Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/04/2024, 02:50

General

  • Target

    c0ece4f3df6e8c355964effcad0f14d071cc6428ae85b0d35c15ceba955d7740.exe

  • Size

    33KB

  • MD5

    2507d091fa8659bd53f02de49d7b67f0

  • SHA1

    bc59f79572ba8b881cba79dcc3cafa115ab33603

  • SHA256

    c0ece4f3df6e8c355964effcad0f14d071cc6428ae85b0d35c15ceba955d7740

  • SHA512

    2873cb3bd92eb2c196dc90ede9462153602c954939df993fcc4ca50e034e8d1adc4e6d360d3f71fdfdc02ec048559c13218263e2737f0909dc4c58c62a292b4d

  • SSDEEP

    384:MApc8m4e0fvQak4JI341CZabnk6hJPSQAcIx:MApQr0fvdFJI347Tk6hJPAcIx

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0ece4f3df6e8c355964effcad0f14d071cc6428ae85b0d35c15ceba955d7740.exe
    "C:\Users\Admin\AppData\Local\Temp\c0ece4f3df6e8c355964effcad0f14d071cc6428ae85b0d35c15ceba955d7740.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:5012
    • C:\windows\SysWOW64\sal.exe
      "C:\windows\system32\sal.exe"
      2⤵
      • Executes dropped EXE
      PID:4232

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\sal.exe

          Filesize

          33KB

          MD5

          b0b682df36cfedf0c15f78597530698e

          SHA1

          0a9d4c682442b1a71b600b4b8ee7dc6f2e0959d5

          SHA256

          c3fd6a6da469d1c94235b20e6bf0bdbd5fb642bef3468527c986e84ca33b5544

          SHA512

          32bee0dc69bcb0c07c89879e7ba2075c6e274613f724eb8dc438e74e2a103647b21dc63ae2670c471d8ff9eda3d1079693d5d46e75f4eae7402b630cbda548de

        • memory/4232-9-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/4232-11-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/5012-0-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/5012-10-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB