Analysis
-
max time kernel
66s -
max time network
67s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 22:40
Behavioral task
behavioral1
Sample
Nursultan.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Nursultan.exe
Resource
win10v2004-20250314-en
General
-
Target
Nursultan.exe
-
Size
3.1MB
-
MD5
8bca40ea81d28fe8c3a222c203269c47
-
SHA1
37dbba4939b2d93658254cb6c46be9647485e0f9
-
SHA256
5ca343f5690462618535b682469b8f1c529ab42af9798e70fb606ac1581c045c
-
SHA512
02bbc5601c8bd982eb1218325363a0a3ed02499d2bdb4b30d89958a65196d3f4e6d24f1305717c83ce42e1a0eb25e61129b72d12b94dc124edd0729a91cd41f0
-
SSDEEP
98304:0JoyKoyUJ/5m4i3s0SSmBk0z7janvHXig2:IoYyUJo4q5SSmu07jeHX
Malware Config
Signatures
-
Detect SalatStealer payload 8 IoCs
resource yara_rule behavioral2/memory/3544-15-0x00000000001C0000-0x0000000000D3C000-memory.dmp family_salatstealer behavioral2/memory/1036-16-0x0000000000400000-0x0000000000F7C000-memory.dmp family_salatstealer behavioral2/memory/1036-17-0x0000000000400000-0x0000000000F7C000-memory.dmp family_salatstealer behavioral2/memory/1036-18-0x0000000000400000-0x0000000000F7C000-memory.dmp family_salatstealer behavioral2/memory/1036-19-0x0000000000400000-0x0000000000F7C000-memory.dmp family_salatstealer behavioral2/memory/1036-21-0x0000000000400000-0x0000000000F7C000-memory.dmp family_salatstealer behavioral2/memory/1036-22-0x0000000000400000-0x0000000000F7C000-memory.dmp family_salatstealer behavioral2/memory/1036-23-0x0000000000400000-0x0000000000F7C000-memory.dmp family_salatstealer -
Salatstealer family
-
salatstealer
SalatStealer is a stealer that takes sceenshot written in Golang.
-
Executes dropped EXE 1 IoCs
pid Process 1036 RuntimeBroker.exe -
resource yara_rule behavioral2/memory/3544-0-0x00000000001C0000-0x0000000000D3C000-memory.dmp upx behavioral2/files/0x000400000001dadb-5.dat upx behavioral2/memory/1036-14-0x0000000000400000-0x0000000000F7C000-memory.dmp upx behavioral2/memory/3544-15-0x00000000001C0000-0x0000000000D3C000-memory.dmp upx behavioral2/memory/1036-16-0x0000000000400000-0x0000000000F7C000-memory.dmp upx behavioral2/memory/1036-17-0x0000000000400000-0x0000000000F7C000-memory.dmp upx behavioral2/memory/1036-18-0x0000000000400000-0x0000000000F7C000-memory.dmp upx behavioral2/memory/1036-19-0x0000000000400000-0x0000000000F7C000-memory.dmp upx behavioral2/memory/1036-21-0x0000000000400000-0x0000000000F7C000-memory.dmp upx behavioral2/memory/1036-22-0x0000000000400000-0x0000000000F7C000-memory.dmp upx behavioral2/memory/1036-23-0x0000000000400000-0x0000000000F7C000-memory.dmp upx -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Mail\taskhostw.exe Nursultan.exe File opened for modification C:\Program Files (x86)\Windows Mail\taskhostw.exe Nursultan.exe File created C:\Program Files (x86)\Windows Portable Devices\448e1e0a-e1f7-c592-1b42-f145996a0ae1 Nursultan.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\RuntimeBroker.exe Nursultan.exe File created C:\Program Files (x86)\Reference Assemblies\448e1e0a-e1f7-c592-1b42-f145996a0ae1 Nursultan.exe File created C:\Program Files (x86)\Reference Assemblies\csrss.exe Nursultan.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\csrss.exe Nursultan.exe File created C:\Program Files (x86)\Windows Portable Devices\RuntimeBroker.exe Nursultan.exe File created C:\Program Files (x86)\Windows Mail\448e1e0a-e1f7-c592-1b42-f145996a0ae1 Nursultan.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nursultan.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3544 Nursultan.exe 3544 Nursultan.exe 3544 Nursultan.exe 3544 Nursultan.exe 1036 RuntimeBroker.exe 1036 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3544 wrote to memory of 1036 3544 Nursultan.exe 94 PID 3544 wrote to memory of 1036 3544 Nursultan.exe 94 PID 3544 wrote to memory of 1036 3544 Nursultan.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nursultan.exe"C:\Users\Admin\AppData\Local\Temp\Nursultan.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Program Files (x86)\Windows Portable Devices\RuntimeBroker.exe"C:\Program Files (x86)\Windows Portable Devices\RuntimeBroker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD58bca40ea81d28fe8c3a222c203269c47
SHA137dbba4939b2d93658254cb6c46be9647485e0f9
SHA2565ca343f5690462618535b682469b8f1c529ab42af9798e70fb606ac1581c045c
SHA51202bbc5601c8bd982eb1218325363a0a3ed02499d2bdb4b30d89958a65196d3f4e6d24f1305717c83ce42e1a0eb25e61129b72d12b94dc124edd0729a91cd41f0