Analysis
-
max time kernel
17s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-03-2024 16:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
@Wanna-Decrypt0r2.0.exe
Resource
win7-20231129-en
windows7-x64
18 signatures
150 seconds
Behavioral task
behavioral2
Sample
salinewin.exe
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
salinewin.exe
-
Size
283KB
-
MD5
2b1e9226d7e1015552a21faca891ec41
-
SHA1
f87fcbe10fa9312048214d4473498ad4f9f331ce
-
SHA256
7163fefbf2f865ef78a2d3d4480532fffb979300d6f0a77b6f3fc5c4b0d2cada
-
SHA512
1852f6d05c9fca962178bc190bc8c90f0ca54ea99714480690f44417e49eee6c392579091ae8a6cd053ec47ad1980dbbbc0db3e0e00520ee1bdbadbf8dc9d69e
-
SSDEEP
3072:HZVUJ58IAelkapH3shY6iEwgaBZP5pHQpYR95WPNpNMl3:nUJ5PzB5ZPPHQpY35WPNpGl3
Score
8/10
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
salinewin.exedescription ioc process File opened for modification \??\PhysicalDrive0 salinewin.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
salinewin.execmd.exedescription pid process target process PID 1184 wrote to memory of 2080 1184 salinewin.exe cmd.exe PID 1184 wrote to memory of 2080 1184 salinewin.exe cmd.exe PID 1184 wrote to memory of 2080 1184 salinewin.exe cmd.exe PID 1184 wrote to memory of 2080 1184 salinewin.exe cmd.exe PID 2080 wrote to memory of 2480 2080 cmd.exe reg.exe PID 2080 wrote to memory of 2480 2080 cmd.exe reg.exe PID 2080 wrote to memory of 2480 2080 cmd.exe reg.exe PID 2080 wrote to memory of 2480 2080 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\salinewin.exe"C:\Users\Admin\AppData\Local\Temp\salinewin.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\policies\system /v DisableTaskMgr /t reg_dword /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\reg.exeREG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\policies\system /v DisableTaskMgr /t reg_dword /d 1 /f3⤵
- Modifies registry key
PID:2480
-
-