Analysis
-
max time kernel
32s -
max time network
46s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-de -
resource tags
arch:x64arch:x86image:win10v2004-20240412-delocale:de-deos:windows10-2004-x64systemwindows -
submitted
18/04/2024, 16:28
Static task
static1
Behavioral task
behavioral1
Sample
saltZ_CLEANER_UD.exe
Resource
win7-20240221-de
Behavioral task
behavioral2
Sample
saltZ_CLEANER_UD.exe
Resource
win10v2004-20240412-de
General
-
Target
saltZ_CLEANER_UD.exe
-
Size
955KB
-
MD5
eef1ba19a102556658e2d7861afeb7af
-
SHA1
4e0bc15c75922c7015b4fac3975ae3aba5f974c9
-
SHA256
9b87f61a0b451edee3221c4914663bd78a5c83385cd1c843071200b63d6376d4
-
SHA512
41e1b89408f0ecda9b91ae948857b873e50b1f3cd0ba80d982a28e43267bd7255e71ffeecd514f420d53d8925323f1be59b55907a130095bd2e75a23a93eba12
-
SSDEEP
24576:4Kr1i/8UF3InmJ3NO2a4eiXap773wbTgK8VRq2tIY2GxKWN9mjQ0wIBZ1JfOcZCU:488UMYmBNO2a4e373sTuRq2tIYLxKWNi
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4304 wrote to memory of 2988 4304 saltZ_CLEANER_UD.exe 84 PID 4304 wrote to memory of 2988 4304 saltZ_CLEANER_UD.exe 84 PID 4304 wrote to memory of 2988 4304 saltZ_CLEANER_UD.exe 84 PID 2988 wrote to memory of 3252 2988 cmd.exe 86 PID 2988 wrote to memory of 3252 2988 cmd.exe 86 PID 2988 wrote to memory of 3252 2988 cmd.exe 86 PID 4304 wrote to memory of 1704 4304 saltZ_CLEANER_UD.exe 87 PID 4304 wrote to memory of 1704 4304 saltZ_CLEANER_UD.exe 87 PID 4304 wrote to memory of 1704 4304 saltZ_CLEANER_UD.exe 87 PID 4304 wrote to memory of 3792 4304 saltZ_CLEANER_UD.exe 88 PID 4304 wrote to memory of 3792 4304 saltZ_CLEANER_UD.exe 88 PID 4304 wrote to memory of 3792 4304 saltZ_CLEANER_UD.exe 88 PID 4304 wrote to memory of 2792 4304 saltZ_CLEANER_UD.exe 89 PID 4304 wrote to memory of 2792 4304 saltZ_CLEANER_UD.exe 89 PID 4304 wrote to memory of 2792 4304 saltZ_CLEANER_UD.exe 89 PID 4304 wrote to memory of 1448 4304 saltZ_CLEANER_UD.exe 91 PID 4304 wrote to memory of 1448 4304 saltZ_CLEANER_UD.exe 91 PID 4304 wrote to memory of 1448 4304 saltZ_CLEANER_UD.exe 91 PID 1448 wrote to memory of 4956 1448 cmd.exe 93 PID 1448 wrote to memory of 4956 1448 cmd.exe 93 PID 1448 wrote to memory of 4956 1448 cmd.exe 93 PID 4304 wrote to memory of 4892 4304 saltZ_CLEANER_UD.exe 94 PID 4304 wrote to memory of 4892 4304 saltZ_CLEANER_UD.exe 94 PID 4304 wrote to memory of 4892 4304 saltZ_CLEANER_UD.exe 94 PID 4304 wrote to memory of 2100 4304 saltZ_CLEANER_UD.exe 95 PID 4304 wrote to memory of 2100 4304 saltZ_CLEANER_UD.exe 95 PID 4304 wrote to memory of 2100 4304 saltZ_CLEANER_UD.exe 95 PID 4304 wrote to memory of 4100 4304 saltZ_CLEANER_UD.exe 96 PID 4304 wrote to memory of 4100 4304 saltZ_CLEANER_UD.exe 96 PID 4304 wrote to memory of 4100 4304 saltZ_CLEANER_UD.exe 96 PID 4304 wrote to memory of 4600 4304 saltZ_CLEANER_UD.exe 98 PID 4304 wrote to memory of 4600 4304 saltZ_CLEANER_UD.exe 98 PID 4304 wrote to memory of 4600 4304 saltZ_CLEANER_UD.exe 98 PID 4304 wrote to memory of 4840 4304 saltZ_CLEANER_UD.exe 101 PID 4304 wrote to memory of 4840 4304 saltZ_CLEANER_UD.exe 101 PID 4304 wrote to memory of 4840 4304 saltZ_CLEANER_UD.exe 101 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4956 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\saltZ_CLEANER_UD.exe"C:\Users\Admin\AppData\Local\Temp\saltZ_CLEANER_UD.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c mode con:cols=0120 lines=00302⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\mode.commode con:cols=0120 lines=00303⤵PID:3252
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c title saltz cleaner ud2⤵PID:1704
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\myfiles" mkdir "C:\Users\Admin\AppData\Local\Temp\myfiles"2⤵PID:3792
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\wtmpd" mkdir "C:\Users\Admin\AppData\Local\Temp\wtmpd"2⤵PID:2792
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h C:\Users\Admin\AppData\Local\Temp\wtmpd2⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Users\Admin\AppData\Local\Temp\wtmpd3⤵
- Views/modifies file attributes
PID:4956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo:0>C:\Users\Admin\AppData\Local\Temp\i6.t2⤵PID:4892
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\i6.bat2⤵PID:2100
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c2⤵PID:4100
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵PID:4600
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c2⤵PID:4840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173B
MD50f8f70e88009593eefaa155a8e31b1d6
SHA1eabcc3f2135e0919e9456da0a4b1084f3382d4b6
SHA256941c169c07670650fc6c6148c1cae068b69bac209e05010594e164aafc7cdf8b
SHA51294df468b963f3c9d133a25e1ffa57039fac01fe960f0f738552ca6440e6242ff48d0b410fe70dd05a62e4842c925c9f2b0220ca9eb9cb4ff5490ada443c9a750