Analysis
-
max time kernel
152s -
max time network
185s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
c71ac2dbecd8f677f9b764116199ff266f54f2457f8b080bca4a4a880a1b4c5d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c71ac2dbecd8f677f9b764116199ff266f54f2457f8b080bca4a4a880a1b4c5d.exe
Resource
win10v2004-20220901-en
General
-
Target
c71ac2dbecd8f677f9b764116199ff266f54f2457f8b080bca4a4a880a1b4c5d.exe
-
Size
748KB
-
MD5
68af52df415780a857cf96ac1eebf661
-
SHA1
840ba155c823530cb78951f889b238c7a5028748
-
SHA256
c71ac2dbecd8f677f9b764116199ff266f54f2457f8b080bca4a4a880a1b4c5d
-
SHA512
1d43e1c5c4a041ec21f2cddee09c50ffe9d5df4137d64d68cfa540c563310e1dd1d80fbbbe8cb5d02fc235413ddbbd81b0b81fa33444a40121b5d76d388689a8
-
SSDEEP
12288:0+R+wubusvEIM+bt4WcwI/18upIXCR6l4s3aSM1nR8vju1gpbaI5xi:o7MnWy/1h26s34evC2II3
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/968-54-0x0000000000400000-0x0000000000617000-memory.dmp upx behavioral1/memory/968-56-0x0000000000400000-0x0000000000617000-memory.dmp upx behavioral1/memory/968-58-0x0000000000400000-0x0000000000617000-memory.dmp upx behavioral1/memory/968-59-0x0000000000400000-0x0000000000617000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run c71ac2dbecd8f677f9b764116199ff266f54f2457f8b080bca4a4a880a1b4c5d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SonyAgent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c71ac2dbecd8f677f9b764116199ff266f54f2457f8b080bca4a4a880a1b4c5d.exe" c71ac2dbecd8f677f9b764116199ff266f54f2457f8b080bca4a4a880a1b4c5d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.