Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/03/2025, 04:58

General

  • Target

    Fatality.exe

  • Size

    3.2MB

  • MD5

    314375a212ba4f9038c454820d9c5cad

  • SHA1

    2ce6451c052f88a9c0bddad5f23bc3253cb972bd

  • SHA256

    003ace97463c139fb1d6c53909c5dac9ffd958a698330a817bc268e6131182c5

  • SHA512

    31dcee114b402cded2bcc1f0589963b835e97dd9b2d173aad2ddf1afd72874e335f75bd2d08d2c14ef90334f4d7d01fe0830503479292e7b1d6938c2781eeaf8

  • SSDEEP

    98304:dSSniwJ8BPhwpzMda5oyqo7UrstRTJjyPv+I:8+WwpzMw5zqo7UrsDt2PH

Malware Config

Signatures

  • Detect SalatStealer payload 18 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Salatstealer family
  • salatstealer

    SalatStealer is a stealer that takes sceenshot written in Golang.

  • Executes dropped EXE 16 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Drops file in System32 directory 2 IoCs
  • UPX packed file 22 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 28 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Fatality.exe
    "C:\Users\Admin\AppData\Local\Temp\Fatality.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4668
    • \??\c:\users\admin\appdata\local\temp\fatality.exe 
      c:\users\admin\appdata\local\temp\fatality.exe 
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2316
      • C:\Program Files (x86)\Mozilla Maintenance Service\taskhostw.exe
        "C:\Program Files (x86)\Mozilla Maintenance Service\taskhostw.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1040
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1788
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4924
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4676
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2168
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:1492
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c c:\windows\resources\themes\explorer.exe RO
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3828
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe RO
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2472
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c c:\windows\resources\svchost.exe RO
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2732
    • \??\c:\windows\resources\svchost.exe
      c:\windows\resources\svchost.exe RO
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3780
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c c:\windows\resources\themes\explorer.exe RO
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1356
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe RO
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1456
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c c:\windows\resources\svchost.exe RO
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2512
    • \??\c:\windows\resources\svchost.exe
      c:\windows\resources\svchost.exe RO
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1568
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Microsoft\sppsvc.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4732
    • C:\Users\Admin\AppData\Local\Microsoft\sppsvc.exe
      C:\Users\Admin\AppData\Local\Microsoft\sppsvc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:64
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Program Files (x86)\Mozilla Maintenance Service\taskhostw.exe
    1⤵
      PID:2468
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\windows\resources\themes\explorer.exe RO
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:5056
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe RO
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2816
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\windows\resources\svchost.exe RO
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:3596
      • \??\c:\windows\resources\svchost.exe
        c:\windows\resources\svchost.exe RO
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:5016
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\windows\resources\themes\explorer.exe RO
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:3636
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe RO
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1344
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\windows\resources\svchost.exe RO
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:3236
      • \??\c:\windows\resources\svchost.exe
        c:\windows\resources\svchost.exe RO
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3732

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\fatality.exe 

      Filesize

      3.0MB

      MD5

      c3d006e36238ccde7635fc1dff753e18

      SHA1

      d75c29be127aafa4391ffaf17007dfe0e04841b2

      SHA256

      36addab1b80302055acc352fd2da83de76f98432d02749ccf15d80961d9b4f27

      SHA512

      feed68622448f75c8bafbd411e0445751d3255db57708dcf9e64ca692c66bf9ad5ba3a9b9412813af990150047d25bc4382cf646822aef8b65553607ce690a86

    • C:\Windows\Resources\Themes\explorer.exe

      Filesize

      135KB

      MD5

      b90b185ecf21c3c8722e665f7045ddf3

      SHA1

      3af0e7bd0f9986bdffaf9e94199680bf98b38299

      SHA256

      434f97e8263b46c708f5087f29c8009eb0f3a58413bbb476e9c612c48e83184c

      SHA512

      e5fe021555c09ebe1bce5c64d142ab4f85514437d3f767eae7d46869378db9d975cea21602786f2f89e094fddd7ca6aa6b701f8080a74beab760eba936ad241f

    • C:\Windows\Resources\Themes\icsys.icn.exe

      Filesize

      135KB

      MD5

      17e0d90ebfbebf56ac506ee1a002847c

      SHA1

      402113658d691f85cb6dbe25ac84758b4270ae5d

      SHA256

      84af98e0d210367def7265aa7f8393e4a52253522c00919c795bd8aed2180485

      SHA512

      0657b0d7e77cf915f6cc4bf1505f65461e38a1186f9c04fe727f6fcb510645d94bf17e38a51c079d034d42402980b076d1a19c3aea31fca466bb96d6f9aa6f3a

    • C:\Windows\Resources\svchost.exe

      Filesize

      135KB

      MD5

      051a80ff52c781f8991aa8853e42c6dc

      SHA1

      002e1e277568a3da1f8bf7132c5bca95cfe9b3ca

      SHA256

      b090406afcb9aefa3917e8020728615e5edcd137f456184841a3859e4b866111

      SHA512

      454e372176a091dc25f9a164f7e135e92233f7d9907e7c6e1cbf968ff166b9ae68a4f472e556fcf3d596d08dd5a0676cdfcf4aa26ee28a58473c308c62039ae9

    • \??\c:\windows\resources\spoolsv.exe

      Filesize

      135KB

      MD5

      63798083cf8426ed3b7094e1f97e6a73

      SHA1

      54537ad21ed919ee401367b8beef1cabf26a2929

      SHA256

      48d928cf6fed389abd2e4d75f41adbe34b854a5dac0762685be4c26ccf424479

      SHA512

      6583fd3c7162899233f02ef858ff936ae958154ee0de962729a81d794807704042fff6669e325d0bca0fcadd3fe2dcccf8a7d6bb785d1ea0651fa0789c630819

    • memory/64-81-0x0000000000660000-0x0000000001184000-memory.dmp

      Filesize

      11.1MB

    • memory/64-79-0x0000000000660000-0x0000000001184000-memory.dmp

      Filesize

      11.1MB

    • memory/1040-104-0x00000000009F0000-0x0000000001514000-memory.dmp

      Filesize

      11.1MB

    • memory/1040-76-0x00000000009F0000-0x0000000001514000-memory.dmp

      Filesize

      11.1MB

    • memory/1040-119-0x00000000009F0000-0x0000000001514000-memory.dmp

      Filesize

      11.1MB

    • memory/1040-87-0x00000000009F0000-0x0000000001514000-memory.dmp

      Filesize

      11.1MB

    • memory/1040-105-0x00000000009F0000-0x0000000001514000-memory.dmp

      Filesize

      11.1MB

    • memory/1040-118-0x00000000009F0000-0x0000000001514000-memory.dmp

      Filesize

      11.1MB

    • memory/1040-86-0x00000000009F0000-0x0000000001514000-memory.dmp

      Filesize

      11.1MB

    • memory/1040-85-0x00000000009F0000-0x0000000001514000-memory.dmp

      Filesize

      11.1MB

    • memory/1040-103-0x00000000009F0000-0x0000000001514000-memory.dmp

      Filesize

      11.1MB

    • memory/1040-106-0x00000000009F0000-0x0000000001514000-memory.dmp

      Filesize

      11.1MB

    • memory/1040-100-0x00000000009F0000-0x0000000001514000-memory.dmp

      Filesize

      11.1MB

    • memory/1040-117-0x00000000009F0000-0x0000000001514000-memory.dmp

      Filesize

      11.1MB

    • memory/1040-83-0x00000000009F0000-0x0000000001514000-memory.dmp

      Filesize

      11.1MB

    • memory/1040-98-0x00000000009F0000-0x0000000001514000-memory.dmp

      Filesize

      11.1MB

    • memory/1040-82-0x00000000009F0000-0x0000000001514000-memory.dmp

      Filesize

      11.1MB

    • memory/1040-84-0x00000000009F0000-0x0000000001514000-memory.dmp

      Filesize

      11.1MB

    • memory/1344-116-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1456-69-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1492-47-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1568-70-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1788-46-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2168-102-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2316-75-0x0000000000B00000-0x0000000001624000-memory.dmp

      Filesize

      11.1MB

    • memory/2316-64-0x0000000000B00000-0x0000000001624000-memory.dmp

      Filesize

      11.1MB

    • memory/2316-9-0x0000000000B00000-0x0000000001624000-memory.dmp

      Filesize

      11.1MB

    • memory/2472-63-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2816-97-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/3732-115-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/3780-56-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/4668-0-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/4668-48-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/4676-45-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/4924-101-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/4924-21-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/5016-96-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB