Analysis
-
max time kernel
146s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2023 13:29
Static task
static1
Behavioral task
behavioral1
Sample
Salwyrr Launcher Installer.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Salwyrr Launcher Installer.exe
Resource
win10v2004-20230220-en
General
-
Target
Salwyrr Launcher Installer.exe
-
Size
46KB
-
MD5
38633bfef3c1fe505a39a688b5c31828
-
SHA1
4e053e5ca9e8bfcf372b4331b18c36d637332bbc
-
SHA256
413a460fae724b972ab9c52aeab029552245555c7df5b79eb2a6529e1dd7a090
-
SHA512
812ebfa26ff63ade8ab4851230fe47c0ffb797b5a8c48d6ab7ad3293a4995c088bedb8ca7ad6c48a63b3c7f60cdf5b2b318b39dc232ef2096721aba7734ea8f7
-
SSDEEP
768:PE55gC6d1VepljbMBMxECL67qtjMGF9TtgmAtugTtyKr:svh6dTepljLEf44u4mMuAyKr
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 12 IoCs
pid Process 1048 netsh.exe 4708 netsh.exe 1616 netsh.exe 1224 netsh.exe 1320 netsh.exe 2584 netsh.exe 4260 netsh.exe 2224 netsh.exe 1060 netsh.exe 2532 netsh.exe 2024 netsh.exe 4344 netsh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4236 1604 WerFault.exe 84 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1604 Salwyrr Launcher Installer.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1604 wrote to memory of 1320 1604 Salwyrr Launcher Installer.exe 85 PID 1604 wrote to memory of 1320 1604 Salwyrr Launcher Installer.exe 85 PID 1604 wrote to memory of 1320 1604 Salwyrr Launcher Installer.exe 85 PID 1604 wrote to memory of 4344 1604 Salwyrr Launcher Installer.exe 87 PID 1604 wrote to memory of 4344 1604 Salwyrr Launcher Installer.exe 87 PID 1604 wrote to memory of 4344 1604 Salwyrr Launcher Installer.exe 87 PID 1604 wrote to memory of 2584 1604 Salwyrr Launcher Installer.exe 89 PID 1604 wrote to memory of 2584 1604 Salwyrr Launcher Installer.exe 89 PID 1604 wrote to memory of 2584 1604 Salwyrr Launcher Installer.exe 89 PID 1604 wrote to memory of 4260 1604 Salwyrr Launcher Installer.exe 91 PID 1604 wrote to memory of 4260 1604 Salwyrr Launcher Installer.exe 91 PID 1604 wrote to memory of 4260 1604 Salwyrr Launcher Installer.exe 91 PID 1604 wrote to memory of 2224 1604 Salwyrr Launcher Installer.exe 93 PID 1604 wrote to memory of 2224 1604 Salwyrr Launcher Installer.exe 93 PID 1604 wrote to memory of 2224 1604 Salwyrr Launcher Installer.exe 93 PID 1604 wrote to memory of 1060 1604 Salwyrr Launcher Installer.exe 95 PID 1604 wrote to memory of 1060 1604 Salwyrr Launcher Installer.exe 95 PID 1604 wrote to memory of 1060 1604 Salwyrr Launcher Installer.exe 95 PID 1604 wrote to memory of 1048 1604 Salwyrr Launcher Installer.exe 97 PID 1604 wrote to memory of 1048 1604 Salwyrr Launcher Installer.exe 97 PID 1604 wrote to memory of 1048 1604 Salwyrr Launcher Installer.exe 97 PID 1604 wrote to memory of 4708 1604 Salwyrr Launcher Installer.exe 99 PID 1604 wrote to memory of 4708 1604 Salwyrr Launcher Installer.exe 99 PID 1604 wrote to memory of 4708 1604 Salwyrr Launcher Installer.exe 99 PID 1604 wrote to memory of 2532 1604 Salwyrr Launcher Installer.exe 101 PID 1604 wrote to memory of 2532 1604 Salwyrr Launcher Installer.exe 101 PID 1604 wrote to memory of 2532 1604 Salwyrr Launcher Installer.exe 101 PID 1604 wrote to memory of 1616 1604 Salwyrr Launcher Installer.exe 103 PID 1604 wrote to memory of 1616 1604 Salwyrr Launcher Installer.exe 103 PID 1604 wrote to memory of 1616 1604 Salwyrr Launcher Installer.exe 103 PID 1604 wrote to memory of 2024 1604 Salwyrr Launcher Installer.exe 105 PID 1604 wrote to memory of 2024 1604 Salwyrr Launcher Installer.exe 105 PID 1604 wrote to memory of 2024 1604 Salwyrr Launcher Installer.exe 105 PID 1604 wrote to memory of 1224 1604 Salwyrr Launcher Installer.exe 107 PID 1604 wrote to memory of 1224 1604 Salwyrr Launcher Installer.exe 107 PID 1604 wrote to memory of 1224 1604 Salwyrr Launcher Installer.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\Salwyrr Launcher Installer.exe"C:\Users\Admin\AppData\Local\Temp\Salwyrr Launcher Installer.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall show rule name="Salwyrr Client Java 1a"2⤵
- Modifies Windows Firewall
PID:1320
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall add rule name="Salwyrr Client Java 1a" dir=in action=allow protocol=any localip=any remoteip=any program="C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\javaw.exe"2⤵
- Modifies Windows Firewall
PID:4344
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall show rule name="Salwyrr Client Java 2a"2⤵
- Modifies Windows Firewall
PID:2584
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall add rule name="Salwyrr Client Java 2a" dir=in action=allow protocol=any localip=any remoteip=any program="C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\jre\bin\javaw.exe"2⤵
- Modifies Windows Firewall
PID:4260
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall show rule name="Salwyrr Client Java 3a"2⤵
- Modifies Windows Firewall
PID:2224
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall add rule name="Salwyrr Client Java 3a" dir=in action=allow protocol=any localip=any remoteip=any program="C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\java-runtime-alpha\bin\javaw.exe"2⤵
- Modifies Windows Firewall
PID:1060
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall show rule name="Salwyrr Client Java 1b"2⤵
- Modifies Windows Firewall
PID:1048
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall add rule name="Salwyrr Client Java 1b" dir=in action=allow protocol=any localip=any remoteip=any program="C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\jre\bin\java.exe"2⤵
- Modifies Windows Firewall
PID:4708
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall show rule name="Salwyrr Client Java 2b"2⤵
- Modifies Windows Firewall
PID:2532
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall add rule name="Salwyrr Client Java 2b" dir=in action=allow protocol=any localip=any remoteip=any program="C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\jre\bin\java.exe"2⤵
- Modifies Windows Firewall
PID:1616
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall show rule name="Salwyrr Client Java 3b"2⤵
- Modifies Windows Firewall
PID:2024
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall add rule name="Salwyrr Client Java 3b" dir=in action=allow protocol=any localip=any remoteip=any program="C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\java-runtime-alpha\bin\java.exe"2⤵
- Modifies Windows Firewall
PID:1224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 30482⤵
- Program crash
PID:4236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1604 -ip 16041⤵PID:4856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\.Salwyrr\launcher\bootstrap\openlogic-openjdk-jre-8u332-b09-windows-64\lib\images\cursors\win32_LinkNoDrop32x32.gif
Filesize153B
MD51e9d8f133a442da6b0c74d49bc84a341
SHA1259edc45b4569427e8319895a444f4295d54348f
SHA2561a1d3079d49583837662b84e11d8c0870698511d9110e710eb8e7eb20df7ae3b
SHA51263d6f70c8cab9735f0f857f5bf99e319f6ae98238dc7829dd706b7d6855c70be206e32e3e55df884402483cf8bebad00d139283af5c0b85dc1c5bf8f253acd37