Overview
overview
10Static
static
10e1dcb9ba72...29.exe
windows7-x64
3e1dcb9ba72...29.exe
windows10-2004-x64
3e2071b429e...5c.exe
windows7-x64
10e2071b429e...5c.exe
windows10-2004-x64
10e249dbf0ac...f4.exe
windows7-x64
8e249dbf0ac...f4.exe
windows10-2004-x64
8e277271cc7...e8.exe
windows7-x64
10e277271cc7...e8.exe
windows10-2004-x64
10e282def0d2...89.exe
windows7-x64
10e282def0d2...89.exe
windows10-2004-x64
10e29645b977...39.exe
windows7-x64
7e29645b977...39.exe
windows10-2004-x64
7e2bfb9c5da...0c.exe
windows7-x64
1e2bfb9c5da...0c.exe
windows10-2004-x64
1e316eea789...fa.exe
windows7-x64
1e316eea789...fa.exe
windows10-2004-x64
1e3250ba3e9...f9.exe
windows7-x64
10e3250ba3e9...f9.exe
windows10-2004-x64
10e34a914ca2...b1.exe
windows7-x64
10e34a914ca2...b1.exe
windows10-2004-x64
10e37b2913aa...c6.exe
windows7-x64
10e37b2913aa...c6.exe
windows10-2004-x64
10e37c63b72b...0d.exe
windows7-x64
10e37c63b72b...0d.exe
windows10-2004-x64
10e37cf80804...e0.exe
windows7-x64
10e37cf80804...e0.exe
windows10-2004-x64
10e3a2f6c598...82.exe
windows7-x64
1e3a2f6c598...82.exe
windows10-2004-x64
1e3a86fc42d...62.exe
windows7-x64
9e3a86fc42d...62.exe
windows10-2004-x64
9e3e3053d34...10.exe
windows7-x64
10e3e3053d34...10.exe
windows10-2004-x64
10Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 06:17
Behavioral task
behavioral1
Sample
e1dcb9ba72b5d530a7025537eed091187313975f51f1a4756d379129a1eaa629.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1dcb9ba72b5d530a7025537eed091187313975f51f1a4756d379129a1eaa629.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
e2071b429ed0a109ba6ae98cc6bd94651c73805963058322d9ab5fc3ad8c385c.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
e2071b429ed0a109ba6ae98cc6bd94651c73805963058322d9ab5fc3ad8c385c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
e249dbf0acda03b41cc7ffb9d3ffe996eb648e79ec5b514d819180faebef48f4.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
e249dbf0acda03b41cc7ffb9d3ffe996eb648e79ec5b514d819180faebef48f4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
e277271cc70bc12cb5a62950728025e8.exe
Resource
win7-20250207-en
Behavioral task
behavioral8
Sample
e277271cc70bc12cb5a62950728025e8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
e282def0d26b0a0ace50c80bd0d3e389.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
e282def0d26b0a0ace50c80bd0d3e389.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
e29645b97716a1a1d083e644500c71a7e2a3c20f8c6812785f6242461eccfe39.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
e29645b97716a1a1d083e644500c71a7e2a3c20f8c6812785f6242461eccfe39.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
e2bfb9c5dab6674c2bd9eec1f66e4f0c.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
e2bfb9c5dab6674c2bd9eec1f66e4f0c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
e316eea78900620a3194bc604bab1d058ec60832baa6df78d0795ebee9ecd6fa.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
e316eea78900620a3194bc604bab1d058ec60832baa6df78d0795ebee9ecd6fa.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
e3250ba3e962ddf90560e00c92659cf9.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
e3250ba3e962ddf90560e00c92659cf9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
e34a914ca2b4fd7d490bd7fa0893c9b1.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
e34a914ca2b4fd7d490bd7fa0893c9b1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
e37b2913aafb08ae275e16364b9916c6.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
e37b2913aafb08ae275e16364b9916c6.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
e37c63b72b4dd8c6a148989a74f33e54278e68275a33bcd9bab0dbac29e5af0d.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
e37c63b72b4dd8c6a148989a74f33e54278e68275a33bcd9bab0dbac29e5af0d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
e37cf808045aeb5b8ffe33d0e6a47444ac10956adad4d307c948a20dd8e53de0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
e3a2f6c598bc05769da36673f1f02c90f737d5293bf16ba0c839e92cf4258382.exe
Resource
win7-20241023-en
Behavioral task
behavioral28
Sample
e3a2f6c598bc05769da36673f1f02c90f737d5293bf16ba0c839e92cf4258382.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
e3a86fc42dbea243f01ab5183b1e1f0c1907b4b6d46428df1d055ceb3dc9f662.exe
Resource
win7-20250207-en
Behavioral task
behavioral30
Sample
e3a86fc42dbea243f01ab5183b1e1f0c1907b4b6d46428df1d055ceb3dc9f662.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
e3e3053d342cd6eb6834eca2d1c506b65d8e459b4e336fcee977e17f3fb6a910.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
e3e3053d342cd6eb6834eca2d1c506b65d8e459b4e336fcee977e17f3fb6a910.exe
Resource
win10v2004-20250314-en
General
-
Target
e3e3053d342cd6eb6834eca2d1c506b65d8e459b4e336fcee977e17f3fb6a910.exe
-
Size
3.2MB
-
MD5
fdfe8313374cc5b208a194f2361d06b1
-
SHA1
f9d3ca1caf3fdafc2ced50709345811110c5a8cc
-
SHA256
e3e3053d342cd6eb6834eca2d1c506b65d8e459b4e336fcee977e17f3fb6a910
-
SHA512
01b650c9474e289f3dd3c891cee0093ec75806e33a5536e5fcc3202c1f5bf9e6a8fdd8b98b5788764a37c27111decef6fc814ce13cfbeb9ac66de577be823001
-
SSDEEP
98304:eAgOjoXMv34ssQQFTyEw33qGEZZ5Eq6ea:V/wNTyEw3tEZXV6e
Malware Config
Signatures
-
Detect SalatStealer payload 18 IoCs
resource yara_rule behavioral32/memory/4868-32-0x00000000000B0000-0x0000000000C2C000-memory.dmp family_salatstealer behavioral32/memory/5868-39-0x0000000000780000-0x00000000012FC000-memory.dmp family_salatstealer behavioral32/memory/3620-45-0x0000000000A10000-0x000000000158C000-memory.dmp family_salatstealer behavioral32/memory/2592-46-0x0000000000030000-0x0000000000BAC000-memory.dmp family_salatstealer behavioral32/memory/2592-47-0x0000000000030000-0x0000000000BAC000-memory.dmp family_salatstealer behavioral32/memory/2592-48-0x0000000000030000-0x0000000000BAC000-memory.dmp family_salatstealer behavioral32/memory/2592-49-0x0000000000030000-0x0000000000BAC000-memory.dmp family_salatstealer behavioral32/memory/2592-50-0x0000000000030000-0x0000000000BAC000-memory.dmp family_salatstealer behavioral32/memory/2592-51-0x0000000000030000-0x0000000000BAC000-memory.dmp family_salatstealer behavioral32/memory/2592-52-0x0000000000030000-0x0000000000BAC000-memory.dmp family_salatstealer behavioral32/memory/2592-54-0x0000000000030000-0x0000000000BAC000-memory.dmp family_salatstealer behavioral32/memory/2592-55-0x0000000000030000-0x0000000000BAC000-memory.dmp family_salatstealer behavioral32/memory/2592-56-0x0000000000030000-0x0000000000BAC000-memory.dmp family_salatstealer behavioral32/memory/2592-57-0x0000000000030000-0x0000000000BAC000-memory.dmp family_salatstealer behavioral32/memory/2592-58-0x0000000000030000-0x0000000000BAC000-memory.dmp family_salatstealer behavioral32/memory/2592-59-0x0000000000030000-0x0000000000BAC000-memory.dmp family_salatstealer behavioral32/memory/2592-60-0x0000000000030000-0x0000000000BAC000-memory.dmp family_salatstealer behavioral32/memory/2592-61-0x0000000000030000-0x0000000000BAC000-memory.dmp family_salatstealer -
Salatstealer family
-
salatstealer
SalatStealer is a stealer that takes sceenshot written in Golang.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation e3e3053d342cd6eb6834eca2d1c506b65d8e459b4e336fcee977e17f3fb6a910.exe -
Executes dropped EXE 5 IoCs
pid Process 4868 Xeno.exe 2376 Xenocheat.exe 2592 lsass.exe 5868 lsass.exe 3620 lsass.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
resource yara_rule behavioral32/memory/4868-24-0x00000000000B0000-0x0000000000C2C000-memory.dmp upx behavioral32/files/0x0011000000022f40-22.dat upx behavioral32/memory/4868-32-0x00000000000B0000-0x0000000000C2C000-memory.dmp upx behavioral32/memory/2592-33-0x0000000000030000-0x0000000000BAC000-memory.dmp upx behavioral32/memory/5868-38-0x0000000000780000-0x00000000012FC000-memory.dmp upx behavioral32/memory/5868-39-0x0000000000780000-0x00000000012FC000-memory.dmp upx behavioral32/memory/3620-44-0x0000000000A10000-0x000000000158C000-memory.dmp upx behavioral32/memory/3620-45-0x0000000000A10000-0x000000000158C000-memory.dmp upx behavioral32/memory/2592-46-0x0000000000030000-0x0000000000BAC000-memory.dmp upx behavioral32/memory/2592-47-0x0000000000030000-0x0000000000BAC000-memory.dmp upx behavioral32/memory/2592-48-0x0000000000030000-0x0000000000BAC000-memory.dmp upx behavioral32/memory/2592-49-0x0000000000030000-0x0000000000BAC000-memory.dmp upx behavioral32/memory/2592-50-0x0000000000030000-0x0000000000BAC000-memory.dmp upx behavioral32/memory/2592-51-0x0000000000030000-0x0000000000BAC000-memory.dmp upx behavioral32/memory/2592-52-0x0000000000030000-0x0000000000BAC000-memory.dmp upx behavioral32/memory/2592-54-0x0000000000030000-0x0000000000BAC000-memory.dmp upx behavioral32/memory/2592-55-0x0000000000030000-0x0000000000BAC000-memory.dmp upx behavioral32/memory/2592-56-0x0000000000030000-0x0000000000BAC000-memory.dmp upx behavioral32/memory/2592-57-0x0000000000030000-0x0000000000BAC000-memory.dmp upx behavioral32/memory/2592-58-0x0000000000030000-0x0000000000BAC000-memory.dmp upx behavioral32/memory/2592-59-0x0000000000030000-0x0000000000BAC000-memory.dmp upx behavioral32/memory/2592-60-0x0000000000030000-0x0000000000BAC000-memory.dmp upx behavioral32/memory/2592-61-0x0000000000030000-0x0000000000BAC000-memory.dmp upx -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft.NET\lsass.exe Xeno.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\lsass.exe Xeno.exe File created C:\Program Files\Google\Chrome\Application\lsass.exe lsass.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\lsass.exe lsass.exe File created C:\Program Files (x86)\Microsoft.NET\3ecd7260-f030-b938-1ff6-52fc61d760f0 Xeno.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 4868 Xeno.exe 4868 Xeno.exe 4868 Xeno.exe 4868 Xeno.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 5868 lsass.exe 5868 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 3620 lsass.exe 3620 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe 2592 lsass.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2592 lsass.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2592 lsass.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4720 wrote to memory of 4868 4720 e3e3053d342cd6eb6834eca2d1c506b65d8e459b4e336fcee977e17f3fb6a910.exe 88 PID 4720 wrote to memory of 4868 4720 e3e3053d342cd6eb6834eca2d1c506b65d8e459b4e336fcee977e17f3fb6a910.exe 88 PID 4720 wrote to memory of 4868 4720 e3e3053d342cd6eb6834eca2d1c506b65d8e459b4e336fcee977e17f3fb6a910.exe 88 PID 4720 wrote to memory of 2376 4720 e3e3053d342cd6eb6834eca2d1c506b65d8e459b4e336fcee977e17f3fb6a910.exe 89 PID 4720 wrote to memory of 2376 4720 e3e3053d342cd6eb6834eca2d1c506b65d8e459b4e336fcee977e17f3fb6a910.exe 89 PID 4868 wrote to memory of 2592 4868 Xeno.exe 94 PID 4868 wrote to memory of 2592 4868 Xeno.exe 94 PID 4868 wrote to memory of 2592 4868 Xeno.exe 94 PID 2592 wrote to memory of 5868 2592 lsass.exe 95 PID 2592 wrote to memory of 5868 2592 lsass.exe 95 PID 2592 wrote to memory of 5868 2592 lsass.exe 95 PID 2592 wrote to memory of 3620 2592 lsass.exe 98 PID 2592 wrote to memory of 3620 2592 lsass.exe 98 PID 2592 wrote to memory of 3620 2592 lsass.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3e3053d342cd6eb6834eca2d1c506b65d8e459b4e336fcee977e17f3fb6a910.exe"C:\Users\Admin\AppData\Local\Temp\e3e3053d342cd6eb6834eca2d1c506b65d8e459b4e336fcee977e17f3fb6a910.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\Xeno.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Program Files (x86)\Microsoft.NET\lsass.exe"C:\Program Files (x86)\Microsoft.NET\lsass.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Program Files\Google\Chrome\Application\lsass.exe"C:\Program Files\Google\Chrome\Application\lsass.exe" -4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\lsass.exe"C:\Program Files (x86)\Microsoft\Edge\Application\lsass.exe" -4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Xenocheat.exe"C:\Users\Admin\AppData\Local\Temp\Xenocheat.exe"2⤵
- Executes dropped EXE
PID:2376
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:2108
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:4020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD58899e5f3f8a07920e0e1b17b9ee5c94d
SHA19a2f8f62a289c2460e08083af062be9ce0901e5b
SHA256ec6e522cff0e048fc398894d13600f4b02b77ba952a7499f2b3a21422fc52171
SHA512f89197aadac1403c4776afe699570d8564b20e98f43202949f593c8e4f87d6f272cbaaed6caf4e0aad5033dfc0dc311735c21bb764fcf18f216325f4de0c39d5
-
Filesize
140KB
MD570797e0760472325728ba786ca208976
SHA18912f23afbe8b78a9582f2a458b89a7fd697e638
SHA25620744d38bc27d656a095e57bef62a44f5f6317de3672020e8a4a1e1057545764
SHA512787f172cbc18eeb4f8e88420377459f37918edc9aec0105566f9e79555a962d6e89d7d0d6b791475282b2c5fb093c9e85544794639ad2771d9ca4a0e5b456477