Analysis
-
max time kernel
29s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-03-2023 20:53
Static task
static1
Behavioral task
behavioral1
Sample
Salwyrr Launcher Installer.exe
Resource
win7-20230220-en
General
-
Target
Salwyrr Launcher Installer.exe
-
Size
46KB
-
MD5
38633bfef3c1fe505a39a688b5c31828
-
SHA1
4e053e5ca9e8bfcf372b4331b18c36d637332bbc
-
SHA256
413a460fae724b972ab9c52aeab029552245555c7df5b79eb2a6529e1dd7a090
-
SHA512
812ebfa26ff63ade8ab4851230fe47c0ffb797b5a8c48d6ab7ad3293a4995c088bedb8ca7ad6c48a63b3c7f60cdf5b2b318b39dc232ef2096721aba7734ea8f7
-
SSDEEP
768:PE55gC6d1VepljbMBMxECL67qtjMGF9TtgmAtugTtyKr:svh6dTepljLEf44u4mMuAyKr
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 12 IoCs
pid Process 1720 netsh.exe 1696 netsh.exe 1528 netsh.exe 976 netsh.exe 896 netsh.exe 1440 netsh.exe 1608 netsh.exe 1736 netsh.exe 900 netsh.exe 1580 netsh.exe 1980 netsh.exe 1536 netsh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1544 2012 WerFault.exe 26 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2012 Salwyrr Launcher Installer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1736 2012 Salwyrr Launcher Installer.exe 27 PID 2012 wrote to memory of 1736 2012 Salwyrr Launcher Installer.exe 27 PID 2012 wrote to memory of 1736 2012 Salwyrr Launcher Installer.exe 27 PID 2012 wrote to memory of 1736 2012 Salwyrr Launcher Installer.exe 27 PID 2012 wrote to memory of 1736 2012 Salwyrr Launcher Installer.exe 27 PID 2012 wrote to memory of 1736 2012 Salwyrr Launcher Installer.exe 27 PID 2012 wrote to memory of 1736 2012 Salwyrr Launcher Installer.exe 27 PID 2012 wrote to memory of 1720 2012 Salwyrr Launcher Installer.exe 29 PID 2012 wrote to memory of 1720 2012 Salwyrr Launcher Installer.exe 29 PID 2012 wrote to memory of 1720 2012 Salwyrr Launcher Installer.exe 29 PID 2012 wrote to memory of 1720 2012 Salwyrr Launcher Installer.exe 29 PID 2012 wrote to memory of 1720 2012 Salwyrr Launcher Installer.exe 29 PID 2012 wrote to memory of 1720 2012 Salwyrr Launcher Installer.exe 29 PID 2012 wrote to memory of 1720 2012 Salwyrr Launcher Installer.exe 29 PID 2012 wrote to memory of 1696 2012 Salwyrr Launcher Installer.exe 31 PID 2012 wrote to memory of 1696 2012 Salwyrr Launcher Installer.exe 31 PID 2012 wrote to memory of 1696 2012 Salwyrr Launcher Installer.exe 31 PID 2012 wrote to memory of 1696 2012 Salwyrr Launcher Installer.exe 31 PID 2012 wrote to memory of 1696 2012 Salwyrr Launcher Installer.exe 31 PID 2012 wrote to memory of 1696 2012 Salwyrr Launcher Installer.exe 31 PID 2012 wrote to memory of 1696 2012 Salwyrr Launcher Installer.exe 31 PID 2012 wrote to memory of 1528 2012 Salwyrr Launcher Installer.exe 33 PID 2012 wrote to memory of 1528 2012 Salwyrr Launcher Installer.exe 33 PID 2012 wrote to memory of 1528 2012 Salwyrr Launcher Installer.exe 33 PID 2012 wrote to memory of 1528 2012 Salwyrr Launcher Installer.exe 33 PID 2012 wrote to memory of 1528 2012 Salwyrr Launcher Installer.exe 33 PID 2012 wrote to memory of 1528 2012 Salwyrr Launcher Installer.exe 33 PID 2012 wrote to memory of 1528 2012 Salwyrr Launcher Installer.exe 33 PID 2012 wrote to memory of 900 2012 Salwyrr Launcher Installer.exe 35 PID 2012 wrote to memory of 900 2012 Salwyrr Launcher Installer.exe 35 PID 2012 wrote to memory of 900 2012 Salwyrr Launcher Installer.exe 35 PID 2012 wrote to memory of 900 2012 Salwyrr Launcher Installer.exe 35 PID 2012 wrote to memory of 900 2012 Salwyrr Launcher Installer.exe 35 PID 2012 wrote to memory of 900 2012 Salwyrr Launcher Installer.exe 35 PID 2012 wrote to memory of 900 2012 Salwyrr Launcher Installer.exe 35 PID 2012 wrote to memory of 1580 2012 Salwyrr Launcher Installer.exe 37 PID 2012 wrote to memory of 1580 2012 Salwyrr Launcher Installer.exe 37 PID 2012 wrote to memory of 1580 2012 Salwyrr Launcher Installer.exe 37 PID 2012 wrote to memory of 1580 2012 Salwyrr Launcher Installer.exe 37 PID 2012 wrote to memory of 1580 2012 Salwyrr Launcher Installer.exe 37 PID 2012 wrote to memory of 1580 2012 Salwyrr Launcher Installer.exe 37 PID 2012 wrote to memory of 1580 2012 Salwyrr Launcher Installer.exe 37 PID 2012 wrote to memory of 1980 2012 Salwyrr Launcher Installer.exe 39 PID 2012 wrote to memory of 1980 2012 Salwyrr Launcher Installer.exe 39 PID 2012 wrote to memory of 1980 2012 Salwyrr Launcher Installer.exe 39 PID 2012 wrote to memory of 1980 2012 Salwyrr Launcher Installer.exe 39 PID 2012 wrote to memory of 1980 2012 Salwyrr Launcher Installer.exe 39 PID 2012 wrote to memory of 1980 2012 Salwyrr Launcher Installer.exe 39 PID 2012 wrote to memory of 1980 2012 Salwyrr Launcher Installer.exe 39 PID 2012 wrote to memory of 976 2012 Salwyrr Launcher Installer.exe 41 PID 2012 wrote to memory of 976 2012 Salwyrr Launcher Installer.exe 41 PID 2012 wrote to memory of 976 2012 Salwyrr Launcher Installer.exe 41 PID 2012 wrote to memory of 976 2012 Salwyrr Launcher Installer.exe 41 PID 2012 wrote to memory of 976 2012 Salwyrr Launcher Installer.exe 41 PID 2012 wrote to memory of 976 2012 Salwyrr Launcher Installer.exe 41 PID 2012 wrote to memory of 976 2012 Salwyrr Launcher Installer.exe 41 PID 2012 wrote to memory of 1536 2012 Salwyrr Launcher Installer.exe 43 PID 2012 wrote to memory of 1536 2012 Salwyrr Launcher Installer.exe 43 PID 2012 wrote to memory of 1536 2012 Salwyrr Launcher Installer.exe 43 PID 2012 wrote to memory of 1536 2012 Salwyrr Launcher Installer.exe 43 PID 2012 wrote to memory of 1536 2012 Salwyrr Launcher Installer.exe 43 PID 2012 wrote to memory of 1536 2012 Salwyrr Launcher Installer.exe 43 PID 2012 wrote to memory of 1536 2012 Salwyrr Launcher Installer.exe 43 PID 2012 wrote to memory of 896 2012 Salwyrr Launcher Installer.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\Salwyrr Launcher Installer.exe"C:\Users\Admin\AppData\Local\Temp\Salwyrr Launcher Installer.exe" netstat -ano1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall show rule name="Salwyrr Client Java 1a"2⤵
- Modifies Windows Firewall
PID:1736
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall add rule name="Salwyrr Client Java 1a" dir=in action=allow protocol=any localip=any remoteip=any program="C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\javaw.exe"2⤵
- Modifies Windows Firewall
PID:1720
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall show rule name="Salwyrr Client Java 2a"2⤵
- Modifies Windows Firewall
PID:1696
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall add rule name="Salwyrr Client Java 2a" dir=in action=allow protocol=any localip=any remoteip=any program="C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\jre\bin\javaw.exe"2⤵
- Modifies Windows Firewall
PID:1528
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall show rule name="Salwyrr Client Java 3a"2⤵
- Modifies Windows Firewall
PID:900
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall add rule name="Salwyrr Client Java 3a" dir=in action=allow protocol=any localip=any remoteip=any program="C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\java-runtime-alpha\bin\javaw.exe"2⤵
- Modifies Windows Firewall
PID:1580
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall show rule name="Salwyrr Client Java 1b"2⤵
- Modifies Windows Firewall
PID:1980
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall add rule name="Salwyrr Client Java 1b" dir=in action=allow protocol=any localip=any remoteip=any program="C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\java.exe"2⤵
- Modifies Windows Firewall
PID:976
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall show rule name="Salwyrr Client Java 2b"2⤵
- Modifies Windows Firewall
PID:1536
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall add rule name="Salwyrr Client Java 2b" dir=in action=allow protocol=any localip=any remoteip=any program="C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\jre\bin\java.exe"2⤵
- Modifies Windows Firewall
PID:896
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall show rule name="Salwyrr Client Java 3b"2⤵
- Modifies Windows Firewall
PID:1440
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall add rule name="Salwyrr Client Java 3b" dir=in action=allow protocol=any localip=any remoteip=any program="C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\java-runtime-alpha\bin\java.exe"2⤵
- Modifies Windows Firewall
PID:1608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 22562⤵
- Program crash
PID:1544
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\openlogic-openjdk-jre-8u332-b09-windows-64\lib\images\cursors\win32_LinkNoDrop32x32.gif
Filesize153B
MD51e9d8f133a442da6b0c74d49bc84a341
SHA1259edc45b4569427e8319895a444f4295d54348f
SHA2561a1d3079d49583837662b84e11d8c0870698511d9110e710eb8e7eb20df7ae3b
SHA51263d6f70c8cab9735f0f857f5bf99e319f6ae98238dc7829dd706b7d6855c70be206e32e3e55df884402483cf8bebad00d139283af5c0b85dc1c5bf8f253acd37