Analysis
-
max time kernel
106s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 05:47
Static task
static1
Behavioral task
behavioral1
Sample
cea68dde621523b55b0cc2253e594490N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cea68dde621523b55b0cc2253e594490N.exe
Resource
win10v2004-20240802-en
General
-
Target
cea68dde621523b55b0cc2253e594490N.exe
-
Size
43KB
-
MD5
cea68dde621523b55b0cc2253e594490
-
SHA1
5baff8309402964d7682fae2e5f81f8ab443ada4
-
SHA256
6afb7bb97215878cea694f396e18c9563f8ed7456127da15eb8c8212e03887ff
-
SHA512
df8d8ac094909b555c47dc32b704cbfe4123d40528fe0ea675f775e6cae248f8e7b022d2bcad4fc2d955db8fc148d93aa4b8f65c111193928f352d90cc138923
-
SSDEEP
768:MApQr0ovdFJI34eGxusOy9Rp1pLeAxoeC48PqK1Wn2/:MAaDJlMsh7pWez8
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation cea68dde621523b55b0cc2253e594490N.exe -
Executes dropped EXE 1 IoCs
pid Process 3644 sal.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\sal.exe cea68dde621523b55b0cc2253e594490N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cea68dde621523b55b0cc2253e594490N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sal.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1572 wrote to memory of 3644 1572 cea68dde621523b55b0cc2253e594490N.exe 86 PID 1572 wrote to memory of 3644 1572 cea68dde621523b55b0cc2253e594490N.exe 86 PID 1572 wrote to memory of 3644 1572 cea68dde621523b55b0cc2253e594490N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\cea68dde621523b55b0cc2253e594490N.exe"C:\Users\Admin\AppData\Local\Temp\cea68dde621523b55b0cc2253e594490N.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\windows\SysWOW64\sal.exe"C:\windows\system32\sal.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5e90015b7ca1d575ce6dbcfe66bcf7519
SHA1ee0bf9f63ff4826bfed0c3ce4726b3272c35f91a
SHA2569cc3b165b8a643015233e1f18f88db201533336383723a4014c7aad84d65b74c
SHA5120c48876c60b94f74be97b7b811e27cc5b0ea5f649c5adcd0af6378d0fd97e86fb8432ffab8e9c45c825b4523356496cf4008165b4f451997617f026790cee57a