Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2022, 04:57 UTC

General

  • Target

    52278b6400d8469deafb22019acf8b3075328abaf29848d8174fcc269766572d.exe

  • Size

    187KB

  • MD5

    126232efd30636d2d66c7f983062535e

  • SHA1

    4fe06929e8956fdcd62e553e8d3780356ce6b07f

  • SHA256

    52278b6400d8469deafb22019acf8b3075328abaf29848d8174fcc269766572d

  • SHA512

    b271ab4f8c0de207a9678a9f1a1e210fa1e7268ab2ef38518d8e17b665238e38cb3ba15aa12ce359e6dddeb04da2f7babb7e3318502abe62e8358122e445d35d

  • SSDEEP

    3072:UYNQKPWDyDRefVJltZrpRl1P3RfgPsI59h/dxP1MC7ji:VNSDyDRO1thpH6sI7h/DPr

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Signatures

  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 11 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\fontdrvhost.exe
    "fontdrvhost.exe"
    1⤵
      PID:788
    • C:\Windows\system32\dwm.exe
      "dwm.exe"
      1⤵
        PID:1016
      • C:\Windows\system32\sihost.exe
        sihost.exe
        1⤵
          PID:2388
        • C:\Windows\Explorer.EXE
          C:\Windows\Explorer.EXE
          1⤵
            PID:2644
            • C:\Users\Admin\AppData\Local\Temp\52278b6400d8469deafb22019acf8b3075328abaf29848d8174fcc269766572d.exe
              "C:\Users\Admin\AppData\Local\Temp\52278b6400d8469deafb22019acf8b3075328abaf29848d8174fcc269766572d.exe"
              2⤵
              • UAC bypass
              • Windows security bypass
              • Disables RegEdit via registry modification
              • Windows security modification
              • Checks whether UAC is enabled
              • Drops file in Program Files directory
              • Drops file in Windows directory
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:3112
              • C:\Windows\SysWOW64\netsh.exe
                netsh firewall set opmode disable
                3⤵
                • Modifies Windows Firewall
                PID:368
              • C:\Windows\SysWOW64\NOTEPAD.EXE
                "C:\Windows\system32\NOTEPAD.EXE"
                3⤵
                  PID:3952
            • C:\Windows\System32\RuntimeBroker.exe
              C:\Windows\System32\RuntimeBroker.exe -Embedding
              1⤵
                PID:3552
              • C:\Windows\System32\RuntimeBroker.exe
                C:\Windows\System32\RuntimeBroker.exe -Embedding
                1⤵
                  PID:3796
                • C:\Windows\System32\RuntimeBroker.exe
                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                  1⤵
                    PID:4680
                  • C:\Windows\System32\RuntimeBroker.exe
                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                    1⤵
                      PID:2384
                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                      1⤵
                        PID:3640
                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                        1⤵
                          PID:3488
                        • C:\Windows\system32\DllHost.exe
                          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                          1⤵
                            PID:3384
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                            1⤵
                              PID:3188
                            • C:\Windows\system32\taskhostw.exe
                              taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                              1⤵
                                PID:2512
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                1⤵
                                  PID:2396
                                • C:\Windows\system32\fontdrvhost.exe
                                  "fontdrvhost.exe"
                                  1⤵
                                    PID:796

                                  Network

                                    No results found
                                  • 8.238.111.126:80
                                    322 B
                                    7
                                  • 8.238.111.126:80
                                    322 B
                                    7
                                  • 23.88.115.141:80
                                    46 B
                                    40 B
                                    1
                                    1
                                  No results found

                                  MITRE ATT&CK Enterprise v6

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • memory/3112-132-0x0000000001000000-0x000000000102A000-memory.dmp

                                    Filesize

                                    168KB

                                  • memory/3112-133-0x0000000002440000-0x0000000003473000-memory.dmp

                                    Filesize

                                    16.2MB

                                  • memory/3112-135-0x0000000002440000-0x0000000003473000-memory.dmp

                                    Filesize

                                    16.2MB

                                  • memory/3112-138-0x0000000001000000-0x000000000102A000-memory.dmp

                                    Filesize

                                    168KB

                                  • memory/3952-137-0x0000000000FD0000-0x0000000000FE7000-memory.dmp

                                    Filesize

                                    92KB

                                  We care about your privacy.

                                  This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.