Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 10:57
Static task
static1
Behavioral task
behavioral1
Sample
c851916dee0779c97075f9476f18b120N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c851916dee0779c97075f9476f18b120N.exe
Resource
win10v2004-20240709-en
General
-
Target
c851916dee0779c97075f9476f18b120N.exe
-
Size
57KB
-
MD5
c851916dee0779c97075f9476f18b120
-
SHA1
123b633ae4c3245d03a5f56999fa201e93cc51cf
-
SHA256
deb3a053ca5bba8f15993b23010a4b01c57b7c99a61b2391bb5c63c49cf98903
-
SHA512
ed0ecabd76e8cbb63123f3980959d09dbfbfd705434fe176c254812d9d8d22511f86ebbc611d783181d3f3fd75894f6f9da6ac00254497ba726160f63d45c807
-
SSDEEP
768:MApQr0DWvdFJI34HGxusOy9Rp1pLeAxoeC48PqK1OtaP6cCFzENREMZ7vVq:MAaJJlTsh7pWezEPJB+O4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2844 sal.exe -
Loads dropped DLL 2 IoCs
pid Process 2096 c851916dee0779c97075f9476f18b120N.exe 2096 c851916dee0779c97075f9476f18b120N.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\sal.exe c851916dee0779c97075f9476f18b120N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c851916dee0779c97075f9476f18b120N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2844 2096 c851916dee0779c97075f9476f18b120N.exe 30 PID 2096 wrote to memory of 2844 2096 c851916dee0779c97075f9476f18b120N.exe 30 PID 2096 wrote to memory of 2844 2096 c851916dee0779c97075f9476f18b120N.exe 30 PID 2096 wrote to memory of 2844 2096 c851916dee0779c97075f9476f18b120N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c851916dee0779c97075f9476f18b120N.exe"C:\Users\Admin\AppData\Local\Temp\c851916dee0779c97075f9476f18b120N.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\windows\SysWOW64\sal.exe"C:\windows\system32\sal.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD54ec0addc88a58f285abca91836671990
SHA1a6041ab5086ba49eae738702ca9e69c9af650fcf
SHA256fd2daa02c4533c6edb32a7d25ca5dcada4fee08a912e32e49bd5a3262e2194c5
SHA5120af650c3e268397fc11ea5a3400fa1bf6dd7905af9a32ef83bd8dd1ba94cbde324bd6121b344df03a6b30e75d3b9efcf3da330ca47f8bff9404e0c224c547638