Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
2421f45df22bb98cf1f8b60e1b9b8da91e5d5b7db07d403064f8f7630306a2e4.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2421f45df22bb98cf1f8b60e1b9b8da91e5d5b7db07d403064f8f7630306a2e4.exe
Resource
win10v2004-20240611-en
General
-
Target
2421f45df22bb98cf1f8b60e1b9b8da91e5d5b7db07d403064f8f7630306a2e4.exe
-
Size
56KB
-
MD5
418e0e12999f3ad526ce14819a2ba4b1
-
SHA1
391645b271b6f9c81a5a0532a43c88cced255265
-
SHA256
2421f45df22bb98cf1f8b60e1b9b8da91e5d5b7db07d403064f8f7630306a2e4
-
SHA512
a6398a180171556e02c75d9030ff1a5316c92fdf48b166b6bbf069b9a304f40ab7e8993373df18aeb438d9e3601be707b50129ab0aa3d0e25cea6060c54bee71
-
SSDEEP
768:MApQr0DHvdFJI34nGxusOy9Rp1pLeAxoeC48PqK1OtaP6cCFzENREMZ7Asj:MAaAJlzsh7pWezEPJB+O7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2032 sal.exe -
Loads dropped DLL 2 IoCs
pid Process 2232 2421f45df22bb98cf1f8b60e1b9b8da91e5d5b7db07d403064f8f7630306a2e4.exe 2232 2421f45df22bb98cf1f8b60e1b9b8da91e5d5b7db07d403064f8f7630306a2e4.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\sal.exe 2421f45df22bb98cf1f8b60e1b9b8da91e5d5b7db07d403064f8f7630306a2e4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2032 2232 2421f45df22bb98cf1f8b60e1b9b8da91e5d5b7db07d403064f8f7630306a2e4.exe 28 PID 2232 wrote to memory of 2032 2232 2421f45df22bb98cf1f8b60e1b9b8da91e5d5b7db07d403064f8f7630306a2e4.exe 28 PID 2232 wrote to memory of 2032 2232 2421f45df22bb98cf1f8b60e1b9b8da91e5d5b7db07d403064f8f7630306a2e4.exe 28 PID 2232 wrote to memory of 2032 2232 2421f45df22bb98cf1f8b60e1b9b8da91e5d5b7db07d403064f8f7630306a2e4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2421f45df22bb98cf1f8b60e1b9b8da91e5d5b7db07d403064f8f7630306a2e4.exe"C:\Users\Admin\AppData\Local\Temp\2421f45df22bb98cf1f8b60e1b9b8da91e5d5b7db07d403064f8f7630306a2e4.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\windows\SysWOW64\sal.exe"C:\windows\system32\sal.exe"2⤵
- Executes dropped EXE
PID:2032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD53cbe0b68e6bcbd94d57b4da273445cd2
SHA1145aedf83ae3ffe65a347f94d00eafef56afc110
SHA256e94c3d6b82fdbe39f3a617bffd880294d9eb71d461a5cbc6099acad246519097
SHA512852ef074dda3f675d2bd371082969d0fb3086939b1b2263cbfa6df106f94920fc08f3205cd33a41c3f7d4ecc43e4cabe988689cfdded20070721ca7c431fde4c