Analysis
-
max time kernel
19s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 21:59
Static task
static1
Behavioral task
behavioral1
Sample
b3f090f4cfd0bfd5ca11ed91117057d0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b3f090f4cfd0bfd5ca11ed91117057d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
b3f090f4cfd0bfd5ca11ed91117057d0N.exe
-
Size
38KB
-
MD5
b3f090f4cfd0bfd5ca11ed91117057d0
-
SHA1
7f1e34267cb5faa43cbe6ebb8ee69901abaa2ae7
-
SHA256
d89e5d86393a9badba76b5e703eb17f324a787ecabcf83838ec0780013c4c567
-
SHA512
d9313b811487eef8c3438a2d85e49953d46a6b2c495ed15ce8f487e39c5788645abb81f5e908dd521033ca7776d31f508b85245b99d0497b3e0c4be2295756f0
-
SSDEEP
384:MApc8m4e0LvQac4JI341CNabnkIU0Sq0yDAtc:MApQr0LvddJI34nTkIU0EyCc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2024 sal.exe -
Loads dropped DLL 2 IoCs
pid Process 1820 b3f090f4cfd0bfd5ca11ed91117057d0N.exe 1820 b3f090f4cfd0bfd5ca11ed91117057d0N.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\sal.exe b3f090f4cfd0bfd5ca11ed91117057d0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3f090f4cfd0bfd5ca11ed91117057d0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sal.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2024 1820 b3f090f4cfd0bfd5ca11ed91117057d0N.exe 28 PID 1820 wrote to memory of 2024 1820 b3f090f4cfd0bfd5ca11ed91117057d0N.exe 28 PID 1820 wrote to memory of 2024 1820 b3f090f4cfd0bfd5ca11ed91117057d0N.exe 28 PID 1820 wrote to memory of 2024 1820 b3f090f4cfd0bfd5ca11ed91117057d0N.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3f090f4cfd0bfd5ca11ed91117057d0N.exe"C:\Users\Admin\AppData\Local\Temp\b3f090f4cfd0bfd5ca11ed91117057d0N.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\windows\SysWOW64\sal.exe"C:\windows\system32\sal.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5d56c91078d457a4e347c518ce8143149
SHA16d8a927c1b0b1fc9e8eff7fd573e2100f6aedf95
SHA25648270db6657e665de3925722374b09737d0fb49138713c292668a535bc8f8110
SHA512546108af75d75eabf06bce7108df3257b1dc2a71e01ee9e88a80b30f2446e74c0cad7c5486318bdd9740ddea883ced00c8b171d3f04736d9030a30a93cd461be