Analysis
-
max time kernel
32s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/12/2024, 12:43
Static task
static1
Behavioral task
behavioral1
Sample
e562df9c7791c555a99293aa3631d8d4262b3db3c4e2342c65950de5eabc25caN.exe
Resource
win7-20240708-en
General
-
Target
e562df9c7791c555a99293aa3631d8d4262b3db3c4e2342c65950de5eabc25caN.exe
-
Size
242KB
-
MD5
4121e014921a4440467b34d3467e54c0
-
SHA1
52e7b8e830f10b0e7bb6769aef782916d67daffd
-
SHA256
e562df9c7791c555a99293aa3631d8d4262b3db3c4e2342c65950de5eabc25ca
-
SHA512
4980ba093bf8c98ca9b389ac23b9331c483ddffdc30bfebc7f35a5a9acfe566ef36feb1ecb7951c4f757d4923da3ef185a6755b62b44a3984f3529d46ad7ba6c
-
SSDEEP
3072:eH21a/H7iHL49412xob5btEz0XmCD6j7HMdszWxdoGTIuSJQxc9CCK4+IbARKC:eH3ziHe+237HM66BSQKCw+IbAR7
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e562df9c7791c555a99293aa3631d8d4262b3db3c4e2342c65950de5eabc25caN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e562df9c7791c555a99293aa3631d8d4262b3db3c4e2342c65950de5eabc25caN.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e562df9c7791c555a99293aa3631d8d4262b3db3c4e2342c65950de5eabc25caN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e562df9c7791c555a99293aa3631d8d4262b3db3c4e2342c65950de5eabc25caN.exe -
resource yara_rule behavioral1/memory/2252-1-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx behavioral1/memory/2252-7-0x0000000001DE0000-0x0000000002E9A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e562df9c7791c555a99293aa3631d8d4262b3db3c4e2342c65950de5eabc25caN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e562df9c7791c555a99293aa3631d8d4262b3db3c4e2342c65950de5eabc25caN.exe"C:\Users\Admin\AppData\Local\Temp\e562df9c7791c555a99293aa3631d8d4262b3db3c4e2342c65950de5eabc25caN.exe"1⤵
- Windows security bypass
- Windows security modification
- System Location Discovery: System Language Discovery
PID:2252