Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 04:28
Static task
static1
Behavioral task
behavioral1
Sample
cdf19006117e251ae86916985128be24a8fbe4ec787cc653853e215e8d1a673b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cdf19006117e251ae86916985128be24a8fbe4ec787cc653853e215e8d1a673b.exe
Resource
win10v2004-20240412-en
General
-
Target
cdf19006117e251ae86916985128be24a8fbe4ec787cc653853e215e8d1a673b.exe
-
Size
53KB
-
MD5
cb6371fd703bba0dbe097b8ec5d4d648
-
SHA1
b53e42b2743f281d449febdb54fa325b2fee7d3f
-
SHA256
cdf19006117e251ae86916985128be24a8fbe4ec787cc653853e215e8d1a673b
-
SHA512
f4a68d6dd28786057117d88cf3c8110c13f6c4b9f619219cc4e226a44e4a4c56a183a99d5bf90715ce293db91de94a561dc2825fc467a2064d7dcd4fcd8078b4
-
SSDEEP
768:MApQr0ovdFJI34eGxusOy9Rp1pLeAxoeC48PqK1OtaP6cCFzENREMZ7V:MAaDJlMsh7pWezEPJB+Oh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2696 sal.exe -
Loads dropped DLL 2 IoCs
pid Process 1048 cdf19006117e251ae86916985128be24a8fbe4ec787cc653853e215e8d1a673b.exe 1048 cdf19006117e251ae86916985128be24a8fbe4ec787cc653853e215e8d1a673b.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\sal.exe cdf19006117e251ae86916985128be24a8fbe4ec787cc653853e215e8d1a673b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2696 1048 cdf19006117e251ae86916985128be24a8fbe4ec787cc653853e215e8d1a673b.exe 28 PID 1048 wrote to memory of 2696 1048 cdf19006117e251ae86916985128be24a8fbe4ec787cc653853e215e8d1a673b.exe 28 PID 1048 wrote to memory of 2696 1048 cdf19006117e251ae86916985128be24a8fbe4ec787cc653853e215e8d1a673b.exe 28 PID 1048 wrote to memory of 2696 1048 cdf19006117e251ae86916985128be24a8fbe4ec787cc653853e215e8d1a673b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdf19006117e251ae86916985128be24a8fbe4ec787cc653853e215e8d1a673b.exe"C:\Users\Admin\AppData\Local\Temp\cdf19006117e251ae86916985128be24a8fbe4ec787cc653853e215e8d1a673b.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\windows\SysWOW64\sal.exe"C:\windows\system32\sal.exe"2⤵
- Executes dropped EXE
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5e971f92375e4ff3dd823eb68a8db34ea
SHA1cde25ecaa0d592dc5f6ac71679334e942948c207
SHA256718ef8ef14928f41e838a0024d566792df59668657462de5de26c1e750db8169
SHA5121ddfaacc4ac16dec86a8d2bcf93a28b82a1f47baf04cfd631b8403f65c9c4abf9da04e40763b439524ed4fd91497e1cd5ab1f62febe60bafe81765f47c69df61