Overview
overview
10Static
static
10Sausage Fa...60.sfv
windows11-21h2-x64
3Sausage Fa...up.exe
windows11-21h2-x64
10$PLUGINSDI...sh.dll
windows11-21h2-x64
3$PLUGINSDIR/Bass.dll
windows11-21h2-x64
3$PLUGINSDI...on.dll
windows11-21h2-x64
3$PLUGINSDI...ns.dll
windows11-21h2-x64
3$PLUGINSDI...in.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDIR/bass.dll
windows11-21h2-x64
3Resource/S...32.dll
windows11-21h2-x64
3Resource/S...64.dll
windows11-21h2-x64
1Sausage Fa...64.dll
windows11-21h2-x64
1Sausage Fattener.dll
windows11-21h2-x64
3uninstall.exe
windows11-21h2-x64
7Analysis
-
max time kernel
1790s -
max time network
1157s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-09-2024 17:08
Behavioral task
behavioral1
Sample
Sausage Fattener/asgn1160.sfv
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
Sausage Fattener/setup.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Bass.dll
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/GetVersion.dll
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NSIS_SkinCrafter_Plugin.dll
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/bass.dll
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
Resource/Sausage Fattener 32.dll
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
Resource/Sausage Fattener 64.dll
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
Sausage Fattener x64.dll
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
Sausage Fattener.dll
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
uninstall.exe
Resource
win11-20240802-en
General
-
Target
Sausage Fattener/setup.exe
-
Size
3.9MB
-
MD5
81e69b29c4c09391a12b665e7661f48e
-
SHA1
b103b694d12544c9db444badd9e2263d219698b1
-
SHA256
81e45c1e6d6a718624159e116e6daa8c1547f39bef7f56163303e7eca8abfae1
-
SHA512
5476b9fa6967aefcb73793c965224c93d2ab46268830fcb71c69bc864e22e0cb92512959fe7a728ee77c2bde00e3ce9eda64d015ff1ef34273292707680c0042
-
SSDEEP
98304:QhVVJqioKMFh1qKsbZcMgsGwNmlCNE4CJgcMyfQP/4:QhV1pMzHQCMFGImHgcM54
Malware Config
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral2/files/0x000100000002aaf6-31.dat family_strela behavioral2/memory/5204-34-0x00000000047F0000-0x0000000004DBD000-memory.dmp family_strela -
Loads dropped DLL 13 IoCs
pid Process 5204 setup.exe 5204 setup.exe 5204 setup.exe 5204 setup.exe 5204 setup.exe 5204 setup.exe 5204 setup.exe 5204 setup.exe 5204 setup.exe 5204 setup.exe 5204 setup.exe 5204 setup.exe 5204 setup.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\msvcr71.dll setup.exe File created C:\Windows\SysWOW64\mfc71.dll setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5204 setup.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1716 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1716 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5204 setup.exe 5204 setup.exe 5204 setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Sausage Fattener\setup.exe"C:\Users\Admin\AppData\Local\Temp\Sausage Fattener\setup.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5204
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004DC 0x00000000000004D01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD513cc92f90a299f5b2b2f795d0d2e47dc
SHA1aa69ead8520876d232c6ed96021a4825e79f542f
SHA256eb1ca2b3a6e564c32677d0cdc388e26b74ef686e071d7dbca44d0bfa10488feb
SHA512ff4e6e6e7104568fc85ef3a3f0494a5c7822a4ceaf65c584ad534f08f9a472a8d86f0a62f1f86343c61e2540b2254714b7ea43e4b312ff13d8271ff069386fa3
-
Filesize
101KB
MD5a8af308ff01b4477657955fbf0cc8408
SHA10794c059f0326e4a71be8a3ee4ac17a657d90d88
SHA25614a38f56be50a3829eb1eda2a908da2de5913f81d5cb01d8b668593d0fc36594
SHA5129e221967db95d4b86bf311891193dfd1515806aa0d43198d3bc26a17d77f06f212ab9dba1ca8575f50d224380e8b109529faccf2f56daac834da83a83677a0fd
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf
-
Filesize
5.8MB
MD5028251654a4d65509aa8ccb5f2ee284a
SHA14a4ad468a86df6b903002be4f8919017fea0c152
SHA2568b25cf3f7aa82fadccb2ce615ce0e40c5a8a3ea7bc51180a92173ee113a0ccfe
SHA512f252670bca0da9e8e2c519a6ef4ad6dd0c4e548aeb7566693a7d203e73e63345fc58683072020ef771d836429bed1d7b4fdf105aa3e62a969e9c8d39556e1d2d
-
Filesize
792KB
MD58fea8fd177034b52e6a5886fb5e780bd
SHA199f511388a2420d53b8406baed48ba550842eaad
SHA256546dddc7a31609b5bc3dc8ecef6f6782b77613853c54171fc32314c08a69e8de
SHA5125d82a3b9cf9d69049e6278a6d835b8a9a386c97ae9a69cf658675b0a8751a344d0da1ee704e9bb9023dab7cd77fdca684bdc90837960b583eef0bb4324498696
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
749B
MD59d6d98a06f109712346bc2d33afd89de
SHA18de6beeede9be616c886eff8d55ea970a4d99d1d
SHA2562ed23d66b5e4bf4a00e71fe1e27ccc1ab266ebb93f7e6c1dc4cb48f201f82e3b
SHA51201e96238ffdaa7269989e09adf284c540a3260981f6d2fa6011b7cef3814526a10c997b206e4fbc59c07e4e508239e130d9f98eac0720aed737af293792a9092
-
Filesize
1.0MB
MD51fd3f9722119bdf7b8cff0ecd1e84ea6
SHA19a4faa258b375e173feaca91a8bd920baf1091eb
SHA256385ea2a454172e3f9b1b18778d4d29318a12be9f0c0c0602db72e2cce136e823
SHA512109d7a80a5b10548200d05ab3d7deb9dc2ae8e40d84b468184895eb462211078ecdcb11f01eb50c91c65a924f8e592cd63b78e402dcaea144ff89c11f2ab07d6
-
Filesize
340KB
MD5ca2f560921b7b8be1cf555a5a18d54c3
SHA1432dbcf54b6f1142058b413a9d52668a2bde011d
SHA256c4d4339df314a27ff75a38967b7569d9962337b8d4cd4b0db3aba5ff72b2bfbb
SHA51223e0bdd9458a5a8e0f9bbcb7f6ce4f87fcc9e47c1ee15f964c17ff9fe8d0f82dd3a0f90263daaf1ee87fad4a238aa0ee92a16b3e2c67f47c84d575768edba43e