Analysis
-
max time kernel
94s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 12:26
Static task
static1
Behavioral task
behavioral1
Sample
121acf0a205db5b75640a78213440900N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
121acf0a205db5b75640a78213440900N.exe
Resource
win10v2004-20240802-en
General
-
Target
121acf0a205db5b75640a78213440900N.exe
-
Size
36KB
-
MD5
121acf0a205db5b75640a78213440900
-
SHA1
c3d03e3b4c39c018f468030d689570cacbd35032
-
SHA256
29a7150ed377619154a3eb97e311405523e66f0bf346c3cc212c269be982c796
-
SHA512
b88bbcfe1030ed38b7ec2bef73a87634b6e8aa65ce14ffbfed57f08341c2313499cb5b9b1f94fe93821dc87b61e219b27ba470d7cf89c822641ca29ba6780f95
-
SSDEEP
384:MApc8m4e0GvQak4JI341C0abnk6hJPuM2rV8:MApQr0GvdFJI34qTk6hJPfc8
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 121acf0a205db5b75640a78213440900N.exe -
Executes dropped EXE 1 IoCs
pid Process 2016 sal.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\sal.exe 121acf0a205db5b75640a78213440900N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 121acf0a205db5b75640a78213440900N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sal.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 408 wrote to memory of 2016 408 121acf0a205db5b75640a78213440900N.exe 84 PID 408 wrote to memory of 2016 408 121acf0a205db5b75640a78213440900N.exe 84 PID 408 wrote to memory of 2016 408 121acf0a205db5b75640a78213440900N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\121acf0a205db5b75640a78213440900N.exe"C:\Users\Admin\AppData\Local\Temp\121acf0a205db5b75640a78213440900N.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:408 -
C:\windows\SysWOW64\sal.exe"C:\windows\system32\sal.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5bbad392ede7be1d0b00a9ae17215be2d
SHA10fefdca97702de8fc0dce3b67f473045553f6187
SHA256e5c137aa8c29b4b0529aecaee48615bef3d3cfaca71f59d377fd938fd2c8a285
SHA5122c35cfe12a5c0ae5c9e98b5ae599b478ef004af8fee5ea897fe19c0ea61ab0a55293f1010a64600bd1fc5ac155c5d77f34afda7f3fb3a7706ca956df67b84743