Analysis
-
max time kernel
136s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 21:59
Static task
static1
Behavioral task
behavioral1
Sample
318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe
Resource
win7-20220901-en
General
-
Target
318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe
-
Size
220KB
-
MD5
a1061ac74f691796b037e9dfe04340d0
-
SHA1
102ac1988ff14e9afc7c31fff2fd005696032872
-
SHA256
318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585
-
SHA512
54adb8ab1194c76b7792d3beb96e23659956c1fa66e55e5339c6512aa0ac2d10d37780de6bbe528dbb75f3d30d456fe87539a66d2bf616e50ce87cd35513d2b2
-
SSDEEP
6144:WSO2HcRKMtpCT7KAZc3F1HAKwkNDJHXQ1Xc:WFRZtUeAZmFKkfYc
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe -
Disables Task Manager via registry modification
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 5044 netsh.exe -
resource yara_rule behavioral2/memory/5112-132-0x0000000002190000-0x00000000031C3000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\software\WOW6432Node\Microsoft\Windows\CurrentVersion\run 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe File opened (read-only) \??\U: 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe File opened (read-only) \??\Q: 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe File opened (read-only) \??\P: 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe File opened (read-only) \??\N: 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe File opened (read-only) \??\H: 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe File opened (read-only) \??\G: 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe File opened (read-only) \??\E: 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe File opened (read-only) \??\X: 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe File opened (read-only) \??\V: 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe File opened (read-only) \??\R: 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe File opened (read-only) \??\M: 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe File opened (read-only) \??\J: 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe File opened (read-only) \??\Z: 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe File opened (read-only) \??\T: 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe File opened (read-only) \??\S: 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe File opened (read-only) \??\O: 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe File opened (read-only) \??\K: 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe File opened (read-only) \??\F: 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe File opened (read-only) \??\W: 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe File opened (read-only) \??\L: 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe File opened (read-only) \??\I: 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe File opened for modification C:\Documents and Settings\Admin\Local Settings\Application Data\Microsoft\CD Burning\autorun.inf 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5112 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe 5112 318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe"C:\Users\Admin\AppData\Local\Temp\318d032e434438d95e5144a25ba3f8c2aadf7d7b5e4a532ff663946962eae585.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Windows security modification
- Adds Run key to start application
- Enumerates connected drives
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
PID:5112 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode disable2⤵
- Modifies Windows Firewall
PID:5044
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
1Modify Existing Service
1Registry Run Keys / Startup Folder
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
1Modify Registry
4