Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 02:38
Static task
static1
Behavioral task
behavioral1
Sample
25b261e77045c54f240187de781abd90N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
25b261e77045c54f240187de781abd90N.exe
Resource
win10v2004-20240802-en
General
-
Target
25b261e77045c54f240187de781abd90N.exe
-
Size
44KB
-
MD5
25b261e77045c54f240187de781abd90
-
SHA1
f2c15364925b36eb9cf075ea9dbfe223e882924a
-
SHA256
68e9b46c151feff2e12a9c24374c866fa0f5157a992b9c90499a0c8d70566ac4
-
SHA512
8df81748fa5d0647f84350ebcd22c5af357b8eb1ccb0f5c45f85ee039fcfd0ab048bf2683f264ac765f9f6da73bcb20987c4e48b2b6ba8b515a44659e3642412
-
SSDEEP
768:0KntXyDOo26TDhCU/xLQBZnK5Z7J+5s0x+Odt:pe26/hpO/0ssghdt
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation 25b261e77045c54f240187de781abd90N.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation saloon.exe -
Executes dropped EXE 1 IoCs
pid Process 2120 saloon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25b261e77045c54f240187de781abd90N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language saloon.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 568 wrote to memory of 2120 568 25b261e77045c54f240187de781abd90N.exe 93 PID 568 wrote to memory of 2120 568 25b261e77045c54f240187de781abd90N.exe 93 PID 568 wrote to memory of 2120 568 25b261e77045c54f240187de781abd90N.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\25b261e77045c54f240187de781abd90N.exe"C:\Users\Admin\AppData\Local\Temp\25b261e77045c54f240187de781abd90N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Local\Temp\saloon.exe"C:\Users\Admin\AppData\Local\Temp\saloon.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4336,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=1904 /prefetch:81⤵PID:908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5a78f881227ff5566c46380fc9aac5339
SHA16caf1084abe44bb8cb653b815221e9b9d49a1aec
SHA2568297f96d560fb756efd55e1c6f0a5cf17b4f8cf745ab378782c62220098f18e8
SHA512f98b4947aba45643d8cd1c777c84c48a6935c6caad6309da87e9a395399d5d9308873150470cbc1e7602d2f413f2d6b27ba57ec447f674feda27e53d2ec1f261
-
Filesize
44KB
MD5a6bd592b164b593a569bb3380f551cdc
SHA1898c40fdf800e041cf08b678fa7b65aa48f63d92
SHA256ec208ce25f95418452db198ca71ffe2d335511a38d9d6164b2a750b7bd6b88e6
SHA512afb6a016a281f5c67be5e8a98fbbbe9cb377391522b170d929e761c67b52c6f15b81119395e917f3baff853b848ccb4f00d00ca1c5b2fbd790b1cdbc2cba2218