Analysis
-
max time kernel
30s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07/03/2023, 18:14
Static task
static1
Behavioral task
behavioral1
Sample
Salwyrr Launcher Installer.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Salwyrr Launcher Installer.exe
Resource
win10v2004-20230220-en
General
-
Target
Salwyrr Launcher Installer.exe
-
Size
46KB
-
MD5
38633bfef3c1fe505a39a688b5c31828
-
SHA1
4e053e5ca9e8bfcf372b4331b18c36d637332bbc
-
SHA256
413a460fae724b972ab9c52aeab029552245555c7df5b79eb2a6529e1dd7a090
-
SHA512
812ebfa26ff63ade8ab4851230fe47c0ffb797b5a8c48d6ab7ad3293a4995c088bedb8ca7ad6c48a63b3c7f60cdf5b2b318b39dc232ef2096721aba7734ea8f7
-
SSDEEP
768:PE55gC6d1VepljbMBMxECL67qtjMGF9TtgmAtugTtyKr:svh6dTepljLEf44u4mMuAyKr
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 12 IoCs
pid Process 1488 netsh.exe 1228 netsh.exe 1608 netsh.exe 1504 netsh.exe 576 netsh.exe 1056 netsh.exe 1300 netsh.exe 1536 netsh.exe 1616 netsh.exe 1176 netsh.exe 940 netsh.exe 704 netsh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2004 2036 WerFault.exe 26 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2036 Salwyrr Launcher Installer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1176 2036 Salwyrr Launcher Installer.exe 27 PID 2036 wrote to memory of 1176 2036 Salwyrr Launcher Installer.exe 27 PID 2036 wrote to memory of 1176 2036 Salwyrr Launcher Installer.exe 27 PID 2036 wrote to memory of 1176 2036 Salwyrr Launcher Installer.exe 27 PID 2036 wrote to memory of 1176 2036 Salwyrr Launcher Installer.exe 27 PID 2036 wrote to memory of 1176 2036 Salwyrr Launcher Installer.exe 27 PID 2036 wrote to memory of 1176 2036 Salwyrr Launcher Installer.exe 27 PID 2036 wrote to memory of 576 2036 Salwyrr Launcher Installer.exe 29 PID 2036 wrote to memory of 576 2036 Salwyrr Launcher Installer.exe 29 PID 2036 wrote to memory of 576 2036 Salwyrr Launcher Installer.exe 29 PID 2036 wrote to memory of 576 2036 Salwyrr Launcher Installer.exe 29 PID 2036 wrote to memory of 576 2036 Salwyrr Launcher Installer.exe 29 PID 2036 wrote to memory of 576 2036 Salwyrr Launcher Installer.exe 29 PID 2036 wrote to memory of 576 2036 Salwyrr Launcher Installer.exe 29 PID 2036 wrote to memory of 1056 2036 Salwyrr Launcher Installer.exe 31 PID 2036 wrote to memory of 1056 2036 Salwyrr Launcher Installer.exe 31 PID 2036 wrote to memory of 1056 2036 Salwyrr Launcher Installer.exe 31 PID 2036 wrote to memory of 1056 2036 Salwyrr Launcher Installer.exe 31 PID 2036 wrote to memory of 1056 2036 Salwyrr Launcher Installer.exe 31 PID 2036 wrote to memory of 1056 2036 Salwyrr Launcher Installer.exe 31 PID 2036 wrote to memory of 1056 2036 Salwyrr Launcher Installer.exe 31 PID 2036 wrote to memory of 1300 2036 Salwyrr Launcher Installer.exe 33 PID 2036 wrote to memory of 1300 2036 Salwyrr Launcher Installer.exe 33 PID 2036 wrote to memory of 1300 2036 Salwyrr Launcher Installer.exe 33 PID 2036 wrote to memory of 1300 2036 Salwyrr Launcher Installer.exe 33 PID 2036 wrote to memory of 1300 2036 Salwyrr Launcher Installer.exe 33 PID 2036 wrote to memory of 1300 2036 Salwyrr Launcher Installer.exe 33 PID 2036 wrote to memory of 1300 2036 Salwyrr Launcher Installer.exe 33 PID 2036 wrote to memory of 940 2036 Salwyrr Launcher Installer.exe 35 PID 2036 wrote to memory of 940 2036 Salwyrr Launcher Installer.exe 35 PID 2036 wrote to memory of 940 2036 Salwyrr Launcher Installer.exe 35 PID 2036 wrote to memory of 940 2036 Salwyrr Launcher Installer.exe 35 PID 2036 wrote to memory of 940 2036 Salwyrr Launcher Installer.exe 35 PID 2036 wrote to memory of 940 2036 Salwyrr Launcher Installer.exe 35 PID 2036 wrote to memory of 940 2036 Salwyrr Launcher Installer.exe 35 PID 2036 wrote to memory of 704 2036 Salwyrr Launcher Installer.exe 37 PID 2036 wrote to memory of 704 2036 Salwyrr Launcher Installer.exe 37 PID 2036 wrote to memory of 704 2036 Salwyrr Launcher Installer.exe 37 PID 2036 wrote to memory of 704 2036 Salwyrr Launcher Installer.exe 37 PID 2036 wrote to memory of 704 2036 Salwyrr Launcher Installer.exe 37 PID 2036 wrote to memory of 704 2036 Salwyrr Launcher Installer.exe 37 PID 2036 wrote to memory of 704 2036 Salwyrr Launcher Installer.exe 37 PID 2036 wrote to memory of 1488 2036 Salwyrr Launcher Installer.exe 39 PID 2036 wrote to memory of 1488 2036 Salwyrr Launcher Installer.exe 39 PID 2036 wrote to memory of 1488 2036 Salwyrr Launcher Installer.exe 39 PID 2036 wrote to memory of 1488 2036 Salwyrr Launcher Installer.exe 39 PID 2036 wrote to memory of 1488 2036 Salwyrr Launcher Installer.exe 39 PID 2036 wrote to memory of 1488 2036 Salwyrr Launcher Installer.exe 39 PID 2036 wrote to memory of 1488 2036 Salwyrr Launcher Installer.exe 39 PID 2036 wrote to memory of 1228 2036 Salwyrr Launcher Installer.exe 41 PID 2036 wrote to memory of 1228 2036 Salwyrr Launcher Installer.exe 41 PID 2036 wrote to memory of 1228 2036 Salwyrr Launcher Installer.exe 41 PID 2036 wrote to memory of 1228 2036 Salwyrr Launcher Installer.exe 41 PID 2036 wrote to memory of 1228 2036 Salwyrr Launcher Installer.exe 41 PID 2036 wrote to memory of 1228 2036 Salwyrr Launcher Installer.exe 41 PID 2036 wrote to memory of 1228 2036 Salwyrr Launcher Installer.exe 41 PID 2036 wrote to memory of 1536 2036 Salwyrr Launcher Installer.exe 43 PID 2036 wrote to memory of 1536 2036 Salwyrr Launcher Installer.exe 43 PID 2036 wrote to memory of 1536 2036 Salwyrr Launcher Installer.exe 43 PID 2036 wrote to memory of 1536 2036 Salwyrr Launcher Installer.exe 43 PID 2036 wrote to memory of 1536 2036 Salwyrr Launcher Installer.exe 43 PID 2036 wrote to memory of 1536 2036 Salwyrr Launcher Installer.exe 43 PID 2036 wrote to memory of 1536 2036 Salwyrr Launcher Installer.exe 43 PID 2036 wrote to memory of 1608 2036 Salwyrr Launcher Installer.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\Salwyrr Launcher Installer.exe"C:\Users\Admin\AppData\Local\Temp\Salwyrr Launcher Installer.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall show rule name="Salwyrr Client Java 1a"2⤵
- Modifies Windows Firewall
PID:1176
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall add rule name="Salwyrr Client Java 1a" dir=in action=allow protocol=any localip=any remoteip=any program="C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\javaw.exe"2⤵
- Modifies Windows Firewall
PID:576
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall show rule name="Salwyrr Client Java 2a"2⤵
- Modifies Windows Firewall
PID:1056
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall add rule name="Salwyrr Client Java 2a" dir=in action=allow protocol=any localip=any remoteip=any program="C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\jre\bin\javaw.exe"2⤵
- Modifies Windows Firewall
PID:1300
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall show rule name="Salwyrr Client Java 3a"2⤵
- Modifies Windows Firewall
PID:940
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall add rule name="Salwyrr Client Java 3a" dir=in action=allow protocol=any localip=any remoteip=any program="C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\java-runtime-alpha\bin\javaw.exe"2⤵
- Modifies Windows Firewall
PID:704
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall show rule name="Salwyrr Client Java 1b"2⤵
- Modifies Windows Firewall
PID:1488
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall add rule name="Salwyrr Client Java 1b" dir=in action=allow protocol=any localip=any remoteip=any program="C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\java.exe"2⤵
- Modifies Windows Firewall
PID:1228
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall show rule name="Salwyrr Client Java 2b"2⤵
- Modifies Windows Firewall
PID:1536
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall add rule name="Salwyrr Client Java 2b" dir=in action=allow protocol=any localip=any remoteip=any program="C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\jre\bin\java.exe"2⤵
- Modifies Windows Firewall
PID:1608
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall show rule name="Salwyrr Client Java 3b"2⤵
- Modifies Windows Firewall
PID:1504
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall add rule name="Salwyrr Client Java 3b" dir=in action=allow protocol=any localip=any remoteip=any program="C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\java-runtime-alpha\bin\java.exe"2⤵
- Modifies Windows Firewall
PID:1616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 22522⤵
- Program crash
PID:2004
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\openlogic-openjdk-jre-8u332-b09-windows-64\lib\images\cursors\win32_LinkNoDrop32x32.gif
Filesize153B
MD51e9d8f133a442da6b0c74d49bc84a341
SHA1259edc45b4569427e8319895a444f4295d54348f
SHA2561a1d3079d49583837662b84e11d8c0870698511d9110e710eb8e7eb20df7ae3b
SHA51263d6f70c8cab9735f0f857f5bf99e319f6ae98238dc7829dd706b7d6855c70be206e32e3e55df884402483cf8bebad00d139283af5c0b85dc1c5bf8f253acd37