Analysis
-
max time kernel
37s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 05:32
Static task
static1
Behavioral task
behavioral1
Sample
f2197a5f1c7dc2d9db2f3c36dcfe5e662fd23e11b64b45aa7405f96e2f8ea320.dll
Resource
win7-20220812-en
General
-
Target
f2197a5f1c7dc2d9db2f3c36dcfe5e662fd23e11b64b45aa7405f96e2f8ea320.dll
-
Size
120KB
-
MD5
5c1af4c13f2ca626903026241b24ebc8
-
SHA1
867e9d29408d115a9c2c67489724ab4c39b342bf
-
SHA256
f2197a5f1c7dc2d9db2f3c36dcfe5e662fd23e11b64b45aa7405f96e2f8ea320
-
SHA512
4ee021bde74e0ddbb339cf61fe9e31bb6bb8bf94e649daa1ae4d3520bf33d2a23ce88ac92c844254d51496a23586a66f524ff06949961aaa4c89356085c095cc
-
SSDEEP
3072:TrphCGHDik7RqVD8vJeal+wSG44eCMHGvABbHLvZkdoIRJg:37CGHvqVwvE00G4WMHGvAhr2doIz
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 6c695e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 6c695e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 6c8b8e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 6c8b8e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 6c8b8e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 6c695e.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6c695e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6c8b8e.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 6c695e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 6c8b8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 6c8b8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 6c8b8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 6c695e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 6c695e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 6c695e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 6c8b8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 6c8b8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 6c8b8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 6c695e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 6c695e.exe -
Executes dropped EXE 3 IoCs
pid Process 2044 6c695e.exe 1592 6c6bfd.exe 1200 6c8b8e.exe -
resource yara_rule behavioral1/memory/2044-61-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/2044-69-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/2044-81-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/2044-83-0x0000000000700000-0x00000000017BA000-memory.dmp upx behavioral1/memory/1200-85-0x0000000000960000-0x0000000001A1A000-memory.dmp upx behavioral1/memory/1200-88-0x0000000000960000-0x0000000001A1A000-memory.dmp upx -
Loads dropped DLL 6 IoCs
pid Process 832 rundll32.exe 832 rundll32.exe 832 rundll32.exe 832 rundll32.exe 832 rundll32.exe 832 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 6c695e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 6c695e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 6c8b8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 6c8b8e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 6c8b8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 6c695e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 6c695e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 6c8b8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 6c695e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 6c695e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 6c8b8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 6c8b8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 6c8b8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 6c695e.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6c695e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6c8b8e.exe -
Enumerates connected drives 3 TTPs 9 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: 6c695e.exe File opened (read-only) \??\L: 6c695e.exe File opened (read-only) \??\E: 6c695e.exe File opened (read-only) \??\H: 6c695e.exe File opened (read-only) \??\I: 6c695e.exe File opened (read-only) \??\J: 6c695e.exe File opened (read-only) \??\F: 6c695e.exe File opened (read-only) \??\G: 6c695e.exe File opened (read-only) \??\E: 6c8b8e.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\6c6bbf 6c695e.exe File opened for modification C:\Windows\SYSTEM.INI 6c695e.exe File created C:\Windows\6cc266 6c8b8e.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2044 6c695e.exe 2044 6c695e.exe 1200 6c8b8e.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeDebugPrivilege 2044 6c695e.exe Token: SeDebugPrivilege 2044 6c695e.exe Token: SeDebugPrivilege 2044 6c695e.exe Token: SeDebugPrivilege 2044 6c695e.exe Token: SeDebugPrivilege 2044 6c695e.exe Token: SeDebugPrivilege 2044 6c695e.exe Token: SeDebugPrivilege 2044 6c695e.exe Token: SeDebugPrivilege 2044 6c695e.exe Token: SeDebugPrivilege 2044 6c695e.exe Token: SeDebugPrivilege 2044 6c695e.exe Token: SeDebugPrivilege 2044 6c695e.exe Token: SeDebugPrivilege 2044 6c695e.exe Token: SeDebugPrivilege 2044 6c695e.exe Token: SeDebugPrivilege 2044 6c695e.exe Token: SeDebugPrivilege 2044 6c695e.exe Token: SeDebugPrivilege 2044 6c695e.exe Token: SeDebugPrivilege 2044 6c695e.exe Token: SeDebugPrivilege 2044 6c695e.exe Token: SeDebugPrivilege 2044 6c695e.exe Token: SeDebugPrivilege 1200 6c8b8e.exe Token: SeDebugPrivilege 1200 6c8b8e.exe Token: SeDebugPrivilege 1200 6c8b8e.exe Token: SeDebugPrivilege 1200 6c8b8e.exe Token: SeDebugPrivilege 1200 6c8b8e.exe Token: SeDebugPrivilege 1200 6c8b8e.exe Token: SeDebugPrivilege 1200 6c8b8e.exe Token: SeDebugPrivilege 1200 6c8b8e.exe Token: SeDebugPrivilege 1200 6c8b8e.exe Token: SeDebugPrivilege 1200 6c8b8e.exe Token: SeDebugPrivilege 1200 6c8b8e.exe Token: SeDebugPrivilege 1200 6c8b8e.exe Token: SeDebugPrivilege 1200 6c8b8e.exe Token: SeDebugPrivilege 1200 6c8b8e.exe Token: SeDebugPrivilege 1200 6c8b8e.exe Token: SeDebugPrivilege 1200 6c8b8e.exe Token: SeDebugPrivilege 1200 6c8b8e.exe Token: SeDebugPrivilege 1200 6c8b8e.exe Token: SeDebugPrivilege 1200 6c8b8e.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 576 wrote to memory of 832 576 rundll32.exe 26 PID 576 wrote to memory of 832 576 rundll32.exe 26 PID 576 wrote to memory of 832 576 rundll32.exe 26 PID 576 wrote to memory of 832 576 rundll32.exe 26 PID 576 wrote to memory of 832 576 rundll32.exe 26 PID 576 wrote to memory of 832 576 rundll32.exe 26 PID 576 wrote to memory of 832 576 rundll32.exe 26 PID 832 wrote to memory of 2044 832 rundll32.exe 27 PID 832 wrote to memory of 2044 832 rundll32.exe 27 PID 832 wrote to memory of 2044 832 rundll32.exe 27 PID 832 wrote to memory of 2044 832 rundll32.exe 27 PID 2044 wrote to memory of 1216 2044 6c695e.exe 20 PID 2044 wrote to memory of 1316 2044 6c695e.exe 19 PID 2044 wrote to memory of 1384 2044 6c695e.exe 18 PID 2044 wrote to memory of 576 2044 6c695e.exe 25 PID 2044 wrote to memory of 832 2044 6c695e.exe 26 PID 2044 wrote to memory of 832 2044 6c695e.exe 26 PID 832 wrote to memory of 1592 832 rundll32.exe 28 PID 832 wrote to memory of 1592 832 rundll32.exe 28 PID 832 wrote to memory of 1592 832 rundll32.exe 28 PID 832 wrote to memory of 1592 832 rundll32.exe 28 PID 832 wrote to memory of 1200 832 rundll32.exe 29 PID 832 wrote to memory of 1200 832 rundll32.exe 29 PID 832 wrote to memory of 1200 832 rundll32.exe 29 PID 832 wrote to memory of 1200 832 rundll32.exe 29 PID 2044 wrote to memory of 1216 2044 6c695e.exe 20 PID 2044 wrote to memory of 1316 2044 6c695e.exe 19 PID 2044 wrote to memory of 1384 2044 6c695e.exe 18 PID 2044 wrote to memory of 1592 2044 6c695e.exe 28 PID 2044 wrote to memory of 1592 2044 6c695e.exe 28 PID 2044 wrote to memory of 1200 2044 6c695e.exe 29 PID 2044 wrote to memory of 1200 2044 6c695e.exe 29 PID 1200 wrote to memory of 1216 1200 6c8b8e.exe 20 PID 1200 wrote to memory of 1316 1200 6c8b8e.exe 19 PID 1200 wrote to memory of 1384 1200 6c8b8e.exe 18 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6c695e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6c8b8e.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1384
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f2197a5f1c7dc2d9db2f3c36dcfe5e662fd23e11b64b45aa7405f96e2f8ea320.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f2197a5f1c7dc2d9db2f3c36dcfe5e662fd23e11b64b45aa7405f96e2f8ea320.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\6c695e.exeC:\Users\Admin\AppData\Local\Temp\6c695e.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\6c6bfd.exeC:\Users\Admin\AppData\Local\Temp\6c6bfd.exe4⤵
- Executes dropped EXE
PID:1592
-
-
C:\Users\Admin\AppData\Local\Temp\6c8b8e.exeC:\Users\Admin\AppData\Local\Temp\6c8b8e.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1200
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1316
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD5ee9cc26f4f33c136661f2abd1aa8da62
SHA11f5311e9f65a496c0e7d758eb864f88ba18b78a2
SHA256d45627dce344abe99e5907c4652edcdfafa39e33e09b201f308a18159b4aeee8
SHA51272abbdd9c02f136c07e176b02ba2084dd4bf50b8c9c89049b52516ce634d26adef1fa527df65793747a64aa8157e5a32231e3610c07f6a74b839c387608c4b2c
-
Filesize
97KB
MD5ee9cc26f4f33c136661f2abd1aa8da62
SHA11f5311e9f65a496c0e7d758eb864f88ba18b78a2
SHA256d45627dce344abe99e5907c4652edcdfafa39e33e09b201f308a18159b4aeee8
SHA51272abbdd9c02f136c07e176b02ba2084dd4bf50b8c9c89049b52516ce634d26adef1fa527df65793747a64aa8157e5a32231e3610c07f6a74b839c387608c4b2c
-
Filesize
97KB
MD5ee9cc26f4f33c136661f2abd1aa8da62
SHA11f5311e9f65a496c0e7d758eb864f88ba18b78a2
SHA256d45627dce344abe99e5907c4652edcdfafa39e33e09b201f308a18159b4aeee8
SHA51272abbdd9c02f136c07e176b02ba2084dd4bf50b8c9c89049b52516ce634d26adef1fa527df65793747a64aa8157e5a32231e3610c07f6a74b839c387608c4b2c
-
Filesize
255B
MD591b52e9f97eee5d47d50f46fe6a85ffc
SHA1d637260b47522124235a0c0f288ea6bedfb81467
SHA256dd81470eab5e59c5af8aa002318777056940982fb9d41c97525e6a92710f295d
SHA51248b01e45a7c54247e94b068baeb51f9112e95fc8a1e67c9612152a1f61843f7ba2f3dfac945b1a3b39b06b3a2c77f87dd41bc538ffbacb4b68d9ded7dbed82e4
-
Filesize
97KB
MD5ee9cc26f4f33c136661f2abd1aa8da62
SHA11f5311e9f65a496c0e7d758eb864f88ba18b78a2
SHA256d45627dce344abe99e5907c4652edcdfafa39e33e09b201f308a18159b4aeee8
SHA51272abbdd9c02f136c07e176b02ba2084dd4bf50b8c9c89049b52516ce634d26adef1fa527df65793747a64aa8157e5a32231e3610c07f6a74b839c387608c4b2c
-
Filesize
97KB
MD5ee9cc26f4f33c136661f2abd1aa8da62
SHA11f5311e9f65a496c0e7d758eb864f88ba18b78a2
SHA256d45627dce344abe99e5907c4652edcdfafa39e33e09b201f308a18159b4aeee8
SHA51272abbdd9c02f136c07e176b02ba2084dd4bf50b8c9c89049b52516ce634d26adef1fa527df65793747a64aa8157e5a32231e3610c07f6a74b839c387608c4b2c
-
Filesize
97KB
MD5ee9cc26f4f33c136661f2abd1aa8da62
SHA11f5311e9f65a496c0e7d758eb864f88ba18b78a2
SHA256d45627dce344abe99e5907c4652edcdfafa39e33e09b201f308a18159b4aeee8
SHA51272abbdd9c02f136c07e176b02ba2084dd4bf50b8c9c89049b52516ce634d26adef1fa527df65793747a64aa8157e5a32231e3610c07f6a74b839c387608c4b2c
-
Filesize
97KB
MD5ee9cc26f4f33c136661f2abd1aa8da62
SHA11f5311e9f65a496c0e7d758eb864f88ba18b78a2
SHA256d45627dce344abe99e5907c4652edcdfafa39e33e09b201f308a18159b4aeee8
SHA51272abbdd9c02f136c07e176b02ba2084dd4bf50b8c9c89049b52516ce634d26adef1fa527df65793747a64aa8157e5a32231e3610c07f6a74b839c387608c4b2c
-
Filesize
97KB
MD5ee9cc26f4f33c136661f2abd1aa8da62
SHA11f5311e9f65a496c0e7d758eb864f88ba18b78a2
SHA256d45627dce344abe99e5907c4652edcdfafa39e33e09b201f308a18159b4aeee8
SHA51272abbdd9c02f136c07e176b02ba2084dd4bf50b8c9c89049b52516ce634d26adef1fa527df65793747a64aa8157e5a32231e3610c07f6a74b839c387608c4b2c
-
Filesize
97KB
MD5ee9cc26f4f33c136661f2abd1aa8da62
SHA11f5311e9f65a496c0e7d758eb864f88ba18b78a2
SHA256d45627dce344abe99e5907c4652edcdfafa39e33e09b201f308a18159b4aeee8
SHA51272abbdd9c02f136c07e176b02ba2084dd4bf50b8c9c89049b52516ce634d26adef1fa527df65793747a64aa8157e5a32231e3610c07f6a74b839c387608c4b2c