Analysis
-
max time kernel
93s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 15:44
Static task
static1
Behavioral task
behavioral1
Sample
903a782c3bbf15cc413b5a9c0f3376e894045a66afc24e3dd7c42240f7874893.exe
Resource
win7-20240903-en
General
-
Target
903a782c3bbf15cc413b5a9c0f3376e894045a66afc24e3dd7c42240f7874893.exe
-
Size
1.1MB
-
MD5
031c4b6ca868b247e91faa7c0be55c2f
-
SHA1
7257371cf76ab4c4f84d568e27582b918467e004
-
SHA256
903a782c3bbf15cc413b5a9c0f3376e894045a66afc24e3dd7c42240f7874893
-
SHA512
145f31239b869d4bb615f2a7b71614b1be297fefdcb9d0ed95edab99ce2458d4a63b885373df212b7d033cb119c484ebfb5a6ba24dec02849834cce126fb1651
-
SSDEEP
24576:FqIIfZ31W+BzDevrryVHYVGpYCkguc7ZBCk8aR76piD1:FqIIdBsrSGGptHuc7ZBCTaR76piD1
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Sality family
-
resource yara_rule behavioral2/memory/3924-2-0x0000000000900000-0x00000000019BA000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 903a782c3bbf15cc413b5a9c0f3376e894045a66afc24e3dd7c42240f7874893.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3924 903a782c3bbf15cc413b5a9c0f3376e894045a66afc24e3dd7c42240f7874893.exe 3924 903a782c3bbf15cc413b5a9c0f3376e894045a66afc24e3dd7c42240f7874893.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\903a782c3bbf15cc413b5a9c0f3376e894045a66afc24e3dd7c42240f7874893.exe"C:\Users\Admin\AppData\Local\Temp\903a782c3bbf15cc413b5a9c0f3376e894045a66afc24e3dd7c42240f7874893.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3924