Analysis

  • max time kernel
    15s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 01:29

General

  • Target

    ad5f9d0d4ab7962410ef12e25905b220c823e30c34c8a2aa87804770cbefe81fN.exe

  • Size

    38KB

  • MD5

    63a69849a32d625b736b683403aeeb20

  • SHA1

    f630d1071dc4d83c40bb8aeec7c4fb26d1a5d415

  • SHA256

    ad5f9d0d4ab7962410ef12e25905b220c823e30c34c8a2aa87804770cbefe81f

  • SHA512

    1a12e228b5a2a545c42d05774d7a4a3d21f8c53461d3f58306b3e1983c0c53c9ead95b5a1ec086bbdf598c4ad7451a1e781b0d6b2f5abb485375669f41e438d5

  • SSDEEP

    384:MApc8m4e0LvQak4JI341CNabnkIU0Sq0yDN:MApQr0LvdFJI34nTkIU0EyB

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad5f9d0d4ab7962410ef12e25905b220c823e30c34c8a2aa87804770cbefe81fN.exe
    "C:\Users\Admin\AppData\Local\Temp\ad5f9d0d4ab7962410ef12e25905b220c823e30c34c8a2aa87804770cbefe81fN.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\windows\SysWOW64\sal.exe
      "C:\windows\system32\sal.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\sal.exe

    Filesize

    38KB

    MD5

    880ff1eb40f64f6947412cd8610cdabf

    SHA1

    2ee517bf67e3a66938af14b9adf41ca249f30299

    SHA256

    341de28f9d92a63538d3d2c4c836242326db0ed904370c900b501c2d3db513f8

    SHA512

    8dc52f306e8dd56c9ed45403f070a77965a44888302fa34563b060b836daaeb8717bb989db260a2d705c1d836a5cf95dbc23f3df772c01ccc236113b02b1a2e4

  • memory/2296-0-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2296-10-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2644-13-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2644-11-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB