Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    29/04/2024, 20:10

General

  • Target

    3240a588929e05df33e30ed7bfdec21bdd93faaa5107462bf677aae99a836ac4.exe

  • Size

    53KB

  • MD5

    ad51c3cdd651a8ab39bef5c7fb1db6f1

  • SHA1

    e32fb2ec72f738cc890b911ace3ea46afdca7e13

  • SHA256

    3240a588929e05df33e30ed7bfdec21bdd93faaa5107462bf677aae99a836ac4

  • SHA512

    0d59d3a9b0e2fca7dca0ef683ed7d82c6e5acd9b62cbeaac25c8a7acf2c9df60eeed43a70313a68856437103ce0991025b22e9047e5aeb3201d0bb9f44fc3d8b

  • SSDEEP

    768:MApQr0DWvdFJI34HGxusOy9Rp1pLeAxoeC48PqK1OtaP6cCFzENREMZ7vPP:MAaJJlTsh7pWezEPJB+OL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3240a588929e05df33e30ed7bfdec21bdd93faaa5107462bf677aae99a836ac4.exe
    "C:\Users\Admin\AppData\Local\Temp\3240a588929e05df33e30ed7bfdec21bdd93faaa5107462bf677aae99a836ac4.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\windows\SysWOW64\sal.exe
      "C:\windows\system32\sal.exe"
      2⤵
      • Executes dropped EXE
      PID:768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\sal.exe

    Filesize

    53KB

    MD5

    3fa1f07c0b222b902ed4cd4a826a9365

    SHA1

    bc8f64f76040a2ea148a263f0db53637d33c43ee

    SHA256

    2cb9773220723bc12712b089043c06cbcd39653f2ab8d7f08ed939f14e1e484f

    SHA512

    a85a84d568fb42eab11ddf57fe5549ccd01e9cdad550b221a3942e9b114b671d35623f24078d07ac353faf81c8eee35e4efd5277628226b48672527e77481f72

  • memory/768-13-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/768-11-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2932-1-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2932-4-0x0000000002530000-0x0000000002539000-memory.dmp

    Filesize

    36KB