Analysis
-
max time kernel
149s -
max time network
187s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 14:18
Static task
static1
Behavioral task
behavioral1
Sample
5aee99ddf0295700d4513ed9c734bed57102bd8f97c44dfc32b33d260286bc65.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5aee99ddf0295700d4513ed9c734bed57102bd8f97c44dfc32b33d260286bc65.exe
Resource
win10v2004-20220812-en
General
-
Target
5aee99ddf0295700d4513ed9c734bed57102bd8f97c44dfc32b33d260286bc65.exe
-
Size
745KB
-
MD5
766635f1eae6aa260e60d650c03beb8f
-
SHA1
25680b914fe14ec1500fcd4c23e57a7d769b9bff
-
SHA256
5aee99ddf0295700d4513ed9c734bed57102bd8f97c44dfc32b33d260286bc65
-
SHA512
78e69f2cd71f0ce9425dd999099406f544251e6c0caadb9d6168293eb0bf9d7fd4e0735c8ae667c0166b38900035d1a0d518b474c102412bf2301e379a98a30a
-
SSDEEP
12288:zzYWo3M4qAOBbLcSKe8hHfVrqAHkvhqogO9Ncw11QuJiAk2POAgfVpTop9Y0d/y+:fYWopqAO6SH8dqbvVX2w1e2sXMpasyux
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1948-54-0x0000000000400000-0x0000000000614000-memory.dmp upx behavioral1/memory/1948-56-0x0000000000400000-0x0000000000614000-memory.dmp upx behavioral1/memory/1948-58-0x0000000000400000-0x0000000000614000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 5aee99ddf0295700d4513ed9c734bed57102bd8f97c44dfc32b33d260286bc65.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SonyAgent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5aee99ddf0295700d4513ed9c734bed57102bd8f97c44dfc32b33d260286bc65.exe" 5aee99ddf0295700d4513ed9c734bed57102bd8f97c44dfc32b33d260286bc65.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.