116901ed109134fabb908e931ec4159cce6e76b2b3084c7b86f2786eb5f021f30
-
SSDEEP
12288:+gNHzaiS+g3bP2ogRV0t+iadWvY02d+HlFwTYRhHtlxwY9gsPkOK0vJMFBPWJO6:5Fe+g3bP2BM+iYWvY0o+HlaTwNQCgXrq
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2132-132-0x0000000000400000-0x0000000000613000-memory.dmp upx behavioral2/memory/2132-134-0x0000000000400000-0x0000000000613000-memory.dmp upx behavioral2/memory/2132-135-0x0000000000400000-0x0000000000613000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 85d023063066ccad9276f26948c22921012278cb7eb29715b13fd3809941955f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SonyAgent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\85d023063066ccad9276f26948c22921012278cb7eb29715b13fd3809941955f.exe" 85d023063066ccad9276f26948c22921012278cb7eb29715b13fd3809941955f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.