Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 19:48
Static task
static1
Behavioral task
behavioral1
Sample
SLT_WinLockPro432_fivebb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
SLT_WinLockPro432_fivebb.exe
Resource
win10v2004-20231215-en
General
-
Target
SLT_WinLockPro432_fivebb.exe
-
Size
1.8MB
-
MD5
319188abf02fc8deb24d14fe41fe2638
-
SHA1
15382298ce3941c0c2e353a6b0c0c6191000ba5b
-
SHA256
80f2ff78715c12c54b0afdb0ece6eb937966d3ce2b0b04657074ab2aa0d32e19
-
SHA512
a2bb308a779cf0d448254058a5a77863327087fe89765e7640fe3179f41f966e715148bc79434a56dbb3bf516861966cac1393f0f311fc67fee1ea6dd32bcadc
-
SSDEEP
49152:B6dOtRjhJs3ZnRLXnu9kDPj4xFuhBCTwCH2OFg5md794zD:kdOPjwHju92Pj4xFn2wqmRC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3000 is-ND6E6.tmp -
Loads dropped DLL 3 IoCs
pid Process 1320 SLT_WinLockPro432_fivebb.exe 3000 is-ND6E6.tmp 3000 is-ND6E6.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3000 is-ND6E6.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1320 wrote to memory of 3000 1320 SLT_WinLockPro432_fivebb.exe 28 PID 1320 wrote to memory of 3000 1320 SLT_WinLockPro432_fivebb.exe 28 PID 1320 wrote to memory of 3000 1320 SLT_WinLockPro432_fivebb.exe 28 PID 1320 wrote to memory of 3000 1320 SLT_WinLockPro432_fivebb.exe 28 PID 1320 wrote to memory of 3000 1320 SLT_WinLockPro432_fivebb.exe 28 PID 1320 wrote to memory of 3000 1320 SLT_WinLockPro432_fivebb.exe 28 PID 1320 wrote to memory of 3000 1320 SLT_WinLockPro432_fivebb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\SLT_WinLockPro432_fivebb.exe"C:\Users\Admin\AppData\Local\Temp\SLT_WinLockPro432_fivebb.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\is-K7QLO.tmp\is-ND6E6.tmp"C:\Users\Admin\AppData\Local\Temp\is-K7QLO.tmp\is-ND6E6.tmp" /SL4 $50152 "C:\Users\Admin\AppData\Local\Temp\SLT_WinLockPro432_fivebb.exe" 1661819 727042⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
656KB
MD5ebf6baa4ac2cdf7a8ee6fe9b99990961
SHA1cd6d7c0631a24efdcbbc7955f0d65f9718eea985
SHA25615245cd516876b04274de888e4e7f71f93fefba7dd2cf712542dfa6c47a03c33
SHA51295d206914886bf3d61b4fa519ec198f9d6f3fa31a2cbe201fb3e1a1a960fefa819734cf39ec4a59020e36e66106890df279edf4f3cbdced6b40000bdb14b5187