Analysis
-
max time kernel
93s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 00:35
Static task
static1
Behavioral task
behavioral1
Sample
6c652d67aab190b7b01c3312be62c130N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6c652d67aab190b7b01c3312be62c130N.exe
Resource
win10v2004-20240802-en
General
-
Target
6c652d67aab190b7b01c3312be62c130N.exe
-
Size
58KB
-
MD5
6c652d67aab190b7b01c3312be62c130
-
SHA1
ce0f72bbe7cfa2369b363c18b95ba91e3348ffd1
-
SHA256
dc53debd62f87c21b76eaae282b390ce7d2227ef2957c74a7aa492559a6f0c70
-
SHA512
a6488d87731c481847b82da56b2166c4fe6557bad33dd5f37dbeb877c181826532ae98c058093b9f6738f886da441bf26ccbd1ea1bb54330bc44551e49cc36f4
-
SSDEEP
768:MApQr0zvdFJI34iGxusOy9Rp1pLeAxoeC48PqK1OtaP6cCFzENREMZ7iTwWB3:MAaEJlosh7pWezEPJB+OeM+3
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation 6c652d67aab190b7b01c3312be62c130N.exe -
Executes dropped EXE 1 IoCs
pid Process 4992 sal.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\sal.exe 6c652d67aab190b7b01c3312be62c130N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c652d67aab190b7b01c3312be62c130N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sal.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4192 wrote to memory of 4992 4192 6c652d67aab190b7b01c3312be62c130N.exe 83 PID 4192 wrote to memory of 4992 4192 6c652d67aab190b7b01c3312be62c130N.exe 83 PID 4192 wrote to memory of 4992 4192 6c652d67aab190b7b01c3312be62c130N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c652d67aab190b7b01c3312be62c130N.exe"C:\Users\Admin\AppData\Local\Temp\6c652d67aab190b7b01c3312be62c130N.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\windows\SysWOW64\sal.exe"C:\windows\system32\sal.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5f29e30846562a018698689cc6873aa0c
SHA1c69495c9a24bdbc1776adfd5cc840273dd524eb9
SHA256c43ef63d1b109caeae695127a42d15b1705c820e144512c741b3c0a82eaecaa1
SHA5125600580c9a45f6b964231f73f241da0f95dacea341cc712b9f4b3104c42a8be14d4ef313ffdf720b1f79814ad4df9a2b44430b656e273793cb7fdb9e7cac2c5a