Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 02:38
Static task
static1
Behavioral task
behavioral1
Sample
25b261e77045c54f240187de781abd90N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
25b261e77045c54f240187de781abd90N.exe
Resource
win10v2004-20240802-en
General
-
Target
25b261e77045c54f240187de781abd90N.exe
-
Size
44KB
-
MD5
25b261e77045c54f240187de781abd90
-
SHA1
f2c15364925b36eb9cf075ea9dbfe223e882924a
-
SHA256
68e9b46c151feff2e12a9c24374c866fa0f5157a992b9c90499a0c8d70566ac4
-
SHA512
8df81748fa5d0647f84350ebcd22c5af357b8eb1ccb0f5c45f85ee039fcfd0ab048bf2683f264ac765f9f6da73bcb20987c4e48b2b6ba8b515a44659e3642412
-
SSDEEP
768:0KntXyDOo26TDhCU/xLQBZnK5Z7J+5s0x+Odt:pe26/hpO/0ssghdt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2412 saloon.exe -
Loads dropped DLL 2 IoCs
pid Process 2556 25b261e77045c54f240187de781abd90N.exe 2556 25b261e77045c54f240187de781abd90N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language saloon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25b261e77045c54f240187de781abd90N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2412 2556 25b261e77045c54f240187de781abd90N.exe 30 PID 2556 wrote to memory of 2412 2556 25b261e77045c54f240187de781abd90N.exe 30 PID 2556 wrote to memory of 2412 2556 25b261e77045c54f240187de781abd90N.exe 30 PID 2556 wrote to memory of 2412 2556 25b261e77045c54f240187de781abd90N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\25b261e77045c54f240187de781abd90N.exe"C:\Users\Admin\AppData\Local\Temp\25b261e77045c54f240187de781abd90N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\saloon.exe"C:\Users\Admin\AppData\Local\Temp\saloon.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5a6bd592b164b593a569bb3380f551cdc
SHA1898c40fdf800e041cf08b678fa7b65aa48f63d92
SHA256ec208ce25f95418452db198ca71ffe2d335511a38d9d6164b2a750b7bd6b88e6
SHA512afb6a016a281f5c67be5e8a98fbbbe9cb377391522b170d929e761c67b52c6f15b81119395e917f3baff853b848ccb4f00d00ca1c5b2fbd790b1cdbc2cba2218