Analysis
-
max time kernel
24s -
max time network
255s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 06:49
Static task
static1
Behavioral task
behavioral1
Sample
salinewin-safety.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
salinewin-safety.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
salinewin.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
salinewin.exe
Resource
win10v2004-20240412-en
General
-
Target
salinewin.exe
-
Size
283KB
-
MD5
2b1e9226d7e1015552a21faca891ec41
-
SHA1
f87fcbe10fa9312048214d4473498ad4f9f331ce
-
SHA256
7163fefbf2f865ef78a2d3d4480532fffb979300d6f0a77b6f3fc5c4b0d2cada
-
SHA512
1852f6d05c9fca962178bc190bc8c90f0ca54ea99714480690f44417e49eee6c392579091ae8a6cd053ec47ad1980dbbbc0db3e0e00520ee1bdbadbf8dc9d69e
-
SSDEEP
3072:HZVUJ58IAelkapH3shY6iEwgaBZP5pHQpYR95WPNpNMl3:nUJ5PzB5ZPPHQpY35WPNpGl3
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 salinewin.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1672 reg.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4504 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4504 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3376 wrote to memory of 2456 3376 salinewin.exe 105 PID 3376 wrote to memory of 2456 3376 salinewin.exe 105 PID 3376 wrote to memory of 2456 3376 salinewin.exe 105 PID 2456 wrote to memory of 1672 2456 cmd.exe 107 PID 2456 wrote to memory of 1672 2456 cmd.exe 107 PID 2456 wrote to memory of 1672 2456 cmd.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\salinewin.exe"C:\Users\Admin\AppData\Local\Temp\salinewin.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\policies\system /v DisableTaskMgr /t reg_dword /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\reg.exeREG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\policies\system /v DisableTaskMgr /t reg_dword /d 1 /f3⤵
- Modifies registry key
PID:1672
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4388,i,11689630796550498308,215737424132741214,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:81⤵PID:2836
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2cc 0x3741⤵
- Suspicious use of AdjustPrivilegeToken
PID:4504