Analysis

  • max time kernel
    39s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 19:48

General

  • Target

    e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe

  • Size

    915KB

  • MD5

    88a0f2edb12c0a743f4484c3f39ac657

  • SHA1

    a583f31f0ff29fd4691db64439f7583493ca7e6e

  • SHA256

    e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62

  • SHA512

    294ed9ae14f29f7bad0d936fc18e9a69dce18be4ea3366c88616d02f2b6ed970e20605e964b2ce47e643daab1454f55bedb94e1a1a611926e8a6c88c58ff0d56

  • SSDEEP

    24576:tzYXUYI1yIjq93FTwxKZ1t6aeWgSCI0QDHKH:yk9ovVTwy1t6aeJtPJ

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Signatures

  • Modifies firewall policy service 2 TTPs 3 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Executes dropped EXE 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 10 IoCs
  • Windows security modification 2 TTPs 7 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1276
      • C:\Users\Admin\AppData\Local\Temp\e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe
        "C:\Users\Admin\AppData\Local\Temp\e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe"
        2⤵
        • Modifies firewall policy service
        • UAC bypass
        • Windows security bypass
        • Disables RegEdit via registry modification
        • Loads dropped DLL
        • Windows security modification
        • Checks whether UAC is enabled
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:1096
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\kb888111xpsp1.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX0\kb888111xpsp1.exe" /passive /norestart
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:628
          • \??\c:\86c73415af696209de5e9aba3a0740\update\update.exe
            c:\86c73415af696209de5e9aba3a0740\update\update.exe /passive /norestart
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Windows directory
            PID:860
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1240
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1144

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\86c73415af696209de5e9aba3a0740\update\update.exe

          Filesize

          700KB

          MD5

          13f40799bd1bf4b7e3e8c77194121342

          SHA1

          2d723e5d9abc98f1432c939cd7626d102469c12d

          SHA256

          2a12d2bcb26e96babbc82737ffe30d76afe7db8daf40c7c3594d9665d5dfdb17

          SHA512

          237d7fb124a7b577598e1f2191afc80513992c0af9e290956b82aae18d8c6daeb3dfab457deb3378e2b17d69c17d757faf98a8b5ea0cee7d3c50b18367312aed

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\kb888111xpsp1.exe

          Filesize

          756KB

          MD5

          bd548a47e139c3b9da85a007017abb56

          SHA1

          1ac7b6de2388d620335407a15cb50abfc5906b8d

          SHA256

          358c26f2910c99e277e218a409615fb96e745865d10bd6adf19d14354c8899be

          SHA512

          69ead6e9b38abf5e186be57d62139f3319dddad4d3fcba7634e5c5deff6dafbe46832d1d6152186cf23c612f5ab6fc11be44c8da1e7e970deedee3527e27a70d

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\kb888111xpsp1.exe

          Filesize

          756KB

          MD5

          bd548a47e139c3b9da85a007017abb56

          SHA1

          1ac7b6de2388d620335407a15cb50abfc5906b8d

          SHA256

          358c26f2910c99e277e218a409615fb96e745865d10bd6adf19d14354c8899be

          SHA512

          69ead6e9b38abf5e186be57d62139f3319dddad4d3fcba7634e5c5deff6dafbe46832d1d6152186cf23c612f5ab6fc11be44c8da1e7e970deedee3527e27a70d

        • \86c73415af696209de5e9aba3a0740\update\update.exe

          Filesize

          700KB

          MD5

          13f40799bd1bf4b7e3e8c77194121342

          SHA1

          2d723e5d9abc98f1432c939cd7626d102469c12d

          SHA256

          2a12d2bcb26e96babbc82737ffe30d76afe7db8daf40c7c3594d9665d5dfdb17

          SHA512

          237d7fb124a7b577598e1f2191afc80513992c0af9e290956b82aae18d8c6daeb3dfab457deb3378e2b17d69c17d757faf98a8b5ea0cee7d3c50b18367312aed

        • \86c73415af696209de5e9aba3a0740\update\update.exe

          Filesize

          700KB

          MD5

          13f40799bd1bf4b7e3e8c77194121342

          SHA1

          2d723e5d9abc98f1432c939cd7626d102469c12d

          SHA256

          2a12d2bcb26e96babbc82737ffe30d76afe7db8daf40c7c3594d9665d5dfdb17

          SHA512

          237d7fb124a7b577598e1f2191afc80513992c0af9e290956b82aae18d8c6daeb3dfab457deb3378e2b17d69c17d757faf98a8b5ea0cee7d3c50b18367312aed

        • \86c73415af696209de5e9aba3a0740\update\update.exe

          Filesize

          700KB

          MD5

          13f40799bd1bf4b7e3e8c77194121342

          SHA1

          2d723e5d9abc98f1432c939cd7626d102469c12d

          SHA256

          2a12d2bcb26e96babbc82737ffe30d76afe7db8daf40c7c3594d9665d5dfdb17

          SHA512

          237d7fb124a7b577598e1f2191afc80513992c0af9e290956b82aae18d8c6daeb3dfab457deb3378e2b17d69c17d757faf98a8b5ea0cee7d3c50b18367312aed

        • \86c73415af696209de5e9aba3a0740\update\update.exe

          Filesize

          700KB

          MD5

          13f40799bd1bf4b7e3e8c77194121342

          SHA1

          2d723e5d9abc98f1432c939cd7626d102469c12d

          SHA256

          2a12d2bcb26e96babbc82737ffe30d76afe7db8daf40c7c3594d9665d5dfdb17

          SHA512

          237d7fb124a7b577598e1f2191afc80513992c0af9e290956b82aae18d8c6daeb3dfab457deb3378e2b17d69c17d757faf98a8b5ea0cee7d3c50b18367312aed

        • \86c73415af696209de5e9aba3a0740\update\updspapi.dll

          Filesize

          363KB

          MD5

          94b3ff0f65e277bdbbc5e39747ea034d

          SHA1

          4bfb51f6d77f5123728c0bf360f4396617c1cd5e

          SHA256

          5e4f341be4c0627d02282aad5f1df9a73cf9600f41325c0fd3783f119f421b81

          SHA512

          8643b0b7c38e9fa18d1537bb783a6674e37600d2e882d7ea66c26ffb761eaeeb87a69d04513525c34b2dea964b8a90cd11c4a2e863ac58766c4d5b06ddf47d24

        • \??\c:\86c73415af696209de5e9aba3a0740\update\UPDSPAPI.dll

          Filesize

          363KB

          MD5

          94b3ff0f65e277bdbbc5e39747ea034d

          SHA1

          4bfb51f6d77f5123728c0bf360f4396617c1cd5e

          SHA256

          5e4f341be4c0627d02282aad5f1df9a73cf9600f41325c0fd3783f119f421b81

          SHA512

          8643b0b7c38e9fa18d1537bb783a6674e37600d2e882d7ea66c26ffb761eaeeb87a69d04513525c34b2dea964b8a90cd11c4a2e863ac58766c4d5b06ddf47d24

        • \??\c:\86c73415af696209de5e9aba3a0740\update\update.exe

          Filesize

          700KB

          MD5

          13f40799bd1bf4b7e3e8c77194121342

          SHA1

          2d723e5d9abc98f1432c939cd7626d102469c12d

          SHA256

          2a12d2bcb26e96babbc82737ffe30d76afe7db8daf40c7c3594d9665d5dfdb17

          SHA512

          237d7fb124a7b577598e1f2191afc80513992c0af9e290956b82aae18d8c6daeb3dfab457deb3378e2b17d69c17d757faf98a8b5ea0cee7d3c50b18367312aed

        • \??\c:\86c73415af696209de5e9aba3a0740\update\update.inf

          Filesize

          8KB

          MD5

          9bc5236a02f2c6f23b8726d0f85c49e2

          SHA1

          3ad7f6be88420bf2ce2bf3e007ecc20335b7097b

          SHA256

          af56e147b22e99a96c6cbc68284f67cb48fac19b27d137dbea77819f6874b7c5

          SHA512

          c89ed99fdfd5015cd977530b37279ea408b22b2bb2cf1da9c61ba9c0bdfe54fe0d900b082f865c8be4fcc057cf464589e117b364bde2990ddb5a71f432d89e7c

        • \Users\Admin\AppData\Local\Temp\RarSFX0\kb888111xpsp1.exe

          Filesize

          756KB

          MD5

          bd548a47e139c3b9da85a007017abb56

          SHA1

          1ac7b6de2388d620335407a15cb50abfc5906b8d

          SHA256

          358c26f2910c99e277e218a409615fb96e745865d10bd6adf19d14354c8899be

          SHA512

          69ead6e9b38abf5e186be57d62139f3319dddad4d3fcba7634e5c5deff6dafbe46832d1d6152186cf23c612f5ab6fc11be44c8da1e7e970deedee3527e27a70d

        • \Users\Admin\AppData\Local\Temp\RarSFX0\kb888111xpsp1.exe

          Filesize

          756KB

          MD5

          bd548a47e139c3b9da85a007017abb56

          SHA1

          1ac7b6de2388d620335407a15cb50abfc5906b8d

          SHA256

          358c26f2910c99e277e218a409615fb96e745865d10bd6adf19d14354c8899be

          SHA512

          69ead6e9b38abf5e186be57d62139f3319dddad4d3fcba7634e5c5deff6dafbe46832d1d6152186cf23c612f5ab6fc11be44c8da1e7e970deedee3527e27a70d

        • \Users\Admin\AppData\Local\Temp\RarSFX0\kb888111xpsp1.exe

          Filesize

          756KB

          MD5

          bd548a47e139c3b9da85a007017abb56

          SHA1

          1ac7b6de2388d620335407a15cb50abfc5906b8d

          SHA256

          358c26f2910c99e277e218a409615fb96e745865d10bd6adf19d14354c8899be

          SHA512

          69ead6e9b38abf5e186be57d62139f3319dddad4d3fcba7634e5c5deff6dafbe46832d1d6152186cf23c612f5ab6fc11be44c8da1e7e970deedee3527e27a70d

        • \Users\Admin\AppData\Local\Temp\RarSFX0\kb888111xpsp1.exe

          Filesize

          756KB

          MD5

          bd548a47e139c3b9da85a007017abb56

          SHA1

          1ac7b6de2388d620335407a15cb50abfc5906b8d

          SHA256

          358c26f2910c99e277e218a409615fb96e745865d10bd6adf19d14354c8899be

          SHA512

          69ead6e9b38abf5e186be57d62139f3319dddad4d3fcba7634e5c5deff6dafbe46832d1d6152186cf23c612f5ab6fc11be44c8da1e7e970deedee3527e27a70d

        • \Users\Admin\AppData\Local\Temp\RarSFX0\kb888111xpsp1.exe

          Filesize

          756KB

          MD5

          bd548a47e139c3b9da85a007017abb56

          SHA1

          1ac7b6de2388d620335407a15cb50abfc5906b8d

          SHA256

          358c26f2910c99e277e218a409615fb96e745865d10bd6adf19d14354c8899be

          SHA512

          69ead6e9b38abf5e186be57d62139f3319dddad4d3fcba7634e5c5deff6dafbe46832d1d6152186cf23c612f5ab6fc11be44c8da1e7e970deedee3527e27a70d

        • memory/860-79-0x0000000000370000-0x00000000003CC000-memory.dmp

          Filesize

          368KB

        • memory/1096-57-0x00000000003C0000-0x00000000003F3000-memory.dmp

          Filesize

          204KB

        • memory/1096-59-0x0000000000510000-0x0000000000512000-memory.dmp

          Filesize

          8KB

        • memory/1096-54-0x0000000075211000-0x0000000075213000-memory.dmp

          Filesize

          8KB

        • memory/1096-55-0x0000000001F70000-0x0000000002FFE000-memory.dmp

          Filesize

          16.6MB

        • memory/1096-56-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1096-58-0x0000000001F70000-0x0000000002FFE000-memory.dmp

          Filesize

          16.6MB

        • memory/1096-82-0x00000000003C0000-0x00000000003CD000-memory.dmp

          Filesize

          52KB

        • memory/1096-81-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1096-83-0x0000000001F70000-0x0000000002FFE000-memory.dmp

          Filesize

          16.6MB