Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 20:22
Static task
static1
Behavioral task
behavioral1
Sample
ca9c0f8940544fb3f5ee6eb62dc40620N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ca9c0f8940544fb3f5ee6eb62dc40620N.exe
Resource
win10v2004-20240802-en
General
-
Target
ca9c0f8940544fb3f5ee6eb62dc40620N.exe
-
Size
37KB
-
MD5
ca9c0f8940544fb3f5ee6eb62dc40620
-
SHA1
f87df209d17601a71abb3c898ebb4dc2a2554958
-
SHA256
c10a9918c2f8a252d2039561c1723e1cd942c631900791e22245b0b30a0edf21
-
SHA512
779659e8db5f3d6d76960a1348477e070417dfc26e00e9a565f1eb45b08b4d046cb745355be26d9511c18db48951e9c6926df6817bdcf35e683d54efa019287f
-
SSDEEP
384:MApc8m4e0LvQak4JI341CNabnkIU0Sq0yD8:MApQr0LvdFJI34nTkIU0Eyw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation ca9c0f8940544fb3f5ee6eb62dc40620N.exe -
Executes dropped EXE 1 IoCs
pid Process 3684 sal.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\sal.exe ca9c0f8940544fb3f5ee6eb62dc40620N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca9c0f8940544fb3f5ee6eb62dc40620N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sal.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4476 wrote to memory of 3684 4476 ca9c0f8940544fb3f5ee6eb62dc40620N.exe 80 PID 4476 wrote to memory of 3684 4476 ca9c0f8940544fb3f5ee6eb62dc40620N.exe 80 PID 4476 wrote to memory of 3684 4476 ca9c0f8940544fb3f5ee6eb62dc40620N.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca9c0f8940544fb3f5ee6eb62dc40620N.exe"C:\Users\Admin\AppData\Local\Temp\ca9c0f8940544fb3f5ee6eb62dc40620N.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\windows\SysWOW64\sal.exe"C:\windows\system32\sal.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD597e0268f1987622d422a5ff0224c033d
SHA11299fb496d32fc47bc1de1a73803217543a6a9af
SHA256508259e46ac2f0047666358e2a5d0b9f1ac01f249380ce336b51914f0037c16b
SHA512fb02a0402e64c4c3f8e425636c801d6f899199cbfd48882a2ef72e59bb31f281779d0b1314d7ad8bcebe9dfcb8c05f6be5cf08df2d2a184b45338a998bc40b21