Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    187s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 11:06

General

  • Target

    f288ecfbe0efa47d9ee02a1077ce84d565bd99432ba3fbd1a9770013d49e9d4f.exe

  • Size

    494KB

  • MD5

    00b4f16c961d8433284324d25b572800

  • SHA1

    370d79c091997e0ac8ecdfd290c44f1dce79aa35

  • SHA256

    f288ecfbe0efa47d9ee02a1077ce84d565bd99432ba3fbd1a9770013d49e9d4f

  • SHA512

    3a7c4e80124e8141b5f8825c276f87b7ae82fa64aa68d2d5c665ee0535ff962eafb519ee0bee2c5ce053b390bc7b488d5343cec285de6ba4523a1d80edf74e80

  • SSDEEP

    12288:Gg3M9TO1Fu4+1nkjwCO93AQ/ESLIm5kMK0xTGEhuWEoIyiQ5hx:Gg3M01HRw39pESLI27xTpUWEoIyiQPx

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Signatures

  • Modifies firewall policy service 2 TTPs 6 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • UAC bypass 3 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 12 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 14 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 29 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 11 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\fontdrvhost.exe
    "fontdrvhost.exe"
    1⤵
      PID:800
    • C:\Windows\system32\fontdrvhost.exe
      "fontdrvhost.exe"
      1⤵
        PID:808
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        1⤵
          PID:376
        • C:\Windows\System32\RuntimeBroker.exe
          C:\Windows\System32\RuntimeBroker.exe -Embedding
          1⤵
            PID:2236
          • C:\Windows\system32\backgroundTaskHost.exe
            "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
            1⤵
              PID:5016
            • C:\Windows\System32\RuntimeBroker.exe
              C:\Windows\System32\RuntimeBroker.exe -Embedding
              1⤵
                PID:4796
              • C:\Windows\System32\RuntimeBroker.exe
                C:\Windows\System32\RuntimeBroker.exe -Embedding
                1⤵
                  PID:3872
                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                  1⤵
                    PID:3724
                  • C:\Windows\System32\RuntimeBroker.exe
                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                    1⤵
                      PID:3644
                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                      1⤵
                        PID:3468
                      • C:\Windows\system32\DllHost.exe
                        C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                        1⤵
                          PID:3380
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                          1⤵
                            PID:3196
                          • C:\Windows\Explorer.EXE
                            C:\Windows\Explorer.EXE
                            1⤵
                              PID:740
                              • C:\Users\Admin\AppData\Local\Temp\f288ecfbe0efa47d9ee02a1077ce84d565bd99432ba3fbd1a9770013d49e9d4f.exe
                                "C:\Users\Admin\AppData\Local\Temp\f288ecfbe0efa47d9ee02a1077ce84d565bd99432ba3fbd1a9770013d49e9d4f.exe"
                                2⤵
                                • Modifies firewall policy service
                                • UAC bypass
                                • Windows security bypass
                                • Loads dropped DLL
                                • Windows security modification
                                • Checks whether UAC is enabled
                                • Enumerates connected drives
                                • Drops file in Windows directory
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                • System policy modification
                                PID:2600
                                • C:\ProgramData\DatacardService\DCService.exe
                                  "C:\ProgramData\DatacardService\DCService.exe" -install
                                  3⤵
                                  • Executes dropped EXE
                                  • Checks computer location settings
                                  • Suspicious use of WriteProcessMemory
                                  PID:1408
                                  • C:\ProgramData\DatacardService\HWDeviceService64.exe
                                    "C:\ProgramData\DatacardService\HWDeviceService64.exe" -install
                                    4⤵
                                    • Executes dropped EXE
                                    PID:2480
                            • C:\Windows\system32\taskhostw.exe
                              taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                              1⤵
                                PID:2460
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                1⤵
                                  PID:2408
                                • C:\Windows\system32\sihost.exe
                                  sihost.exe
                                  1⤵
                                    PID:2372
                                  • C:\ProgramData\DatacardService\HWDeviceService64.exe
                                    "C:\ProgramData\DatacardService\HWDeviceService64.exe" -/service
                                    1⤵
                                    • Executes dropped EXE
                                    • Checks SCSI registry key(s)
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of WriteProcessMemory
                                    PID:3276
                                    • C:\ProgramData\DatacardService\DCSHelper.exe
                                      "C:\ProgramData\DatacardService\DCSHelper.exe"
                                      2⤵
                                      • Modifies firewall policy service
                                      • UAC bypass
                                      • Windows security bypass
                                      • Executes dropped EXE
                                      • Windows security modification
                                      • Checks whether UAC is enabled
                                      • Enumerates connected drives
                                      • Drops autorun.inf file
                                      • Drops file in Program Files directory
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of SetWindowsHookEx
                                      • Suspicious use of WriteProcessMemory
                                      • System policy modification
                                      PID:2016

                                  Network

                                  MITRE ATT&CK Enterprise v6

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\ProgramData\DataCardService\DCSHelper.exe

                                    Filesize

                                    230KB

                                    MD5

                                    349ab4f70e2ac44970894e7f03e1576e

                                    SHA1

                                    5f27448dd78eee8e3c583b57fcfe0969281f007f

                                    SHA256

                                    584d84ad7be834b72e3c4548b3e1e25984ccc5f9eaa2245c44cb6bfc63a9d716

                                    SHA512

                                    382bf892a97d32bf5c4f30086d6c36ee59ffd0c428da105b821660373bfbc05b1a089717f9c76d1c76fbbc795fdfb68fda203a12cc1c6f17a2f262c838078021

                                  • C:\ProgramData\DataCardService\DCService.exe

                                    Filesize

                                    139KB

                                    MD5

                                    903930192dcd755910ca5f8e188cf10f

                                    SHA1

                                    8f52fe210e94f1299f76f5bc3cbe6340c77b5e91

                                    SHA256

                                    1746a56d9b678a4b7c4b74db3a53bd35e0c9e0d35b0f2979956785dae75a57b0

                                    SHA512

                                    472b098be907580dc9f6bcd31ba5ad44bb0b537bf1878dc89374ae2c2abb28312b7d8b87dc9389acce296ff5bf97c7dc6666483e836e7029e13398355927ba8b

                                  • C:\ProgramData\DataCardService\HWDeviceService64.exe

                                    Filesize

                                    338KB

                                    MD5

                                    e90da42b87d684debfb73b38a718a006

                                    SHA1

                                    f2eb9b7b20f8f0b88578bc8fda8326f12829f8d8

                                    SHA256

                                    bb18c63c1982f5cb99c9b65d2b801e8c1909ad7cd0171326dc0015d6b781b451

                                    SHA512

                                    69a495c1be253734b1a0958047b70fe93d0b2319c4599420ff84806e17b16e4fe1c9b2f6db69494f14dfe45c9323758670df56215b8695cf4effb9cf0ee638f9

                                  • C:\ProgramData\DataCardService\HWDeviceService64.exe

                                    Filesize

                                    338KB

                                    MD5

                                    e90da42b87d684debfb73b38a718a006

                                    SHA1

                                    f2eb9b7b20f8f0b88578bc8fda8326f12829f8d8

                                    SHA256

                                    bb18c63c1982f5cb99c9b65d2b801e8c1909ad7cd0171326dc0015d6b781b451

                                    SHA512

                                    69a495c1be253734b1a0958047b70fe93d0b2319c4599420ff84806e17b16e4fe1c9b2f6db69494f14dfe45c9323758670df56215b8695cf4effb9cf0ee638f9

                                  • C:\ProgramData\DatacardService\DCSHelper.exe

                                    Filesize

                                    230KB

                                    MD5

                                    349ab4f70e2ac44970894e7f03e1576e

                                    SHA1

                                    5f27448dd78eee8e3c583b57fcfe0969281f007f

                                    SHA256

                                    584d84ad7be834b72e3c4548b3e1e25984ccc5f9eaa2245c44cb6bfc63a9d716

                                    SHA512

                                    382bf892a97d32bf5c4f30086d6c36ee59ffd0c428da105b821660373bfbc05b1a089717f9c76d1c76fbbc795fdfb68fda203a12cc1c6f17a2f262c838078021

                                  • C:\ProgramData\DatacardService\DCService.exe

                                    Filesize

                                    139KB

                                    MD5

                                    903930192dcd755910ca5f8e188cf10f

                                    SHA1

                                    8f52fe210e94f1299f76f5bc3cbe6340c77b5e91

                                    SHA256

                                    1746a56d9b678a4b7c4b74db3a53bd35e0c9e0d35b0f2979956785dae75a57b0

                                    SHA512

                                    472b098be907580dc9f6bcd31ba5ad44bb0b537bf1878dc89374ae2c2abb28312b7d8b87dc9389acce296ff5bf97c7dc6666483e836e7029e13398355927ba8b

                                  • C:\ProgramData\DatacardService\HWDeviceService64.exe

                                    Filesize

                                    338KB

                                    MD5

                                    e90da42b87d684debfb73b38a718a006

                                    SHA1

                                    f2eb9b7b20f8f0b88578bc8fda8326f12829f8d8

                                    SHA256

                                    bb18c63c1982f5cb99c9b65d2b801e8c1909ad7cd0171326dc0015d6b781b451

                                    SHA512

                                    69a495c1be253734b1a0958047b70fe93d0b2319c4599420ff84806e17b16e4fe1c9b2f6db69494f14dfe45c9323758670df56215b8695cf4effb9cf0ee638f9

                                  • C:\Users\Admin\AppData\Local\Temp\nsi37B.tmp\System.dll

                                    Filesize

                                    11KB

                                    MD5

                                    c17103ae9072a06da581dec998343fc1

                                    SHA1

                                    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

                                    SHA256

                                    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

                                    SHA512

                                    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

                                  • C:\Windows\SYSTEM.INI

                                    Filesize

                                    257B

                                    MD5

                                    8eee003fe17c4b6b5de6fd5584835714

                                    SHA1

                                    bad2e29a6bb92c3a34563755239837f81cfda454

                                    SHA256

                                    bb5f6f82f2e5b6cc3d720d41d29378ca03ab1fa044d6052e2f5438db51db941c

                                    SHA512

                                    415b3b25fc3802ceaf4c986530f9c4fc05d0f5ed923bf2474f6e53e847f71c615ceea25f733454007b5d011828ffa33b6637c2444c5e1b1c85c369d6b47a82cf

                                  • memory/2016-149-0x0000000002ED0000-0x0000000003F5E000-memory.dmp

                                    Filesize

                                    16.6MB

                                  • memory/2016-151-0x0000000002ED0000-0x0000000003F5E000-memory.dmp

                                    Filesize

                                    16.6MB

                                  • memory/2016-152-0x0000000002ED0000-0x0000000003F5E000-memory.dmp

                                    Filesize

                                    16.6MB

                                  • memory/2600-132-0x0000000000400000-0x0000000000442000-memory.dmp

                                    Filesize

                                    264KB

                                  • memory/2600-135-0x0000000002380000-0x000000000340E000-memory.dmp

                                    Filesize

                                    16.6MB

                                  • memory/2600-146-0x0000000002380000-0x000000000340E000-memory.dmp

                                    Filesize

                                    16.6MB

                                  • memory/2600-147-0x0000000000400000-0x0000000000442000-memory.dmp

                                    Filesize

                                    264KB

                                  • memory/2600-148-0x0000000002380000-0x000000000340E000-memory.dmp

                                    Filesize

                                    16.6MB

                                  • memory/2600-133-0x0000000002380000-0x000000000340E000-memory.dmp

                                    Filesize

                                    16.6MB