Analysis

  • max time kernel
    94s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/09/2024, 12:26

General

  • Target

    121acf0a205db5b75640a78213440900N.exe

  • Size

    36KB

  • MD5

    121acf0a205db5b75640a78213440900

  • SHA1

    c3d03e3b4c39c018f468030d689570cacbd35032

  • SHA256

    29a7150ed377619154a3eb97e311405523e66f0bf346c3cc212c269be982c796

  • SHA512

    b88bbcfe1030ed38b7ec2bef73a87634b6e8aa65ce14ffbfed57f08341c2313499cb5b9b1f94fe93821dc87b61e219b27ba470d7cf89c822641ca29ba6780f95

  • SSDEEP

    384:MApc8m4e0GvQak4JI341C0abnk6hJPuM2rV8:MApQr0GvdFJI34qTk6hJPfc8

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\121acf0a205db5b75640a78213440900N.exe
    "C:\Users\Admin\AppData\Local\Temp\121acf0a205db5b75640a78213440900N.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:408
    • C:\windows\SysWOW64\sal.exe
      "C:\windows\system32\sal.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\sal.exe

    Filesize

    36KB

    MD5

    bbad392ede7be1d0b00a9ae17215be2d

    SHA1

    0fefdca97702de8fc0dce3b67f473045553f6187

    SHA256

    e5c137aa8c29b4b0529aecaee48615bef3d3cfaca71f59d377fd938fd2c8a285

    SHA512

    2c35cfe12a5c0ae5c9e98b5ae599b478ef004af8fee5ea897fe19c0ea61ab0a55293f1010a64600bd1fc5ac155c5d77f34afda7f3fb3a7706ca956df67b84743

  • memory/408-0-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/408-9-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2016-10-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB