Analysis
-
max time kernel
13s -
max time network
121s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
24-07-2021 07:04
Static task
static1
Behavioral task
behavioral1
Sample
b277141c357912e3cf76cf2eff36d2d9.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
b277141c357912e3cf76cf2eff36d2d9.exe
-
Size
2.9MB
-
MD5
b277141c357912e3cf76cf2eff36d2d9
-
SHA1
dfee214eec9da65da55ce47f44ccb0ae4751195e
-
SHA256
f3dda8f48606c448d22a7b407f61757605acc028d3deddd0ad8c1e2742efcf86
-
SHA512
11aad22541baeeb19f54b306b3719da789287ce5ad2aec9218c2b305b69d4bd8fe794063fab761ce5f90a02ffb506ed9b2431966a2e9aa605647508f5326159b
Malware Config
Extracted
Family
sality
C2
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" b277141c357912e3cf76cf2eff36d2d9.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" b277141c357912e3cf76cf2eff36d2d9.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" b277141c357912e3cf76cf2eff36d2d9.exe -
resource yara_rule behavioral2/memory/900-114-0x0000000002210000-0x000000000329E000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" b277141c357912e3cf76cf2eff36d2d9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" b277141c357912e3cf76cf2eff36d2d9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" b277141c357912e3cf76cf2eff36d2d9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" b277141c357912e3cf76cf2eff36d2d9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" b277141c357912e3cf76cf2eff36d2d9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" b277141c357912e3cf76cf2eff36d2d9.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc b277141c357912e3cf76cf2eff36d2d9.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b277141c357912e3cf76cf2eff36d2d9.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI b277141c357912e3cf76cf2eff36d2d9.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4080 900 WerFault.exe 67 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 900 b277141c357912e3cf76cf2eff36d2d9.exe 900 b277141c357912e3cf76cf2eff36d2d9.exe -
Suspicious use of AdjustPrivilegeToken 57 IoCs
description pid Process Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe Token: SeDebugPrivilege 900 b277141c357912e3cf76cf2eff36d2d9.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 900 wrote to memory of 724 900 b277141c357912e3cf76cf2eff36d2d9.exe 5 PID 900 wrote to memory of 720 900 b277141c357912e3cf76cf2eff36d2d9.exe 62 PID 900 wrote to memory of 968 900 b277141c357912e3cf76cf2eff36d2d9.exe 58 PID 900 wrote to memory of 2340 900 b277141c357912e3cf76cf2eff36d2d9.exe 30 PID 900 wrote to memory of 2352 900 b277141c357912e3cf76cf2eff36d2d9.exe 29 PID 900 wrote to memory of 2516 900 b277141c357912e3cf76cf2eff36d2d9.exe 25 PID 900 wrote to memory of 3024 900 b277141c357912e3cf76cf2eff36d2d9.exe 19 PID 900 wrote to memory of 3256 900 b277141c357912e3cf76cf2eff36d2d9.exe 18 PID 900 wrote to memory of 3272 900 b277141c357912e3cf76cf2eff36d2d9.exe 17 PID 900 wrote to memory of 3500 900 b277141c357912e3cf76cf2eff36d2d9.exe 10 PID 900 wrote to memory of 3760 900 b277141c357912e3cf76cf2eff36d2d9.exe 16 PID 900 wrote to memory of 4052 900 b277141c357912e3cf76cf2eff36d2d9.exe 74 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b277141c357912e3cf76cf2eff36d2d9.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:724
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3500
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3760
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵PID:3272
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵PID:3256
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\b277141c357912e3cf76cf2eff36d2d9.exe"C:\Users\Admin\AppData\Local\Temp\b277141c357912e3cf76cf2eff36d2d9.exe"2⤵
- Modifies firewall policy service
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 10563⤵
- Program crash
PID:4080
-
-
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2516
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵PID:2352
-
c:\windows\system32\sihost.exesihost.exe1⤵PID:2340
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:968
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:720
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:4052