Analysis
-
max time kernel
22s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220414-en -
resource tags
arch:x64arch:x86image:win7-20220414-enlocale:en-usos:windows7-x64system -
submitted
16-07-2022 08:10
Static task
static1
Behavioral task
behavioral1
Sample
virussign.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
virussign.exe
Resource
win10v2004-20220414-en
General
-
Target
virussign.exe
-
Size
72KB
-
MD5
1086558ccdfa2a85b6438d5417901d50
-
SHA1
5fcac23e230f2b7697440b207af8e37bd0fc5db0
-
SHA256
7d558c9741933cd53bc746c8398f83b0aa608d4ce49577a1979f7fd25c9f93a9
-
SHA512
8d7401d0229d5db86351eb8a0bfb05353424d691d6fa7d31950bb01087555ed933e647b70d1963b60b3b2a0a1f0b332feb70578edb62c26840c7d04a16e135fa
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
virussign.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" virussign.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" virussign.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" virussign.exe -
Processes:
virussign.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" virussign.exe -
Processes:
virussign.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" virussign.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" virussign.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" virussign.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" virussign.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" virussign.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" virussign.exe -
Processes:
resource yara_rule behavioral1/memory/1892-56-0x0000000001ED0000-0x0000000002F8A000-memory.dmp upx behavioral1/memory/1892-58-0x0000000001ED0000-0x0000000002F8A000-memory.dmp upx -
Processes:
virussign.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" virussign.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" virussign.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" virussign.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" virussign.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" virussign.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" virussign.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc virussign.exe -
Processes:
virussign.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" virussign.exe -
Drops file in Windows directory 2 IoCs
Processes:
virussign.exedescription ioc process File created C:\Windows\6c3fdf virussign.exe File opened for modification C:\Windows\SYSTEM.INI virussign.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
virussign.exepid process 1892 virussign.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
virussign.exedescription pid process Token: SeDebugPrivilege 1892 virussign.exe Token: SeDebugPrivilege 1892 virussign.exe Token: SeDebugPrivilege 1892 virussign.exe Token: SeDebugPrivilege 1892 virussign.exe Token: SeDebugPrivilege 1892 virussign.exe Token: SeDebugPrivilege 1892 virussign.exe Token: SeDebugPrivilege 1892 virussign.exe Token: SeDebugPrivilege 1892 virussign.exe Token: SeDebugPrivilege 1892 virussign.exe Token: SeDebugPrivilege 1892 virussign.exe Token: SeDebugPrivilege 1892 virussign.exe Token: SeDebugPrivilege 1892 virussign.exe Token: SeDebugPrivilege 1892 virussign.exe Token: SeDebugPrivilege 1892 virussign.exe Token: SeDebugPrivilege 1892 virussign.exe Token: SeDebugPrivilege 1892 virussign.exe Token: SeDebugPrivilege 1892 virussign.exe Token: SeDebugPrivilege 1892 virussign.exe Token: SeDebugPrivilege 1892 virussign.exe Token: SeDebugPrivilege 1892 virussign.exe Token: SeDebugPrivilege 1892 virussign.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
virussign.exedescription pid process target process PID 1892 wrote to memory of 1120 1892 virussign.exe taskhost.exe PID 1892 wrote to memory of 1184 1892 virussign.exe Dwm.exe PID 1892 wrote to memory of 1212 1892 virussign.exe Explorer.EXE -
System policy modification 1 TTPs 1 IoCs
Processes:
virussign.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" virussign.exe
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\virussign.exe"C:\Users\Admin\AppData\Local\Temp\virussign.exe"1⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1892-54-0x0000000075AE1000-0x0000000075AE3000-memory.dmpFilesize
8KB
-
memory/1892-55-0x0000000036BB0000-0x0000000036BC5000-memory.dmpFilesize
84KB
-
memory/1892-56-0x0000000001ED0000-0x0000000002F8A000-memory.dmpFilesize
16.7MB
-
memory/1892-57-0x0000000036BB0000-0x0000000036BC5000-memory.dmpFilesize
84KB
-
memory/1892-58-0x0000000001ED0000-0x0000000002F8A000-memory.dmpFilesize
16.7MB