Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 10:57
Static task
static1
Behavioral task
behavioral1
Sample
c851916dee0779c97075f9476f18b120N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c851916dee0779c97075f9476f18b120N.exe
Resource
win10v2004-20240709-en
General
-
Target
c851916dee0779c97075f9476f18b120N.exe
-
Size
57KB
-
MD5
c851916dee0779c97075f9476f18b120
-
SHA1
123b633ae4c3245d03a5f56999fa201e93cc51cf
-
SHA256
deb3a053ca5bba8f15993b23010a4b01c57b7c99a61b2391bb5c63c49cf98903
-
SHA512
ed0ecabd76e8cbb63123f3980959d09dbfbfd705434fe176c254812d9d8d22511f86ebbc611d783181d3f3fd75894f6f9da6ac00254497ba726160f63d45c807
-
SSDEEP
768:MApQr0DWvdFJI34HGxusOy9Rp1pLeAxoeC48PqK1OtaP6cCFzENREMZ7vVq:MAaJJlTsh7pWezEPJB+O4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation c851916dee0779c97075f9476f18b120N.exe -
Executes dropped EXE 1 IoCs
pid Process 4456 sal.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\sal.exe c851916dee0779c97075f9476f18b120N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c851916dee0779c97075f9476f18b120N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sal.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4568 wrote to memory of 4456 4568 c851916dee0779c97075f9476f18b120N.exe 84 PID 4568 wrote to memory of 4456 4568 c851916dee0779c97075f9476f18b120N.exe 84 PID 4568 wrote to memory of 4456 4568 c851916dee0779c97075f9476f18b120N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\c851916dee0779c97075f9476f18b120N.exe"C:\Users\Admin\AppData\Local\Temp\c851916dee0779c97075f9476f18b120N.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\windows\SysWOW64\sal.exe"C:\windows\system32\sal.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD54ec0addc88a58f285abca91836671990
SHA1a6041ab5086ba49eae738702ca9e69c9af650fcf
SHA256fd2daa02c4533c6edb32a7d25ca5dcada4fee08a912e32e49bd5a3262e2194c5
SHA5120af650c3e268397fc11ea5a3400fa1bf6dd7905af9a32ef83bd8dd1ba94cbde324bd6121b344df03a6b30e75d3b9efcf3da330ca47f8bff9404e0c224c547638