Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    31/05/2024, 22:52

General

  • Target

    6b24213a39f2dff0f5cf0548a9007194260e229bfaaf56c1ef79a383b7a92a98.exe

  • Size

    33KB

  • MD5

    03d112ff57e93c4122c9e6d5557cab90

  • SHA1

    3342db75ec5dd9a62da4efd510ff5b47e63bca9e

  • SHA256

    6b24213a39f2dff0f5cf0548a9007194260e229bfaaf56c1ef79a383b7a92a98

  • SHA512

    5140d537659f65fdd9ac5d25d04a8dc1ad8796f76d3292a8c1041707f9519626b22db27208775ba2acf459bc7fc2bcb0d2fc2ab9dfa7325d5e542c6c44f0709b

  • SSDEEP

    384:MApc8m4e0LvQak4JI341CNabnkIU0SqwunabV/5wN:MApQr0LvdFJI34nTkIU0ZnCg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b24213a39f2dff0f5cf0548a9007194260e229bfaaf56c1ef79a383b7a92a98.exe
    "C:\Users\Admin\AppData\Local\Temp\6b24213a39f2dff0f5cf0548a9007194260e229bfaaf56c1ef79a383b7a92a98.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\windows\SysWOW64\sal.exe
      "C:\windows\system32\sal.exe"
      2⤵
      • Executes dropped EXE
      PID:2388

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Windows\SysWOW64\sal.exe

          Filesize

          33KB

          MD5

          48190a7914d753d74f5c9cfdb33cce13

          SHA1

          14a102fe299f0aa045fa94210384cc352dabd502

          SHA256

          df77ad1ac098590e82bb82336a415e5567b89f37468c389902b0588038b662f3

          SHA512

          1fd876bd960973e5a95c42d4fb74a348d724905a9015d6e55eabedb6895b1c30aaf7428b703135febeaf7dac386de4367b3de4f650a6818cea1fdf08df130c42

        • memory/2172-0-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/2172-4-0x0000000000480000-0x0000000000489000-memory.dmp

          Filesize

          36KB

        • memory/2172-11-0x0000000000480000-0x0000000000489000-memory.dmp

          Filesize

          36KB

        • memory/2172-12-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/2388-14-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB