Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 00:14
Static task
static1
Behavioral task
behavioral1
Sample
3d853776445c894bdc23b8dd71242fe0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3d853776445c894bdc23b8dd71242fe0N.exe
Resource
win10v2004-20240802-en
General
-
Target
3d853776445c894bdc23b8dd71242fe0N.exe
-
Size
45KB
-
MD5
3d853776445c894bdc23b8dd71242fe0
-
SHA1
440d8d5a968504f12b4ea1b105e36b96d2061673
-
SHA256
b2340d1677d82792105fcc4088d677e2bf1942c4396f5d2c7e0b663c8cb8eee5
-
SHA512
225f135a3f5eb09476260d14fe34acce282b5b991139aed1dbfb5f107da40b8d95479d7b56b4b16180e9cc48a942b812270a169b05c3588da790f19d6bb35c1d
-
SSDEEP
768:MApQr0ovdFJI34eGxusOy9Rp1pLeAxoeC48PqK1aCx:MAaDJlMsh7pWez+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2696 sal.exe -
Loads dropped DLL 2 IoCs
pid Process 2348 3d853776445c894bdc23b8dd71242fe0N.exe 2348 3d853776445c894bdc23b8dd71242fe0N.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\sal.exe 3d853776445c894bdc23b8dd71242fe0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d853776445c894bdc23b8dd71242fe0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sal.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2696 2348 3d853776445c894bdc23b8dd71242fe0N.exe 30 PID 2348 wrote to memory of 2696 2348 3d853776445c894bdc23b8dd71242fe0N.exe 30 PID 2348 wrote to memory of 2696 2348 3d853776445c894bdc23b8dd71242fe0N.exe 30 PID 2348 wrote to memory of 2696 2348 3d853776445c894bdc23b8dd71242fe0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d853776445c894bdc23b8dd71242fe0N.exe"C:\Users\Admin\AppData\Local\Temp\3d853776445c894bdc23b8dd71242fe0N.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\windows\SysWOW64\sal.exe"C:\windows\system32\sal.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD59b6712b2dc72fb7bdec6734c0f5f3139
SHA13017f8693a3a090078e1ffd47a4ff8977d67d627
SHA256d4fea72a996e3b8f57bad20665bbc68ae084ddfb265c325adb70e942c4369664
SHA512efc92c9690b7d1952446c9c9c473f9caaa73fed8c1cefef53ffcefb589cb5161572cacd689b7fad98794b9c7d0284dfd4f961df1bdabb9e08428bc2cff409928