Analysis
-
max time kernel
39s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 19:48
Static task
static1
Behavioral task
behavioral1
Sample
e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe
Resource
win7-20220812-en
General
-
Target
e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe
-
Size
915KB
-
MD5
88a0f2edb12c0a743f4484c3f39ac657
-
SHA1
a583f31f0ff29fd4691db64439f7583493ca7e6e
-
SHA256
e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62
-
SHA512
294ed9ae14f29f7bad0d936fc18e9a69dce18be4ea3366c88616d02f2b6ed970e20605e964b2ce47e643daab1454f55bedb94e1a1a611926e8a6c88c58ff0d56
-
SSDEEP
24576:tzYXUYI1yIjq93FTwxKZ1t6aeWgSCI0QDHKH:yk9ovVTwy1t6aeJtPJ
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe -
Disables Task Manager via registry modification
-
Executes dropped EXE 2 IoCs
pid Process 628 kb888111xpsp1.exe 860 update.exe -
resource yara_rule behavioral1/memory/1096-55-0x0000000001F70000-0x0000000002FFE000-memory.dmp upx behavioral1/memory/1096-58-0x0000000001F70000-0x0000000002FFE000-memory.dmp upx behavioral1/memory/1096-83-0x0000000001F70000-0x0000000002FFE000-memory.dmp upx -
Loads dropped DLL 10 IoCs
pid Process 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe 628 kb888111xpsp1.exe 628 kb888111xpsp1.exe 628 kb888111xpsp1.exe 628 kb888111xpsp1.exe 860 update.exe 860 update.exe 860 update.exe 860 update.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\setupapi.log update.exe File opened for modification \??\c:\windows\KB888111.log update.exe File opened for modification C:\Windows\SYSTEM.INI e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Token: SeDebugPrivilege 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Token: SeDebugPrivilege 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Token: SeDebugPrivilege 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Token: SeDebugPrivilege 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Token: SeDebugPrivilege 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Token: SeDebugPrivilege 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Token: SeDebugPrivilege 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Token: SeDebugPrivilege 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Token: SeDebugPrivilege 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Token: SeDebugPrivilege 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Token: SeDebugPrivilege 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Token: SeDebugPrivilege 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Token: SeDebugPrivilege 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Token: SeDebugPrivilege 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Token: SeDebugPrivilege 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Token: SeDebugPrivilege 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Token: SeDebugPrivilege 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Token: SeDebugPrivilege 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Token: SeDebugPrivilege 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe Token: SeDebugPrivilege 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1096 wrote to memory of 1144 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe 13 PID 1096 wrote to memory of 1240 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe 12 PID 1096 wrote to memory of 1276 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe 11 PID 1096 wrote to memory of 628 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe 28 PID 1096 wrote to memory of 628 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe 28 PID 1096 wrote to memory of 628 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe 28 PID 1096 wrote to memory of 628 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe 28 PID 1096 wrote to memory of 628 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe 28 PID 1096 wrote to memory of 628 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe 28 PID 1096 wrote to memory of 628 1096 e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe 28 PID 628 wrote to memory of 860 628 kb888111xpsp1.exe 29 PID 628 wrote to memory of 860 628 kb888111xpsp1.exe 29 PID 628 wrote to memory of 860 628 kb888111xpsp1.exe 29 PID 628 wrote to memory of 860 628 kb888111xpsp1.exe 29 PID 628 wrote to memory of 860 628 kb888111xpsp1.exe 29 PID 628 wrote to memory of 860 628 kb888111xpsp1.exe 29 PID 628 wrote to memory of 860 628 kb888111xpsp1.exe 29 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe"C:\Users\Admin\AppData\Local\Temp\e6499ae93f94591837359fce76b09c36f3e225fab2c5e7deed7952845da3ea62.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\kb888111xpsp1.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\kb888111xpsp1.exe" /passive /norestart3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:628 -
\??\c:\86c73415af696209de5e9aba3a0740\update\update.exec:\86c73415af696209de5e9aba3a0740\update\update.exe /passive /norestart4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:860
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1240
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1144
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
700KB
MD513f40799bd1bf4b7e3e8c77194121342
SHA12d723e5d9abc98f1432c939cd7626d102469c12d
SHA2562a12d2bcb26e96babbc82737ffe30d76afe7db8daf40c7c3594d9665d5dfdb17
SHA512237d7fb124a7b577598e1f2191afc80513992c0af9e290956b82aae18d8c6daeb3dfab457deb3378e2b17d69c17d757faf98a8b5ea0cee7d3c50b18367312aed
-
Filesize
756KB
MD5bd548a47e139c3b9da85a007017abb56
SHA11ac7b6de2388d620335407a15cb50abfc5906b8d
SHA256358c26f2910c99e277e218a409615fb96e745865d10bd6adf19d14354c8899be
SHA51269ead6e9b38abf5e186be57d62139f3319dddad4d3fcba7634e5c5deff6dafbe46832d1d6152186cf23c612f5ab6fc11be44c8da1e7e970deedee3527e27a70d
-
Filesize
756KB
MD5bd548a47e139c3b9da85a007017abb56
SHA11ac7b6de2388d620335407a15cb50abfc5906b8d
SHA256358c26f2910c99e277e218a409615fb96e745865d10bd6adf19d14354c8899be
SHA51269ead6e9b38abf5e186be57d62139f3319dddad4d3fcba7634e5c5deff6dafbe46832d1d6152186cf23c612f5ab6fc11be44c8da1e7e970deedee3527e27a70d
-
Filesize
700KB
MD513f40799bd1bf4b7e3e8c77194121342
SHA12d723e5d9abc98f1432c939cd7626d102469c12d
SHA2562a12d2bcb26e96babbc82737ffe30d76afe7db8daf40c7c3594d9665d5dfdb17
SHA512237d7fb124a7b577598e1f2191afc80513992c0af9e290956b82aae18d8c6daeb3dfab457deb3378e2b17d69c17d757faf98a8b5ea0cee7d3c50b18367312aed
-
Filesize
700KB
MD513f40799bd1bf4b7e3e8c77194121342
SHA12d723e5d9abc98f1432c939cd7626d102469c12d
SHA2562a12d2bcb26e96babbc82737ffe30d76afe7db8daf40c7c3594d9665d5dfdb17
SHA512237d7fb124a7b577598e1f2191afc80513992c0af9e290956b82aae18d8c6daeb3dfab457deb3378e2b17d69c17d757faf98a8b5ea0cee7d3c50b18367312aed
-
Filesize
700KB
MD513f40799bd1bf4b7e3e8c77194121342
SHA12d723e5d9abc98f1432c939cd7626d102469c12d
SHA2562a12d2bcb26e96babbc82737ffe30d76afe7db8daf40c7c3594d9665d5dfdb17
SHA512237d7fb124a7b577598e1f2191afc80513992c0af9e290956b82aae18d8c6daeb3dfab457deb3378e2b17d69c17d757faf98a8b5ea0cee7d3c50b18367312aed
-
Filesize
700KB
MD513f40799bd1bf4b7e3e8c77194121342
SHA12d723e5d9abc98f1432c939cd7626d102469c12d
SHA2562a12d2bcb26e96babbc82737ffe30d76afe7db8daf40c7c3594d9665d5dfdb17
SHA512237d7fb124a7b577598e1f2191afc80513992c0af9e290956b82aae18d8c6daeb3dfab457deb3378e2b17d69c17d757faf98a8b5ea0cee7d3c50b18367312aed
-
Filesize
363KB
MD594b3ff0f65e277bdbbc5e39747ea034d
SHA14bfb51f6d77f5123728c0bf360f4396617c1cd5e
SHA2565e4f341be4c0627d02282aad5f1df9a73cf9600f41325c0fd3783f119f421b81
SHA5128643b0b7c38e9fa18d1537bb783a6674e37600d2e882d7ea66c26ffb761eaeeb87a69d04513525c34b2dea964b8a90cd11c4a2e863ac58766c4d5b06ddf47d24
-
Filesize
363KB
MD594b3ff0f65e277bdbbc5e39747ea034d
SHA14bfb51f6d77f5123728c0bf360f4396617c1cd5e
SHA2565e4f341be4c0627d02282aad5f1df9a73cf9600f41325c0fd3783f119f421b81
SHA5128643b0b7c38e9fa18d1537bb783a6674e37600d2e882d7ea66c26ffb761eaeeb87a69d04513525c34b2dea964b8a90cd11c4a2e863ac58766c4d5b06ddf47d24
-
Filesize
700KB
MD513f40799bd1bf4b7e3e8c77194121342
SHA12d723e5d9abc98f1432c939cd7626d102469c12d
SHA2562a12d2bcb26e96babbc82737ffe30d76afe7db8daf40c7c3594d9665d5dfdb17
SHA512237d7fb124a7b577598e1f2191afc80513992c0af9e290956b82aae18d8c6daeb3dfab457deb3378e2b17d69c17d757faf98a8b5ea0cee7d3c50b18367312aed
-
Filesize
8KB
MD59bc5236a02f2c6f23b8726d0f85c49e2
SHA13ad7f6be88420bf2ce2bf3e007ecc20335b7097b
SHA256af56e147b22e99a96c6cbc68284f67cb48fac19b27d137dbea77819f6874b7c5
SHA512c89ed99fdfd5015cd977530b37279ea408b22b2bb2cf1da9c61ba9c0bdfe54fe0d900b082f865c8be4fcc057cf464589e117b364bde2990ddb5a71f432d89e7c
-
Filesize
756KB
MD5bd548a47e139c3b9da85a007017abb56
SHA11ac7b6de2388d620335407a15cb50abfc5906b8d
SHA256358c26f2910c99e277e218a409615fb96e745865d10bd6adf19d14354c8899be
SHA51269ead6e9b38abf5e186be57d62139f3319dddad4d3fcba7634e5c5deff6dafbe46832d1d6152186cf23c612f5ab6fc11be44c8da1e7e970deedee3527e27a70d
-
Filesize
756KB
MD5bd548a47e139c3b9da85a007017abb56
SHA11ac7b6de2388d620335407a15cb50abfc5906b8d
SHA256358c26f2910c99e277e218a409615fb96e745865d10bd6adf19d14354c8899be
SHA51269ead6e9b38abf5e186be57d62139f3319dddad4d3fcba7634e5c5deff6dafbe46832d1d6152186cf23c612f5ab6fc11be44c8da1e7e970deedee3527e27a70d
-
Filesize
756KB
MD5bd548a47e139c3b9da85a007017abb56
SHA11ac7b6de2388d620335407a15cb50abfc5906b8d
SHA256358c26f2910c99e277e218a409615fb96e745865d10bd6adf19d14354c8899be
SHA51269ead6e9b38abf5e186be57d62139f3319dddad4d3fcba7634e5c5deff6dafbe46832d1d6152186cf23c612f5ab6fc11be44c8da1e7e970deedee3527e27a70d
-
Filesize
756KB
MD5bd548a47e139c3b9da85a007017abb56
SHA11ac7b6de2388d620335407a15cb50abfc5906b8d
SHA256358c26f2910c99e277e218a409615fb96e745865d10bd6adf19d14354c8899be
SHA51269ead6e9b38abf5e186be57d62139f3319dddad4d3fcba7634e5c5deff6dafbe46832d1d6152186cf23c612f5ab6fc11be44c8da1e7e970deedee3527e27a70d
-
Filesize
756KB
MD5bd548a47e139c3b9da85a007017abb56
SHA11ac7b6de2388d620335407a15cb50abfc5906b8d
SHA256358c26f2910c99e277e218a409615fb96e745865d10bd6adf19d14354c8899be
SHA51269ead6e9b38abf5e186be57d62139f3319dddad4d3fcba7634e5c5deff6dafbe46832d1d6152186cf23c612f5ab6fc11be44c8da1e7e970deedee3527e27a70d