Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 08:28
Static task
static1
Behavioral task
behavioral1
Sample
e4bd4a28ed88f1fbfdfd0089d036cb30N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e4bd4a28ed88f1fbfdfd0089d036cb30N.exe
Resource
win10v2004-20240802-en
General
-
Target
e4bd4a28ed88f1fbfdfd0089d036cb30N.exe
-
Size
46KB
-
MD5
e4bd4a28ed88f1fbfdfd0089d036cb30
-
SHA1
657f3868362d4b0e7f27a06a825b08817cca09c1
-
SHA256
5b566a4ac57bade01d169533617255afccc251bd0bf942a9a0663e8a20d249ae
-
SHA512
e93dc8bac575b90258f285189854f64ec67577eeb53f3e60b95c83c6818938a9b824e49dc0919252d3cf9805f32104c8a487cda01eb7711cc8108e32892cf319
-
SSDEEP
768:MApQr0ovdFJI34eGxusOy9Rp1pLeAxoeC48PqK1aSMW:MAaDJlMsh7pWez+MW
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation e4bd4a28ed88f1fbfdfd0089d036cb30N.exe -
Executes dropped EXE 1 IoCs
pid Process 2804 sal.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\sal.exe e4bd4a28ed88f1fbfdfd0089d036cb30N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4bd4a28ed88f1fbfdfd0089d036cb30N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sal.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 864 wrote to memory of 2804 864 e4bd4a28ed88f1fbfdfd0089d036cb30N.exe 83 PID 864 wrote to memory of 2804 864 e4bd4a28ed88f1fbfdfd0089d036cb30N.exe 83 PID 864 wrote to memory of 2804 864 e4bd4a28ed88f1fbfdfd0089d036cb30N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4bd4a28ed88f1fbfdfd0089d036cb30N.exe"C:\Users\Admin\AppData\Local\Temp\e4bd4a28ed88f1fbfdfd0089d036cb30N.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:864 -
C:\windows\SysWOW64\sal.exe"C:\windows\system32\sal.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD50b687a1817c811cbdf0440f3886914fa
SHA1688dae29a0a7c5e7c218bed75e0476dc833d93fb
SHA256e522a564a7c59fa9fb4cdcb29d55f0d570f4b15b314f00e6d93b723a28c8a09c
SHA5121c37da880e7ba6a78d470e3328733f688bde77e6f4193dcfc7d3b9a09cc4799687403d265413038f937648cdbbb1fde0806a5dd11829193009dcb3265efe4a99