Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 06:36
Static task
static1
Behavioral task
behavioral1
Sample
4b7207d75e4a8e05d507db53c8eb482ff3c89fe1100727e20c2cc3d5d7f5820d.exe
Resource
win7-20240903-en
General
-
Target
4b7207d75e4a8e05d507db53c8eb482ff3c89fe1100727e20c2cc3d5d7f5820d.exe
-
Size
968KB
-
MD5
86dd65ad71ac90d8b243e8a3655dffaf
-
SHA1
7297c2688858768d59b37b8b3796ebe111272d69
-
SHA256
4b7207d75e4a8e05d507db53c8eb482ff3c89fe1100727e20c2cc3d5d7f5820d
-
SHA512
0f2837211d528acf1862e28d9d0eea42c37f8e344a7a0cc0f8ce3ced744b324cd224fb7fcdeccd8f8c6319f96bd9a93c4ad9f4d5731f054166cd84ef29227329
-
SSDEEP
12288:C62zeB/vtDBrhOGd9X8WoKwD/g7YRbKMIvsexWDyNjxsHq6ZpwM0SP3+IZ2+eJ:geZVDBdxLi1F2vfxxb6ZpwM0I+w2B
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Sality family
-
resource yara_rule behavioral2/memory/3092-1-0x0000000000820000-0x00000000018DA000-memory.dmp upx behavioral2/memory/3092-3-0x0000000000820000-0x00000000018DA000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b7207d75e4a8e05d507db53c8eb482ff3c89fe1100727e20c2cc3d5d7f5820d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3092 4b7207d75e4a8e05d507db53c8eb482ff3c89fe1100727e20c2cc3d5d7f5820d.exe 3092 4b7207d75e4a8e05d507db53c8eb482ff3c89fe1100727e20c2cc3d5d7f5820d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b7207d75e4a8e05d507db53c8eb482ff3c89fe1100727e20c2cc3d5d7f5820d.exe"C:\Users\Admin\AppData\Local\Temp\4b7207d75e4a8e05d507db53c8eb482ff3c89fe1100727e20c2cc3d5d7f5820d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3092