Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2024, 01:37 UTC

General

  • Target

    sla.exe

  • Size

    10.1MB

  • MD5

    c30cfb125c97e2a861b018da9dd2a739

  • SHA1

    b160e47c7f6fd024df188be5ea46ea2e52aec45c

  • SHA256

    d050e8a18fa8a03831a2e9ca61fb364c31b953a9c09596c5ecbc1084b03087f6

  • SHA512

    1911f473e28427ce7236afd59dc6d8b0242836100905cf9e1fc680d96fa4acbaaabcb0431db213c3017a49be31eb10ccb27df7df193c719af0747194f715495f

  • SSDEEP

    196608:2vcEjiEy+dBy+zGOYRoZKmKmrYD2t1psCPh0odQ9GMBE:J+Xy+hYU22t1psJo

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 31 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sla.exe
    "C:\Users\Admin\AppData\Local\Temp\sla.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1920-0-0x000000014171A000-0x00000001418E4000-memory.dmp

    Filesize

    1.8MB

  • memory/1920-3-0x0000000077C30000-0x0000000077C32000-memory.dmp

    Filesize

    8KB

  • memory/1920-10-0x0000000077C40000-0x0000000077C42000-memory.dmp

    Filesize

    8KB

  • memory/1920-12-0x0000000140000000-0x00000001422FD000-memory.dmp

    Filesize

    35.0MB

  • memory/1920-19-0x0000000000420000-0x0000000000430000-memory.dmp

    Filesize

    64KB

  • memory/1920-8-0x0000000077C40000-0x0000000077C42000-memory.dmp

    Filesize

    8KB

  • memory/1920-6-0x0000000077C40000-0x0000000077C42000-memory.dmp

    Filesize

    8KB

  • memory/1920-5-0x0000000077C30000-0x0000000077C32000-memory.dmp

    Filesize

    8KB

  • memory/1920-1-0x0000000077C30000-0x0000000077C32000-memory.dmp

    Filesize

    8KB

  • memory/1920-20-0x0000000140000000-0x00000001422FD000-memory.dmp

    Filesize

    35.0MB

  • memory/1920-21-0x000000014171A000-0x00000001418E4000-memory.dmp

    Filesize

    1.8MB

  • memory/1920-22-0x0000000140000000-0x00000001422FD000-memory.dmp

    Filesize

    35.0MB

  • memory/1920-23-0x0000000027D70000-0x0000000027D80000-memory.dmp

    Filesize

    64KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.