Analysis

  • max time kernel
    103s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    29/09/2023, 22:56

General

  • Target

    Saber_1.0.40_Installer_x64_2022.exe

  • Size

    1.8MB

  • MD5

    bd005022e28fe33f33b3a86b5c772961

  • SHA1

    1b682be1ef2997865802e604542dca39dc4dd61b

  • SHA256

    92945c9b6ff9eb4520511791dcba630417ead5f05ccccb15f4a9d875d022d01a

  • SHA512

    b71371876d35b3db3413fab23ad8fd19f9c58b14c5d245a56ef19a6f3db3d3d03ad415fba80bb2fafcc46264cd8fb1d33261049a9e8cbf5f6331137cc56cd748

  • SSDEEP

    24576:TSMQfXf+WEA1D8hPRK9mTNQRBjsBaVG7wKSnqS0WrePs:WMQfXeA1IR5ZyBjQoGR4t0f0

Score
5/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 57 IoCs
  • Suspicious use of SendNotifyMessage 57 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Saber_1.0.40_Installer_x64_2022.exe
    "C:\Users\Admin\AppData\Local\Temp\Saber_1.0.40_Installer_x64_2022.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:216
    • C:\Users\Admin\AppData\Local\Temp\Saber_1.0.40_Installer_x64_2022.exe
      "C:\Users\Admin\AppData\Local\Temp\Saber_1.0.40_Installer_x64_2022.exe" /UAC
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:4520
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1048

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1048-0-0x00000250F1FA0000-0x00000250F1FA1000-memory.dmp

          Filesize

          4KB

        • memory/1048-2-0x00000250F1FA0000-0x00000250F1FA1000-memory.dmp

          Filesize

          4KB

        • memory/1048-1-0x00000250F1FA0000-0x00000250F1FA1000-memory.dmp

          Filesize

          4KB

        • memory/1048-6-0x00000250F1FA0000-0x00000250F1FA1000-memory.dmp

          Filesize

          4KB

        • memory/1048-7-0x00000250F1FA0000-0x00000250F1FA1000-memory.dmp

          Filesize

          4KB

        • memory/1048-9-0x00000250F1FA0000-0x00000250F1FA1000-memory.dmp

          Filesize

          4KB

        • memory/1048-8-0x00000250F1FA0000-0x00000250F1FA1000-memory.dmp

          Filesize

          4KB

        • memory/1048-12-0x00000250F1FA0000-0x00000250F1FA1000-memory.dmp

          Filesize

          4KB

        • memory/1048-11-0x00000250F1FA0000-0x00000250F1FA1000-memory.dmp

          Filesize

          4KB

        • memory/1048-10-0x00000250F1FA0000-0x00000250F1FA1000-memory.dmp

          Filesize

          4KB