Analysis

  • max time kernel
    92s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-04-2024 07:51

General

  • Target

    e4653ce1da1a5ffe081b45b615621b56a202196edce2363f3491f9d579ca501d.exe

  • Size

    1.2MB

  • MD5

    d6496cd632908373cb264c3758d6dae4

  • SHA1

    882a449e6fb2d4dcd4ad77ea56a4c477951aae29

  • SHA256

    e4653ce1da1a5ffe081b45b615621b56a202196edce2363f3491f9d579ca501d

  • SHA512

    6d26961ead900dfd6a88f0da16ecaa30247596637445f407b9e70a0699e81e527e42ff32b0294395ba1edd6bb3e5c81f43d61dafbdaffc5ff0be0e7c6aa464fd

  • SSDEEP

    24576:mnbpS1t3QlEXNbHn6B0TZLp1H3+zUYJadfvyUPFXrhGrLumVAGiNd3r4:mnlO3QlE9VT+zUYJadHyUPpwJVAGGBs

Score
10/10

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Signatures

  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4653ce1da1a5ffe081b45b615621b56a202196edce2363f3491f9d579ca501d.exe
    "C:\Users\Admin\AppData\Local\Temp\e4653ce1da1a5ffe081b45b615621b56a202196edce2363f3491f9d579ca501d.exe"
    1⤵
      PID:2896
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 540
        2⤵
        • Program crash
        PID:2944
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2896 -ip 2896
      1⤵
        PID:4416

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2896-0-0x0000000000400000-0x000000000052F000-memory.dmp

        Filesize

        1.2MB

      • memory/2896-1-0x0000000002520000-0x00000000035DA000-memory.dmp

        Filesize

        16.7MB

      • memory/2896-2-0x0000000000400000-0x000000000052F000-memory.dmp

        Filesize

        1.2MB