Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 09:09

General

  • Target

    76286d890a070e13af22b0f048fb6f15c76f9c203de7a65fc87d3276db2ffbb8.exe

  • Size

    38KB

  • MD5

    b3013fc90fcc10c1fc474e77acebcd2a

  • SHA1

    407d6b637773c1bf84291bbfc883394de45c49a0

  • SHA256

    76286d890a070e13af22b0f048fb6f15c76f9c203de7a65fc87d3276db2ffbb8

  • SHA512

    0798c0594d0669fea038d67234eb91e8f54dbd1c411d737bbe09d3a4a5ab353b200641d3be0e6ec920fc45784d50aff779c94a1dbf42599c52ba5ef95640010c

  • SSDEEP

    384:MApc8m4e0GvQak4JI341C0abnk6hJP+wMv:MApQr0GvdFJI34qTk6hJPIv

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\76286d890a070e13af22b0f048fb6f15c76f9c203de7a65fc87d3276db2ffbb8.exe
    "C:\Users\Admin\AppData\Local\Temp\76286d890a070e13af22b0f048fb6f15c76f9c203de7a65fc87d3276db2ffbb8.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\windows\SysWOW64\sal.exe
      "C:\windows\system32\sal.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\sal.exe

    Filesize

    39KB

    MD5

    7ed296db3b3a48f041d06ebeb79b2e11

    SHA1

    4f8381ebc4ebbb3181ec5ca676acc927c5c3b321

    SHA256

    86631fa9e7c91ba56b243f8260fb0fdd7b545a8e4aa05e8f6866469b69476f8e

    SHA512

    96dfbf0de58abdcc71c169a3c12f0c7c9e76a21b9cf6e9682e7d3cbaf2c6d993c048fb0e19646502c5c7284b20218d29eaa5c3493c360881be1b34b7f3c68215

  • memory/2080-0-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2080-9-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2148-12-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB