Analysis

  • max time kernel
    92s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 03:45

General

  • Target

    e258b380e179bfbd05afaad75f4e192fa17edf4babbba42e75cfc5f66cc1596aN.exe

  • Size

    35KB

  • MD5

    4f4170df3e56bf1e584958b8a192d060

  • SHA1

    25f576d8a022756ff498acd77282636555b10975

  • SHA256

    e258b380e179bfbd05afaad75f4e192fa17edf4babbba42e75cfc5f66cc1596a

  • SHA512

    360d7b4a6cf9f9b06d6f4cc1d537e9bc6ef0fca2025286046b395911bb0317c94d1c69934b008195752cf1c3c1d12002ec57c7b9d92c0c442beb82c12eb3cc09

  • SSDEEP

    384:MApc8m4e0GvQak4JI341C0abnk6hJPuM2DO:MApQr0GvdFJI34qTk6hJPfD

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e258b380e179bfbd05afaad75f4e192fa17edf4babbba42e75cfc5f66cc1596aN.exe
    "C:\Users\Admin\AppData\Local\Temp\e258b380e179bfbd05afaad75f4e192fa17edf4babbba42e75cfc5f66cc1596aN.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\windows\SysWOW64\sal.exe
      "C:\windows\system32\sal.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\sal.exe

    Filesize

    35KB

    MD5

    d5b852a8f01fad623f60347b5df75e22

    SHA1

    cc4165b9de45add10d10072f5e71813b2ddada6c

    SHA256

    fa416bac167ff4ef0e7cf11b82e9a6318f3e4065ebdd31133eb59ecc257783e8

    SHA512

    4112828f391ccc62d9d3af34c4507847a40b3af8947424ffbb9d2d20833a1cf34079c51433b4ecb88567f33c87f877bd5e353a11b3b419277b047183af72cf19

  • memory/2816-0-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2816-9-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4992-10-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB