Analysis

  • max time kernel
    43s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    31-01-2023 01:35

General

  • Target

    Salwyrr Launcher Installer.exe

  • Size

    46KB

  • MD5

    38633bfef3c1fe505a39a688b5c31828

  • SHA1

    4e053e5ca9e8bfcf372b4331b18c36d637332bbc

  • SHA256

    413a460fae724b972ab9c52aeab029552245555c7df5b79eb2a6529e1dd7a090

  • SHA512

    812ebfa26ff63ade8ab4851230fe47c0ffb797b5a8c48d6ab7ad3293a4995c088bedb8ca7ad6c48a63b3c7f60cdf5b2b318b39dc232ef2096721aba7734ea8f7

  • SSDEEP

    768:PE55gC6d1VepljbMBMxECL67qtjMGF9TtgmAtugTtyKr:svh6dTepljLEf44u4mMuAyKr

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Modifies Windows Firewall 1 TTPs 12 IoCs
  • Loads dropped DLL 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Salwyrr Launcher Installer.exe
    "C:\Users\Admin\AppData\Local\Temp\Salwyrr Launcher Installer.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\SysWOW64\netsh.exe
      "netsh" advfirewall firewall show rule name="Salwyrr Client Java 1a"
      2⤵
      • Modifies Windows Firewall
      PID:1260
    • C:\Windows\SysWOW64\netsh.exe
      "netsh" advfirewall firewall add rule name="Salwyrr Client Java 1a" dir=in action=allow protocol=any localip=any remoteip=any program="C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\javaw.exe"
      2⤵
      • Modifies Windows Firewall
      PID:1560
    • C:\Windows\SysWOW64\netsh.exe
      "netsh" advfirewall firewall show rule name="Salwyrr Client Java 2a"
      2⤵
      • Modifies Windows Firewall
      PID:692
    • C:\Windows\SysWOW64\netsh.exe
      "netsh" advfirewall firewall add rule name="Salwyrr Client Java 2a" dir=in action=allow protocol=any localip=any remoteip=any program="C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\jre\bin\javaw.exe"
      2⤵
      • Modifies Windows Firewall
      PID:1388
    • C:\Windows\SysWOW64\netsh.exe
      "netsh" advfirewall firewall show rule name="Salwyrr Client Java 3a"
      2⤵
      • Modifies Windows Firewall
      PID:1780
    • C:\Windows\SysWOW64\netsh.exe
      "netsh" advfirewall firewall add rule name="Salwyrr Client Java 3a" dir=in action=allow protocol=any localip=any remoteip=any program="C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\java-runtime-alpha\bin\javaw.exe"
      2⤵
      • Modifies Windows Firewall
      PID:760
    • C:\Windows\SysWOW64\netsh.exe
      "netsh" advfirewall firewall show rule name="Salwyrr Client Java 1b"
      2⤵
      • Modifies Windows Firewall
      PID:2044
    • C:\Windows\SysWOW64\netsh.exe
      "netsh" advfirewall firewall add rule name="Salwyrr Client Java 1b" dir=in action=allow protocol=any localip=any remoteip=any program="C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\java.exe"
      2⤵
      • Modifies Windows Firewall
      PID:1700
    • C:\Windows\SysWOW64\netsh.exe
      "netsh" advfirewall firewall show rule name="Salwyrr Client Java 2b"
      2⤵
      • Modifies Windows Firewall
      PID:1976
    • C:\Windows\SysWOW64\netsh.exe
      "netsh" advfirewall firewall add rule name="Salwyrr Client Java 2b" dir=in action=allow protocol=any localip=any remoteip=any program="C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\jre\bin\java.exe"
      2⤵
      • Modifies Windows Firewall
      PID:772
    • C:\Windows\SysWOW64\netsh.exe
      "netsh" advfirewall firewall show rule name="Salwyrr Client Java 3b"
      2⤵
      • Modifies Windows Firewall
      PID:1052
    • C:\Windows\SysWOW64\netsh.exe
      "netsh" advfirewall firewall add rule name="Salwyrr Client Java 3b" dir=in action=allow protocol=any localip=any remoteip=any program="C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\java-runtime-alpha\bin\java.exe"
      2⤵
      • Modifies Windows Firewall
      PID:576
    • C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\javaw.exe
      "C:\Users\Admin\AppData\Roaming\.Salwyrr/launcher/bootstrap/jre/bin/javaw.exe" -Xmx1G -jar "launcher/bootstrap/updater.jar"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1588

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\java.dll

    Filesize

    160KB

    MD5

    0c4673c6d3fbb7b62b9d83b41893ee23

    SHA1

    516a489686d0fab9f3223414969b347df79b3b64

    SHA256

    8163acdbca856f15f8cb3d532cf79d906d94b4d58250911b0600fbed8b17fefa

    SHA512

    0278fe0487a04d12f2c3745305506812e4d8e28c3a2d90f060e417a43129437a28809a081e371978a01499cd932497ef7e1f0c6c9675acb541ea2c5225fe32ba

  • C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\javaw.exe

    Filesize

    223KB

    MD5

    68f55ca782ebe9bb2f932e3a3d6ffd8a

    SHA1

    0f13e8e11ce24123bacf23a8b116bc777a0ac072

    SHA256

    6e6517ee65b753af161608be59bafc72ba3f670e4c48a8eb7e30170b0f0ef80b

    SHA512

    f6cc93e8b6f9f9ca72c870f2a1711c41bcba8d7ec7cd5d1003fb96e77f7700b1627738ed83493b863424edaba6e3821818b7977252edad3481bb4404c184c76d

  • C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\msvcp120.dll

    Filesize

    645KB

    MD5

    4e38c42ff10a1689cf277eadc895d374

    SHA1

    6e4934c413ff2943ab535c2f7590fda1f4ecf1c2

    SHA256

    bdd61f3ec686965716c4c6048aa4ef46088739c63d6f314f37f691ef13fd22c3

    SHA512

    b7e309e3c69a678793465af1c3041bd66adb88cc8c03362bf4b3941881d9f19905ede7fbb8e2fbc2ce0c05495aeef9af99ae17364f37661d0c635310c1b805bb

  • C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\msvcr120.dll

    Filesize

    944KB

    MD5

    e9c471b35f7cb4eeccfd7bea873262ac

    SHA1

    5cd7885b5e81ac9d2fed4015b1080799ead0d384

    SHA256

    69968e25a8f5554e7b09423a6da659ad6175a2c62725b0ae42a70c99f424cc69

    SHA512

    1a7351cf3f205f804eb796b57cbcce49b4bcd8c0edc9c62af130df0d3f8b61d56663b51bf1caccce8ea1862dcc1b61d85dda36ab9fd2b6eb42d7d4d550eca2ca

  • C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\server\jvm.dll

    Filesize

    8.4MB

    MD5

    62fffae8a5d1fc7cf105ae5cf0073ca5

    SHA1

    bf4fcddf4551a36a211670581897beeeda898f9b

    SHA256

    1689d8a76fd30487f63a1227a2a47d4f017a8eca0045eb4b04d06a876155e4bf

    SHA512

    737324142c2c0d53bd7ac4f09552241c770f58051189397b59996688a2751396209df9d8c5f442a60858728b7e31a5885c011d74733f86301b3f52573bec0d86

  • C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\verify.dll

    Filesize

    54KB

    MD5

    e550fce5ee668230ae0b71bf702fde82

    SHA1

    8efbe790a626d70ec59f28ba907eabd9f13e7932

    SHA256

    96cbf775c060744cf158d811b0f45c4abfa9a89d7ff9920ab1bbe05c283e8224

    SHA512

    7a5a1270391a096a81c868e8c1cd9fe2cbb0dfea53c388c636c7e5c4012b13ebc7eee1b54b563b6def263874784b57c5b131757b393a1e5831958e3f18313106

  • C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\lib\amd64\jvm.cfg

    Filesize

    1KB

    MD5

    c60e77ff5f3887c743971e73e6f0e0b1

    SHA1

    9b0cfd38ec5b7bd5bd1c364dee2e1b452a063c02

    SHA256

    23f728cc2bf14e62d454190ea0139f159031b5bd9c3f141ca9237c4c5c96ec1d

    SHA512

    07aca3de1a03a3b64b691fd41e35e6596760baf24c4f24e86fca87d2acf3a4814b17cd9751adc2dcd0689848f3d582fb3ee01d413e3a61d1d98397d72fe545e9

  • C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\updater.jar

    Filesize

    807KB

    MD5

    a616e898ea735980492f41da00f88f39

    SHA1

    6de46eb8ddc768bb6652d45fe59904371e153c5d

    SHA256

    f018c09f5f093f5aa02fe54efb36d2c79382da298bdd16731f22a51ad69bf240

    SHA512

    130337c5738e9cee84dff629c5d4a34f9b2bbf587e7b0eaa518075a76a8086854e7604c9ae23455eca239fbbf36c3c1472b477d306a347a1dba9b1c63c61ee3d

  • \Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\java.dll

    Filesize

    160KB

    MD5

    0c4673c6d3fbb7b62b9d83b41893ee23

    SHA1

    516a489686d0fab9f3223414969b347df79b3b64

    SHA256

    8163acdbca856f15f8cb3d532cf79d906d94b4d58250911b0600fbed8b17fefa

    SHA512

    0278fe0487a04d12f2c3745305506812e4d8e28c3a2d90f060e417a43129437a28809a081e371978a01499cd932497ef7e1f0c6c9675acb541ea2c5225fe32ba

  • \Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\java.dll

    Filesize

    160KB

    MD5

    0c4673c6d3fbb7b62b9d83b41893ee23

    SHA1

    516a489686d0fab9f3223414969b347df79b3b64

    SHA256

    8163acdbca856f15f8cb3d532cf79d906d94b4d58250911b0600fbed8b17fefa

    SHA512

    0278fe0487a04d12f2c3745305506812e4d8e28c3a2d90f060e417a43129437a28809a081e371978a01499cd932497ef7e1f0c6c9675acb541ea2c5225fe32ba

  • \Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\java.dll

    Filesize

    160KB

    MD5

    0c4673c6d3fbb7b62b9d83b41893ee23

    SHA1

    516a489686d0fab9f3223414969b347df79b3b64

    SHA256

    8163acdbca856f15f8cb3d532cf79d906d94b4d58250911b0600fbed8b17fefa

    SHA512

    0278fe0487a04d12f2c3745305506812e4d8e28c3a2d90f060e417a43129437a28809a081e371978a01499cd932497ef7e1f0c6c9675acb541ea2c5225fe32ba

  • \Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\java.dll

    Filesize

    160KB

    MD5

    0c4673c6d3fbb7b62b9d83b41893ee23

    SHA1

    516a489686d0fab9f3223414969b347df79b3b64

    SHA256

    8163acdbca856f15f8cb3d532cf79d906d94b4d58250911b0600fbed8b17fefa

    SHA512

    0278fe0487a04d12f2c3745305506812e4d8e28c3a2d90f060e417a43129437a28809a081e371978a01499cd932497ef7e1f0c6c9675acb541ea2c5225fe32ba

  • \Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\java.dll

    Filesize

    160KB

    MD5

    0c4673c6d3fbb7b62b9d83b41893ee23

    SHA1

    516a489686d0fab9f3223414969b347df79b3b64

    SHA256

    8163acdbca856f15f8cb3d532cf79d906d94b4d58250911b0600fbed8b17fefa

    SHA512

    0278fe0487a04d12f2c3745305506812e4d8e28c3a2d90f060e417a43129437a28809a081e371978a01499cd932497ef7e1f0c6c9675acb541ea2c5225fe32ba

  • \Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\java.dll

    Filesize

    160KB

    MD5

    0c4673c6d3fbb7b62b9d83b41893ee23

    SHA1

    516a489686d0fab9f3223414969b347df79b3b64

    SHA256

    8163acdbca856f15f8cb3d532cf79d906d94b4d58250911b0600fbed8b17fefa

    SHA512

    0278fe0487a04d12f2c3745305506812e4d8e28c3a2d90f060e417a43129437a28809a081e371978a01499cd932497ef7e1f0c6c9675acb541ea2c5225fe32ba

  • \Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\java.dll

    Filesize

    160KB

    MD5

    0c4673c6d3fbb7b62b9d83b41893ee23

    SHA1

    516a489686d0fab9f3223414969b347df79b3b64

    SHA256

    8163acdbca856f15f8cb3d532cf79d906d94b4d58250911b0600fbed8b17fefa

    SHA512

    0278fe0487a04d12f2c3745305506812e4d8e28c3a2d90f060e417a43129437a28809a081e371978a01499cd932497ef7e1f0c6c9675acb541ea2c5225fe32ba

  • \Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\javaw.exe

    Filesize

    223KB

    MD5

    68f55ca782ebe9bb2f932e3a3d6ffd8a

    SHA1

    0f13e8e11ce24123bacf23a8b116bc777a0ac072

    SHA256

    6e6517ee65b753af161608be59bafc72ba3f670e4c48a8eb7e30170b0f0ef80b

    SHA512

    f6cc93e8b6f9f9ca72c870f2a1711c41bcba8d7ec7cd5d1003fb96e77f7700b1627738ed83493b863424edaba6e3821818b7977252edad3481bb4404c184c76d

  • \Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\javaw.exe

    Filesize

    223KB

    MD5

    68f55ca782ebe9bb2f932e3a3d6ffd8a

    SHA1

    0f13e8e11ce24123bacf23a8b116bc777a0ac072

    SHA256

    6e6517ee65b753af161608be59bafc72ba3f670e4c48a8eb7e30170b0f0ef80b

    SHA512

    f6cc93e8b6f9f9ca72c870f2a1711c41bcba8d7ec7cd5d1003fb96e77f7700b1627738ed83493b863424edaba6e3821818b7977252edad3481bb4404c184c76d

  • \Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\javaw.exe

    Filesize

    223KB

    MD5

    68f55ca782ebe9bb2f932e3a3d6ffd8a

    SHA1

    0f13e8e11ce24123bacf23a8b116bc777a0ac072

    SHA256

    6e6517ee65b753af161608be59bafc72ba3f670e4c48a8eb7e30170b0f0ef80b

    SHA512

    f6cc93e8b6f9f9ca72c870f2a1711c41bcba8d7ec7cd5d1003fb96e77f7700b1627738ed83493b863424edaba6e3821818b7977252edad3481bb4404c184c76d

  • \Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\javaw.exe

    Filesize

    223KB

    MD5

    68f55ca782ebe9bb2f932e3a3d6ffd8a

    SHA1

    0f13e8e11ce24123bacf23a8b116bc777a0ac072

    SHA256

    6e6517ee65b753af161608be59bafc72ba3f670e4c48a8eb7e30170b0f0ef80b

    SHA512

    f6cc93e8b6f9f9ca72c870f2a1711c41bcba8d7ec7cd5d1003fb96e77f7700b1627738ed83493b863424edaba6e3821818b7977252edad3481bb4404c184c76d

  • \Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\msvcp120.dll

    Filesize

    645KB

    MD5

    4e38c42ff10a1689cf277eadc895d374

    SHA1

    6e4934c413ff2943ab535c2f7590fda1f4ecf1c2

    SHA256

    bdd61f3ec686965716c4c6048aa4ef46088739c63d6f314f37f691ef13fd22c3

    SHA512

    b7e309e3c69a678793465af1c3041bd66adb88cc8c03362bf4b3941881d9f19905ede7fbb8e2fbc2ce0c05495aeef9af99ae17364f37661d0c635310c1b805bb

  • \Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\msvcr120.dll

    Filesize

    944KB

    MD5

    e9c471b35f7cb4eeccfd7bea873262ac

    SHA1

    5cd7885b5e81ac9d2fed4015b1080799ead0d384

    SHA256

    69968e25a8f5554e7b09423a6da659ad6175a2c62725b0ae42a70c99f424cc69

    SHA512

    1a7351cf3f205f804eb796b57cbcce49b4bcd8c0edc9c62af130df0d3f8b61d56663b51bf1caccce8ea1862dcc1b61d85dda36ab9fd2b6eb42d7d4d550eca2ca

  • \Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\server\jvm.dll

    Filesize

    8.4MB

    MD5

    62fffae8a5d1fc7cf105ae5cf0073ca5

    SHA1

    bf4fcddf4551a36a211670581897beeeda898f9b

    SHA256

    1689d8a76fd30487f63a1227a2a47d4f017a8eca0045eb4b04d06a876155e4bf

    SHA512

    737324142c2c0d53bd7ac4f09552241c770f58051189397b59996688a2751396209df9d8c5f442a60858728b7e31a5885c011d74733f86301b3f52573bec0d86

  • \Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\verify.dll

    Filesize

    54KB

    MD5

    e550fce5ee668230ae0b71bf702fde82

    SHA1

    8efbe790a626d70ec59f28ba907eabd9f13e7932

    SHA256

    96cbf775c060744cf158d811b0f45c4abfa9a89d7ff9920ab1bbe05c283e8224

    SHA512

    7a5a1270391a096a81c868e8c1cd9fe2cbb0dfea53c388c636c7e5c4012b13ebc7eee1b54b563b6def263874784b57c5b131757b393a1e5831958e3f18313106

  • memory/1588-93-0x000007FEFB741000-0x000007FEFB743000-memory.dmp

    Filesize

    8KB

  • memory/1728-85-0x0000000005135000-0x0000000005146000-memory.dmp

    Filesize

    68KB

  • memory/1728-54-0x0000000075DA1000-0x0000000075DA3000-memory.dmp

    Filesize

    8KB

  • memory/1728-83-0x00000000003D0000-0x00000000003DA000-memory.dmp

    Filesize

    40KB

  • memory/1728-84-0x00000000003D0000-0x00000000003DA000-memory.dmp

    Filesize

    40KB

  • memory/1728-58-0x0000000005135000-0x0000000005146000-memory.dmp

    Filesize

    68KB

  • memory/1728-57-0x00000000003D0000-0x00000000003DA000-memory.dmp

    Filesize

    40KB

  • memory/1728-56-0x00000000003D0000-0x00000000003DA000-memory.dmp

    Filesize

    40KB

  • memory/1728-55-0x00000000013E0000-0x00000000013EE000-memory.dmp

    Filesize

    56KB