Analysis
-
max time kernel
161s -
max time network
184s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 12:21
Static task
static1
Behavioral task
behavioral1
Sample
92bccbe1509dcd7b21b7f73caec967958458e5d1862cf2a31604cac8d2fba4de.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
92bccbe1509dcd7b21b7f73caec967958458e5d1862cf2a31604cac8d2fba4de.exe
Resource
win10v2004-20221111-en
General
-
Target
92bccbe1509dcd7b21b7f73caec967958458e5d1862cf2a31604cac8d2fba4de.exe
-
Size
745KB
-
MD5
6bb668f9b40dc3cc6af08b51f85d4c22
-
SHA1
7a7c179146f18ba63a1d32ec4b8d4a3845677f58
-
SHA256
92bccbe1509dcd7b21b7f73caec967958458e5d1862cf2a31604cac8d2fba4de
-
SHA512
ee74398e58abd1be1df7fb02f0d54b924b45973a00102234b6c78460434fbf19800479069d60b2c6b88ab3a5cbb2ab4bbcb40489a79b68565b5441f6e8b2e29a
-
SSDEEP
12288:Op54CMg0+VNsCzJdKa/lwICHOAYDeUWKN5QYUr6pzTFwL6oumThTiHiW8KwMGtlu:S5FMD+VSCzJdJ/lwaLN5xpz6L6/mThTs
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1712-54-0x0000000000400000-0x0000000000614000-memory.dmp upx behavioral1/memory/1712-56-0x0000000000400000-0x0000000000614000-memory.dmp upx behavioral1/memory/1712-58-0x0000000000400000-0x0000000000614000-memory.dmp upx behavioral1/memory/1712-59-0x0000000000400000-0x0000000000614000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 92bccbe1509dcd7b21b7f73caec967958458e5d1862cf2a31604cac8d2fba4de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SonyAgent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\92bccbe1509dcd7b21b7f73caec967958458e5d1862cf2a31604cac8d2fba4de.exe" 92bccbe1509dcd7b21b7f73caec967958458e5d1862cf2a31604cac8d2fba4de.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.