Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:14
Static task
static1
Behavioral task
behavioral1
Sample
7583305663f9a89f790b41d6a3d8024bedbd3a3e5e5f31d6a74afc2010b27fea.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7583305663f9a89f790b41d6a3d8024bedbd3a3e5e5f31d6a74afc2010b27fea.exe
Resource
win10v2004-20240426-en
General
-
Target
7583305663f9a89f790b41d6a3d8024bedbd3a3e5e5f31d6a74afc2010b27fea.exe
-
Size
54KB
-
MD5
efb57e0076c7ba15529fb90a8bc166ae
-
SHA1
7b2a2d5414bd33f2b547a65e965492191e495067
-
SHA256
7583305663f9a89f790b41d6a3d8024bedbd3a3e5e5f31d6a74afc2010b27fea
-
SHA512
6899cefdc37138b88eabae9d04edec0d6ebfe06e9184f6681221bbd744c1001b59694586b469d2f23260798949ed42ec86a57c57918fe49340dc61dc5f79edbf
-
SSDEEP
768:MApQr0DWvdFJI34HGxusOy9Rp1pLeAxoeC48PqK1OtaP6cCFzENREMZ7vhy:MAaJJlTsh7pWezEPJB+Oc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7583305663f9a89f790b41d6a3d8024bedbd3a3e5e5f31d6a74afc2010b27fea.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation 7583305663f9a89f790b41d6a3d8024bedbd3a3e5e5f31d6a74afc2010b27fea.exe -
Executes dropped EXE 1 IoCs
Processes:
sal.exepid process 1188 sal.exe -
Drops file in System32 directory 1 IoCs
Processes:
7583305663f9a89f790b41d6a3d8024bedbd3a3e5e5f31d6a74afc2010b27fea.exedescription ioc process File created \??\c:\windows\SysWOW64\sal.exe 7583305663f9a89f790b41d6a3d8024bedbd3a3e5e5f31d6a74afc2010b27fea.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
7583305663f9a89f790b41d6a3d8024bedbd3a3e5e5f31d6a74afc2010b27fea.exedescription pid process target process PID 2108 wrote to memory of 1188 2108 7583305663f9a89f790b41d6a3d8024bedbd3a3e5e5f31d6a74afc2010b27fea.exe sal.exe PID 2108 wrote to memory of 1188 2108 7583305663f9a89f790b41d6a3d8024bedbd3a3e5e5f31d6a74afc2010b27fea.exe sal.exe PID 2108 wrote to memory of 1188 2108 7583305663f9a89f790b41d6a3d8024bedbd3a3e5e5f31d6a74afc2010b27fea.exe sal.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7583305663f9a89f790b41d6a3d8024bedbd3a3e5e5f31d6a74afc2010b27fea.exe"C:\Users\Admin\AppData\Local\Temp\7583305663f9a89f790b41d6a3d8024bedbd3a3e5e5f31d6a74afc2010b27fea.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\windows\SysWOW64\sal.exe"C:\windows\system32\sal.exe"2⤵
- Executes dropped EXE
PID:1188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD56cc3fcaf6dac13940ba64108974b4470
SHA1a8a80aeeaf0178e27fa593978ee261d5ad8dc25d
SHA256573621f4029509c248fca4a92c53da98c562d2ba243725c745e1a1589c8a0312
SHA512a641e1576bf09d1a78232081647e460c327036abcd2de91c9783bd65a93b8b473838ee585f037ff30ddc58419e971d9484d6f07af4dec8854a9ad9f54ea7c442