Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2024 17:42
Static task
static1
Behavioral task
behavioral1
Sample
53.sfx.exe
Resource
win7-20240419-en
General
-
Target
53.sfx.exe
-
Size
16.0MB
-
MD5
238408d9c101ac65d5b76d1e09b1e988
-
SHA1
0b7d0b03d5675f8fce4727c2934a3e18f1fc3f6e
-
SHA256
f3bbe1a5228e850a4ebe19021187faacfbb8a802f458bfc9dc7e95bef23ea67d
-
SHA512
54de94724222ec095e8e18f8f90f31fe6ffdaeb7dd705aad3e09fb91d63fe976f17739ec48f5413c0f15cf0c47f87b5b29972d58f6b340fc9688bdd29a15802a
-
SSDEEP
196608:o8WrlGLhX0/0wStVsWaKBo1O9f6ouryr3UfeIDQkr1bw6uMuxdWQmVQhYTwygXn2:DMMe3KBo1O16ou63uFUH9xdsT5MqfxJv
Malware Config
Signatures
-
Sliver RAT v2 5 IoCs
resource yara_rule behavioral2/memory/3416-12-0x00000232B9C60000-0x00000232BAC6B000-memory.dmp SliverRAT_v2 behavioral2/memory/3416-11-0x00000232B9C60000-0x00000232BAC6B000-memory.dmp SliverRAT_v2 behavioral2/memory/3416-10-0x00000232B9C60000-0x00000232BAC6B000-memory.dmp SliverRAT_v2 behavioral2/memory/3416-13-0x00000232B9C60000-0x00000232BAC6B000-memory.dmp SliverRAT_v2 behavioral2/memory/3416-14-0x00000232B9C60000-0x00000232BAC6B000-memory.dmp SliverRAT_v2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation 53.sfx.exe -
Executes dropped EXE 1 IoCs
pid Process 3416 53.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2332 wrote to memory of 3416 2332 53.sfx.exe 84 PID 2332 wrote to memory of 3416 2332 53.sfx.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\53.sfx.exe"C:\Users\Admin\AppData\Local\Temp\53.sfx.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\53.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\53.exe" activate2⤵
- Executes dropped EXE
PID:3416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15.8MB
MD5108854ed57caeeeaeefc20182ea67e94
SHA1b63db6f53ac507fbfd4d052a0217fe146302509e
SHA2565360bba34aa2a7c2e74d3f556ab94713e5a2391980090081f7a926abf3a9c183
SHA512d0946b8ebe861006bf4a470ee083c75fea38778cc6db47bb464bb47088fb6c69e7f1d5776299443885727b108d4571be7d97afd3e60b1bd8817e9ac05eecb378