Analysis

  • max time kernel
    23s
  • max time network
    22s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/03/2025, 04:54

General

  • Target

    Fatality.exe

  • Size

    3.2MB

  • MD5

    314375a212ba4f9038c454820d9c5cad

  • SHA1

    2ce6451c052f88a9c0bddad5f23bc3253cb972bd

  • SHA256

    003ace97463c139fb1d6c53909c5dac9ffd958a698330a817bc268e6131182c5

  • SHA512

    31dcee114b402cded2bcc1f0589963b835e97dd9b2d173aad2ddf1afd72874e335f75bd2d08d2c14ef90334f4d7d01fe0830503479292e7b1d6938c2781eeaf8

  • SSDEEP

    98304:dSSniwJ8BPhwpzMda5oyqo7UrstRTJjyPv+I:8+WwpzMw5zqo7UrsDt2PH

Malware Config

Signatures

  • Detect SalatStealer payload 4 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Salatstealer family
  • salatstealer

    SalatStealer is a stealer that takes sceenshot written in Golang.

  • Executes dropped EXE 12 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Drops file in System32 directory 2 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Fatality.exe
    "C:\Users\Admin\AppData\Local\Temp\Fatality.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:6136
    • \??\c:\users\admin\appdata\local\temp\fatality.exe 
      c:\users\admin\appdata\local\temp\fatality.exe 
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:6068
      • C:\Program Files (x86)\WindowsPowerShell\services.exe
        "C:\Program Files (x86)\WindowsPowerShell\services.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3272
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1220
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4596
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4732
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4944
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:5440
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c c:\windows\resources\svchost.exe RO
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4828
    • \??\c:\windows\resources\svchost.exe
      c:\windows\resources\svchost.exe RO
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3044
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c c:\windows\resources\themes\explorer.exe RO
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4852
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe RO
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:5812
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c c:\windows\resources\themes\explorer.exe RO
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3788
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe RO
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1164
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c c:\windows\resources\svchost.exe RO
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2028
    • \??\c:\windows\resources\svchost.exe
      c:\windows\resources\svchost.exe RO
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1444
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\PeerDistRepub\WmiPrvSE.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4620
    • C:\Users\Admin\AppData\Local\PeerDistRepub\WmiPrvSE.exe
      C:\Users\Admin\AppData\Local\PeerDistRepub\WmiPrvSE.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2224
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Program Files (x86)\WindowsPowerShell\services.exe
    1⤵
      PID:3716

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\fatality.exe 

      Filesize

      3.0MB

      MD5

      c3d006e36238ccde7635fc1dff753e18

      SHA1

      d75c29be127aafa4391ffaf17007dfe0e04841b2

      SHA256

      36addab1b80302055acc352fd2da83de76f98432d02749ccf15d80961d9b4f27

      SHA512

      feed68622448f75c8bafbd411e0445751d3255db57708dcf9e64ca692c66bf9ad5ba3a9b9412813af990150047d25bc4382cf646822aef8b65553607ce690a86

    • C:\Windows\Resources\Themes\explorer.exe

      Filesize

      135KB

      MD5

      69e402db7a756097b1659702b4113798

      SHA1

      fb3538f90ffb46fa4fba8f6ce868102aa347be2c

      SHA256

      cf4fdd355ea4decce697ebdfb37f490cb588152b8373cf8b51151e0b2742e2c2

      SHA512

      f7e83f5306e5ee53a326760606649e99850822ff82b1cef8f5f758f067e1cc4a01b90edc6def8e536e72f2df8872e4744b74c2558187be800959fb21d9702e90

    • C:\Windows\Resources\Themes\icsys.icn.exe

      Filesize

      135KB

      MD5

      17e0d90ebfbebf56ac506ee1a002847c

      SHA1

      402113658d691f85cb6dbe25ac84758b4270ae5d

      SHA256

      84af98e0d210367def7265aa7f8393e4a52253522c00919c795bd8aed2180485

      SHA512

      0657b0d7e77cf915f6cc4bf1505f65461e38a1186f9c04fe727f6fcb510645d94bf17e38a51c079d034d42402980b076d1a19c3aea31fca466bb96d6f9aa6f3a

    • C:\Windows\Resources\spoolsv.exe

      Filesize

      135KB

      MD5

      5ee4e42b11202f3f7b95668adb2aedf1

      SHA1

      1e9b641e49d6b3da6766279bc276bd7f52ffa6d1

      SHA256

      4443fa1ab1bc498cb57b6ba68785fb04bde90baba8e316ea24e22c2d3f17a4ec

      SHA512

      368437226e258e21cf2b0954ee860795cee7fbdb604632b797628e37b5f9b23a8c2266620d1644b85bc65a18117ce78bf709939ee9ffb1ed4c973accd9a5b98b

    • C:\Windows\Resources\svchost.exe

      Filesize

      135KB

      MD5

      c7a630e6622c08bb734a5b653615b68e

      SHA1

      dd27f312878d7747097ad459a5ae5f8e6b819b54

      SHA256

      27f54b09fdd15aae5fb8e9369c22fecb8e2ebaf0c4384d7bf43832af57242ee1

      SHA512

      91c85d24a7894a04a022f5f92f6c0df6c2b222439f95d8921d682f577ac2fca1a1b70419ec1235641fdffeb034cbe6f4f58f08ff04c5c5be189dba682858df06

    • memory/1164-69-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1220-47-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1444-63-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2224-83-0x0000000000B30000-0x0000000001654000-memory.dmp

      Filesize

      11.1MB

    • memory/2224-81-0x0000000000B30000-0x0000000001654000-memory.dmp

      Filesize

      11.1MB

    • memory/3044-60-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/3272-84-0x00000000001E0000-0x0000000000D04000-memory.dmp

      Filesize

      11.1MB

    • memory/3272-76-0x00000000001E0000-0x0000000000D04000-memory.dmp

      Filesize

      11.1MB

    • memory/4732-46-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/4732-30-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/5440-45-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/5812-58-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/6068-68-0x0000000000F00000-0x0000000001A24000-memory.dmp

      Filesize

      11.1MB

    • memory/6068-77-0x0000000000F00000-0x0000000001A24000-memory.dmp

      Filesize

      11.1MB

    • memory/6068-9-0x0000000000F00000-0x0000000001A24000-memory.dmp

      Filesize

      11.1MB

    • memory/6136-0-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/6136-48-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB