Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 02:12
Static task
static1
Behavioral task
behavioral1
Sample
b9358267d2eac62f35563dc4ddbfa9480b89665f2385d6af90ae72a89aaaf21f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b9358267d2eac62f35563dc4ddbfa9480b89665f2385d6af90ae72a89aaaf21f.exe
Resource
win10v2004-20240412-en
General
-
Target
b9358267d2eac62f35563dc4ddbfa9480b89665f2385d6af90ae72a89aaaf21f.exe
-
Size
51KB
-
MD5
3a305e125a75c12936bd310add4decb9
-
SHA1
1753d7986b17b3c6632a5c9f3ab06fccbafcab0a
-
SHA256
b9358267d2eac62f35563dc4ddbfa9480b89665f2385d6af90ae72a89aaaf21f
-
SHA512
f875683fd4f03436eb7a717c35e2eff97b67f90d9425b52cc67644257e8b574202b037f8e6fe8e127e8742bfe17dbbd1040a4a96af96e916b6794a633f111bdb
-
SSDEEP
768:eApQr0GvdFJI34qGxusOy9Rp1pLeAxoeC48PqK1OtaP6cCFzENRzhyZzdBFzebNo:eAapJlQsh7pWezEPJBjazwu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1808 sal.exe -
Loads dropped DLL 2 IoCs
pid Process 1712 b9358267d2eac62f35563dc4ddbfa9480b89665f2385d6af90ae72a89aaaf21f.exe 1712 b9358267d2eac62f35563dc4ddbfa9480b89665f2385d6af90ae72a89aaaf21f.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\sal.exe b9358267d2eac62f35563dc4ddbfa9480b89665f2385d6af90ae72a89aaaf21f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1808 1712 b9358267d2eac62f35563dc4ddbfa9480b89665f2385d6af90ae72a89aaaf21f.exe 28 PID 1712 wrote to memory of 1808 1712 b9358267d2eac62f35563dc4ddbfa9480b89665f2385d6af90ae72a89aaaf21f.exe 28 PID 1712 wrote to memory of 1808 1712 b9358267d2eac62f35563dc4ddbfa9480b89665f2385d6af90ae72a89aaaf21f.exe 28 PID 1712 wrote to memory of 1808 1712 b9358267d2eac62f35563dc4ddbfa9480b89665f2385d6af90ae72a89aaaf21f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9358267d2eac62f35563dc4ddbfa9480b89665f2385d6af90ae72a89aaaf21f.exe"C:\Users\Admin\AppData\Local\Temp\b9358267d2eac62f35563dc4ddbfa9480b89665f2385d6af90ae72a89aaaf21f.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\windows\SysWOW64\sal.exe"C:\windows\system32\sal.exe"2⤵
- Executes dropped EXE
PID:1808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD5d7fc7c119bd49b357c408396faa67090
SHA1880436bc052b0608dd637c350f3eb94bd490a814
SHA2568935677d35c4743f3f20e7335cd8af67b1d3f9d38736bf59d905f0d8f7457f07
SHA512b1a01b34d5703c56c2a7ca261e8de21fc1bbe08475880bf0d708586a8eaa9fabc59c0d5103ac466cc2907e33e0e2dec1a75d50e4f6bfcbda3d21e7eef384155d