Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 08:28
Static task
static1
Behavioral task
behavioral1
Sample
e4bd4a28ed88f1fbfdfd0089d036cb30N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e4bd4a28ed88f1fbfdfd0089d036cb30N.exe
Resource
win10v2004-20240802-en
General
-
Target
e4bd4a28ed88f1fbfdfd0089d036cb30N.exe
-
Size
46KB
-
MD5
e4bd4a28ed88f1fbfdfd0089d036cb30
-
SHA1
657f3868362d4b0e7f27a06a825b08817cca09c1
-
SHA256
5b566a4ac57bade01d169533617255afccc251bd0bf942a9a0663e8a20d249ae
-
SHA512
e93dc8bac575b90258f285189854f64ec67577eeb53f3e60b95c83c6818938a9b824e49dc0919252d3cf9805f32104c8a487cda01eb7711cc8108e32892cf319
-
SSDEEP
768:MApQr0ovdFJI34eGxusOy9Rp1pLeAxoeC48PqK1aSMW:MAaDJlMsh7pWez+MW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2276 sal.exe -
Loads dropped DLL 2 IoCs
pid Process 2440 e4bd4a28ed88f1fbfdfd0089d036cb30N.exe 2440 e4bd4a28ed88f1fbfdfd0089d036cb30N.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\sal.exe e4bd4a28ed88f1fbfdfd0089d036cb30N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4bd4a28ed88f1fbfdfd0089d036cb30N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2276 2440 e4bd4a28ed88f1fbfdfd0089d036cb30N.exe 30 PID 2440 wrote to memory of 2276 2440 e4bd4a28ed88f1fbfdfd0089d036cb30N.exe 30 PID 2440 wrote to memory of 2276 2440 e4bd4a28ed88f1fbfdfd0089d036cb30N.exe 30 PID 2440 wrote to memory of 2276 2440 e4bd4a28ed88f1fbfdfd0089d036cb30N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4bd4a28ed88f1fbfdfd0089d036cb30N.exe"C:\Users\Admin\AppData\Local\Temp\e4bd4a28ed88f1fbfdfd0089d036cb30N.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\windows\SysWOW64\sal.exe"C:\windows\system32\sal.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD50b687a1817c811cbdf0440f3886914fa
SHA1688dae29a0a7c5e7c218bed75e0476dc833d93fb
SHA256e522a564a7c59fa9fb4cdcb29d55f0d570f4b15b314f00e6d93b723a28c8a09c
SHA5121c37da880e7ba6a78d470e3328733f688bde77e6f4193dcfc7d3b9a09cc4799687403d265413038f937648cdbbb1fde0806a5dd11829193009dcb3265efe4a99