Analysis

  • max time kernel
    148s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2022, 17:20 UTC

General

  • Target

    02951a1098930c5f83d5ce4a157378763319467b86f26de57e5e8441cca649ed.exe

  • Size

    249KB

  • MD5

    63b0b0b9a6835bb670405a531366eea0

  • SHA1

    a15b87a34c1126d8876ed0b2897153a569eef3c8

  • SHA256

    02951a1098930c5f83d5ce4a157378763319467b86f26de57e5e8441cca649ed

  • SHA512

    9a11c0a8c755ae5a492acc83dab5a3f088e0d86aff106b3915189daf67bab10bf18929d872eefcb6cfd949271d62ad408951cb509dc9aa5c3b62d222098cec69

  • SSDEEP

    3072:WsRnhr1zzLvga5yJdu34gOmqqnsZdysdJzTFwf9xgCo4nuotdJavrr:95H7N5t4g7ntsdH41n3gvrr

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Signatures

  • Modifies firewall policy service 2 TTPs 3 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 6 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1412
      • C:\Users\Admin\AppData\Local\Temp\02951a1098930c5f83d5ce4a157378763319467b86f26de57e5e8441cca649ed.exe
        "C:\Users\Admin\AppData\Local\Temp\02951a1098930c5f83d5ce4a157378763319467b86f26de57e5e8441cca649ed.exe"
        2⤵
        • Modifies firewall policy service
        • UAC bypass
        • Windows security bypass
        • Windows security modification
        • Checks whether UAC is enabled
        • Enumerates connected drives
        • Drops autorun.inf file
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:1184
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1340
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1256

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1184-54-0x0000000074BB1000-0x0000000074BB3000-memory.dmp

          Filesize

          8KB

        • memory/1184-55-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/1184-56-0x0000000001E40000-0x0000000002ECE000-memory.dmp

          Filesize

          16.6MB

        • memory/1184-57-0x0000000001E40000-0x0000000002ECE000-memory.dmp

          Filesize

          16.6MB

        • memory/1184-58-0x0000000000300000-0x0000000000302000-memory.dmp

          Filesize

          8KB

        • memory/1184-59-0x0000000003CF0000-0x0000000003CF2000-memory.dmp

          Filesize

          8KB

        • memory/1184-61-0x0000000000300000-0x0000000000302000-memory.dmp

          Filesize

          8KB

        • memory/1184-60-0x0000000001E40000-0x0000000002ECE000-memory.dmp

          Filesize

          16.6MB

        • memory/1184-62-0x0000000003CF0000-0x0000000003CF2000-memory.dmp

          Filesize

          8KB

        • memory/1184-63-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        We care about your privacy.

        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.