Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 04:45

General

  • Target

    154df8f131e6ca0b79787980d26d2ad6bc85b8e791809a0cc6be1e5ba68f2a3bN.exe

  • Size

    58KB

  • MD5

    6fd8a547d19d01d839e717fcb5b336b0

  • SHA1

    b6293c78a38d0acd8a7dba815b199b88acf4d8dd

  • SHA256

    154df8f131e6ca0b79787980d26d2ad6bc85b8e791809a0cc6be1e5ba68f2a3b

  • SHA512

    c21354be0b709c9259eb478520948ef7de8c2b64810b78cd987e5e6c39cdc07fde70181a84907d498174d1bee0ce9301cfcd848758f5be477eaa957b22d37680

  • SSDEEP

    768:MApQr0zvdFJI34iGxusOy9Rp1pLeAxoeC48PqK1OtaP6cCFzENREMZ7iTn:MAaEJlosh7pWezEPJB+OeL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\154df8f131e6ca0b79787980d26d2ad6bc85b8e791809a0cc6be1e5ba68f2a3bN.exe
    "C:\Users\Admin\AppData\Local\Temp\154df8f131e6ca0b79787980d26d2ad6bc85b8e791809a0cc6be1e5ba68f2a3bN.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\windows\SysWOW64\sal.exe
      "C:\windows\system32\sal.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\sal.exe

    Filesize

    58KB

    MD5

    9aeabe175c70ba9b84549082117ea045

    SHA1

    1a477249fe25e90d999e5714899014f4eca38314

    SHA256

    a1f88c649a3fea6e687dc9b57d5fadfc5e94ad466463317b53b5c92ef731ec2e

    SHA512

    a6b1de5bb3b4ae4ce5540981bc9bb94c214f5f23000ff95067d951dd97118d6429ec68967e335fc764afb1b171e362a576220b3f5b03d709da2c4891d81207b6

  • memory/2364-0-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2364-9-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB